Vous êtes sur la page 1sur 1227

M2000 V200R006

Operator Guide

Issue Date Part Number

06 2008-12-16 00366248

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com support@huawei.com

Website: Email:

Copyright Huawei Technologies Co., Ltd. 2008. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are the property of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

M2000 Operator Guide

Contents

Contents
About This Document.....................................................................................................................1 1 Getting Started............................................................................................................................1-1
1.1 Logging In to the M2000................................................................................................................................1-3 1.1.1 Logging In to theM2000 Server.............................................................................................................1-3 1.1.2 Logging Out the User Account..............................................................................................................1-6 1.1.3 Exiting the M2000 Client.......................................................................................................................1-7 1.1.4 Checking Whether the Client Need Upgrade.........................................................................................1-7 1.1.5 Setting the Interval for Update Checking of M2000 Client...................................................................1-7 1.1.6 Automatically Upgrading the Client Software.......................................................................................1-8 1.2 Changing Password.........................................................................................................................................1-9 1.3 Shortcuts to Client GUI Controls....................................................................................................................1-9 1.4 Customizing Client GUI Style......................................................................................................................1-10 1.4.1 Setting Output Information..................................................................................................................1-11 1.4.2 Setting the Display Effect of Alarm Status in the Topology View......................................................1-12 1.4.3 Setting the Toolbar...............................................................................................................................1-12 1.4.4 Custom Menu.......................................................................................................................................1-13 1.4.5 Customizing Client Time Display Mode.............................................................................................1-14 1.4.6 Customizing the Display Mode of Numbers........................................................................................1-16 1.4.7 Customizing the Mesurement...............................................................................................................1-16 1.4.8 Setting Common Options for Performance Management....................................................................1-17 1.5 Locking Client...............................................................................................................................................1-17 1.5.1 Locking the Client Automatically........................................................................................................1-18 1.5.2 Locking Client Manually.....................................................................................................................1-18 1.6 Unlocking the Client.....................................................................................................................................1-18 1.7 Setting the Running Mode of the System......................................................................................................1-19 1.8 Setting the Alarm Sound When the Network Is Disconnected.....................................................................1-20 1.9 Setting the LMT Proxy..................................................................................................................................1-20 1.10 Setting the LMT Prompt.............................................................................................................................1-21 1.11 Sending Broadcasting Messages.................................................................................................................1-21 1.12 Viewing NM License Information..............................................................................................................1-22 1.13 Viewing NE Partitioning ............................................................................................................................1-22 1.14 Downloading NE Mediation Data to the M2000 Client.............................................................................1-23 1.15 Managing the Exported Files in the Server.................................................................................................1-24 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. i

Contents

M2000 Operator Guide

1.16 Managing User-Defined Object Groups.....................................................................................................1-24 1.16.1 User-Defined Object Groups..............................................................................................................1-24 1.16.2 Adding a User-Defined Object Group...............................................................................................1-25 1.16.3 Modifying a User-Defined Object Group..........................................................................................1-26 1.16.4 Viewing User-Defined Object Groups...............................................................................................1-27 1.17 Reference for M2000 Client Interfaces.......................................................................................................1-27 1.17.1 Interface Description: M2000 Client Interface..................................................................................1-28 1.17.2 Interface Description: Common Options for Performance Management..........................................1-36 1.17.3 Parameters for Logging In to the M2000 Server................................................................................1-39 1.17.4 Tool Buttons.......................................................................................................................................1-40 1.17.5 Parameters for Output GUI Information............................................................................................1-43 1.17.6 Parameters for Viewing NM License Information.............................................................................1-44 1.17.7 Parameters for Setting the Time Style................................................................................................1-44 1.17.8 Parameters for Setting Common Options for Performance Management..........................................1-45 1.17.9 Parameters for the NE Partitioning Information................................................................................1-47 1.17.10 Parameters for User-Defined Object Groups...................................................................................1-47

2 Network Monitoring................................................................................................................. 2-1


2.1 Basic Knowledge of Monitoring.....................................................................................................................2-3 2.1.1 Alarm Management................................................................................................................................2-3 2.1.2 Alarm Levels..........................................................................................................................................2-5 2.1.3 Alarm Status...........................................................................................................................................2-5 2.1.4 Fault Alarms and Event Alarms.............................................................................................................2-6 2.1.5 Alarm Types...........................................................................................................................................2-8 2.1.6 Alarm Reporting Procedure...................................................................................................................2-9 2.1.7 Alarm Auto-Triggering Script..............................................................................................................2-10 2.2 Monitoring Network Alarms.........................................................................................................................2-10 2.2.1 Setting Columns in an Alarm Interface................................................................................................2-11 2.2.2 Manually Synchronizing NE Alarms...................................................................................................2-12 2.2.3 Locating Alarms...................................................................................................................................2-13 2.2.4 Manually Clearing an Alarm................................................................................................................2-13 2.2.5 Monitoring Alarms Through the Topology View................................................................................2-13 2.2.6 Setting Alarm Real-Time Monitoring..................................................................................................2-14 2.2.7 Querying Alarms..................................................................................................................................2-14 2.2.8 Collecting Alarm Statistics...................................................................................................................2-24 2.2.9 Saving Alarm Data...............................................................................................................................2-26 2.2.10 Printing Alarm Data...........................................................................................................................2-27 2.2.11 Handling Alarms................................................................................................................................2-28 2.2.12 Setting the Displaying Location for a New Alarm.............................................................................2-37 2.3 Setting Alarm Auto Processing.....................................................................................................................2-38 2.3.1 Alarm Auto Processing Policies...........................................................................................................2-38 2.3.2 Setting Alarm Notification...................................................................................................................2-39 2.3.3 Setting Alarm Remote Notification......................................................................................................2-44 ii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

2.3.4 Setting Alarm Filter Rules....................................................................................................................2-47 2.3.5 Setting Alarm Auto Acknowledgement...............................................................................................2-48 2.3.6 Setting Redefinition of Alarm Level....................................................................................................2-49 2.3.7 Setting Alarm Correlation Rules..........................................................................................................2-50 2.3.8 Managing Auto-Triggering Script Tasks.............................................................................................2-57 2.4 Setting NE Alarms........................................................................................................................................2-62 2.4.1 Shielding an NE Alarm........................................................................................................................2-62 2.4.2 Querying the Shielding of an NE Alarm..............................................................................................2-64 2.4.3 Modifying the Shielding of an NE Alarm............................................................................................2-65 2.4.4 Redefining the Level of an NE Alarm.................................................................................................. -66 2 2.4.5 Querying the Redefinition of an NE Alarm Level...............................................................................2-67 2.4.6 Modifying the Setting of NE Alarm Level Redefinition......................................................................2-68 2.4.7 Defining an NE Alarm.........................................................................................................................2-69 2.4.8 Binding a User-Defined Alarm............................................................................................................2-72 2.5 Monitoring NE Performance in Real Time...................................................................................................2-78 2.5.1 Real-Time Monitoring Performance Counters.....................................................................................2-78 2.5.2 Starting Real-Time Performance Monitoring......................................................................................2-92 2.5.3 Displaying Monitoring Results............................................................................................................2-99 2.5.4 Handling Monitoring Data.................................................................................................................2-104 2.6 Integrated Network Monitoring..................................................................................................................2-107 2.6.1 Basic Knowledge................................................................................................................................2-108 2.6.2 Managing Monitored Object Groups.................................................................................................2-113 2.6.3 Monitoring Object Groups.................................................................................................................2-119 2.6.4 Checking Information of Monitored Objects.....................................................................................2-123 2.6.5 Checking the Status of Monitored Objects........................................................................................2-129 2.6.6 Summarizing Alarms of Monitored Objects......................................................................................2-132 2.7 NM System Monitoring..............................................................................................................................2-140 2.7.1 Setting Monitoring Parameters...........................................................................................................2-140 2.7.2 Monitoring the M2000 Performance Status.......................................................................................2-143 2.7.3 Monitoring the M2000 Hard Disk Status...........................................................................................2-143 2.7.4 Monitoring the M2000 Database Status.............................................................................................2-144 2.7.5 Monitoring the M2000 Service Status...............................................................................................2-144 2.7.6 Monitoring the M2000 Process Status...............................................................................................2-145 2.8 Reference for Network Monitoring Interfaces............................................................................................2-146 2.8.1 Interface Description: Local Terminal Settings.................................................................................2-151 2.8.2 Interface Description: Fault Service Settings.....................................................................................2-153 2.8.3 Interface Description: NE Alarm Settings..........................................................................................2-159 2.8.4 Interface Description: Alarm Browse, Query and Statistics..............................................................2-159 2.8.5 Interface Description: Performance Monitor.....................................................................................2-161 2.8.6 Interface Description: Management of Monitored Object Groups....................................................2-163 2.8.7 Interface Description: RAN Network Monitoring.............................................................................2-164 2.8.8 Interface Description: Monitoring Panel............................................................................................2-165 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. iii

Contents

M2000 Operator Guide 2.8.9 Interface Description: System Monitor Browser...............................................................................2-165 2.8.10 Parameters for Setting Columns in an Alarm Interface...................................................................2-167 2.8.11 Parameters for Monitoring Alarms in Real Time.............................................................................2-169 2.8.12 Parameters for Setting Alarm Query/Browse...................................................................................2-170 2.8.13 Parameters for Setting Alarm Statistics...........................................................................................2-175 2.8.14 Parameters for Selecting NE for Query............................................................................................2-179 2.8.15 Parameters for Selecting Alarm Objects..........................................................................................2-180 2.8.16 Parameters for Selecting Alarm Name.............................................................................................2-181 2.8.17 Parameters for the Alarm Explanation and Maintenance Experience..............................................2-182 2.8.18 Parameters for Acknowledging Alarms Automatically...................................................................2-183 2.8.19 Parameters for Setting Alarm Filter Conditions...............................................................................2-184 2.8.20 Parameters for Viewing Alarm Details............................................................................................2-186 2.8.21 Parameters for Querying the Shielding of an NE Alarm..................................................................2-188 2.8.22 Parameters for Shielding an NE Alarm............................................................................................2-189 2.8.23 Parameters for Redefining NMS Alarm Level ................................................................................2-191 2.8.24 Parameters for Redefining/Modifying the Level of an NE Alarm...................................................2-192 2.8.25 Parameters for Alarm Severity Redefinition....................................................................................2-192 2.8.26 Parameters for Querying the Redefinition of an NE Alarm Level...................................................2-193 2.8.27 Parameters for User-Defined Alarms...............................................................................................2-194 2.8.28 Parameters for Querying a User-Defined Alarm..............................................................................2-195 2.8.29 Parameters for Querying the Binding of a User-Defined Alarm .....................................................2-196 2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm......................................2-197 2.8.31 Parameters for Setting the Alarm Box.............................................................................................2-199 2.8.32 Parameters for Setting Alarm Remote Notification Rules...............................................................2-201 2.8.33 Parameters for Setting Notification by Email..................................................................................2-205 2.8.34 Parameters for Advanced Settings of Notification by Email...........................................................2-207 2.8.35 Parameters for Setting Notification by Modem...............................................................................2-207 2.8.36 Parameters for Advanced Settings of Notification by Modem........................................................2-209 2.8.37 Parameters for Setting Notification by SMS Gateway.....................................................................2-209 2.8.38 Parameters for Advanced Settings of Notification by SMS Gateway..............................................2-210 2.8.39 Parameters for Setting Simple Correlation Rules............................................................................2-213 2.8.40 Parameters for Setting Advanced Correlation Rules........................................................................2-214 2.8.41 Parameters for the Basic Attributes of Auto-Triggering Tasks........................................................2-216 2.8.42 Parameters for Auto-Triggering Conditions....................................................................................2-218 2.8.43 Parameters for Adding the Alarm Conditions of the Auto-Triggering Script..................................2-219 2.8.44 Parameters for Searching Auto-Triggering Tasks............................................................................2-219 2.8.45 Parameters for Searching Auto-Triggering Records........................................................................2-221 2.8.46 Parameters for Analyzing the Trend of a Monitoring Counter........................................................2-222 2.8.47 Parameters for Setting a Background Color for a Monitoring Chart...............................................2-222 2.8.48 Parameters for Setting Filtering Conditions for a Monitoring Table...............................................2-223 2.8.49 Parameters for Setting Properties for a Monitoring Chart...............................................................2-223 2.8.50 Parameters for Setting Real-Time Monitoring Thresholds..............................................................2-224

iv

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

2.8.51 Parameters for Setting Rules for Monitoring Thresholds................................................................2-224 2.8.52 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Chart........................2-225 2.8.53 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Table........................2-225 2.8.54 Parameters for Summarizing Alarms of RNC/NodeB.....................................................................2-226 2.8.55 Parameters for Checking Values of RNC Monitoring Counters......................................................2-228 2.8.56 Parameters for Checking the Information on Basic RNC Configuration.........................................2-229 2.8.57 Parameters for Checking the Information on the Iu/Iur of the RNC................................................2-229 2.8.58 Parameters for Checking the Information on Specified Links of the Iu/Iur Interface.....................2-230 2.8.59 Parameters for Checking the Information on the Iub Interface of the RNC....................................2-230 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface.........................2-231 2.8.61 Parameters for Checking the E1/T1 Status of the RNC...................................................................2-232 2.8.62 Parameters for Checking the Distribution of NodeB and Cells on the RNC...................................2-232 2.8.63 Parameters for Checking the Information on Basic NodeB Configuration......................................2-233 2.8.64 Parameters for Checking the Information on Basic Cell Configuration..........................................2-234 2.8.65 Parameters for Configuration Status................................................................................................2-235 2.8.66 Parameters for Checking the Information on CCH Configuration...................................................2-236 2.8.67 Parameters for Checking the Information on Neighbors..................................................................2-237 2.8.68 Parameters for Checking the Values of Cell Monitoring Counters..................................................2-242 2.8.69 Parameters for Searching for Objects...............................................................................................2-242 2.8.70 Parameters for Setting Thresholds of the M2000 Server.................................................................2-243 2.8.71 Parameters for Monitoring Performance of the M2000 Server........................................................2-245 2.8.72 Parameters for Monitoring Hard Disk of the M2000 Server............................................................2-246 2.8.73 Parameters for Monitoring Database of the M2000 Server.............................................................2-247 2.8.74 Parameters for Monitoring Services of the M2000 Server...............................................................2-248 2.8.75 Parameters for Monitoring Process of the M2000 Server................................................................2-249

3 Topology Management.............................................................................................................3-1
3.1 Basic Knowledge of Topology........................................................................................................................3-3 3.1.1 Topology Management Function...........................................................................................................3-3 3.1.2 Objects in a Topology View...................................................................................................................3-3 3.2 Constructing a Physical Subnet.......................................................................................................................3-4 3.2.1 Designing the Physical Topology..........................................................................................................3-5 3.2.2 Setting the Topology Background..........................................................................................................3-5 3.2.3 Creating a Physical Subnet.....................................................................................................................3-6 3.2.4 Creating Physical NEs............................................................................................................................3-7 3.2.5 Creating a Virtual NE.............................................................................................................................3-7 3.2.6 Creating IP Device.................................................................................................................................3-7 3.2.7 Creating a Physical Link........................................................................................................................3-8 3.2.8 Creating a Virtual Link..........................................................................................................................3-9 3.2.9 Creating Links in Batches....................................................................................................................3-10 3.2.10 Setting an NE as a Transfer Server....................................................................................................3-11 3.3 Creating Physical NEs...................................................................................................................................3-12 3.3.1 NE Type...............................................................................................................................................3-12 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. v

Contents

M2000 Operator Guide 3.3.2 Basic NE information...........................................................................................................................3-19 3.3.3 Creating a Physical NE........................................................................................................................3-21 3.3.4 Creating Multiple Physical NEs...........................................................................................................3-22

3.4 Managing SNMP Parameter Templates........................................................................................................3-31 3.4.1 Creating SNMP Parameter Templates.................................................................................................3-32 3.4.2 Modifying SNMP Parameter Templates..............................................................................................3-32 3.4.3 Deleting SNMP Parameter Templates.................................................................................................3-33 3.5 Monitoring NEs.............................................................................................................................................3-33 3.5.1 Monitoring NE Status...........................................................................................................................3-33 3.5.2 Allowing Reconnection to an NE.........................................................................................................3-34 3.5.3 Manually Reconnecting an NE............................................................................................................3-35 3.6 Adjusting the Network Topology..................................................................................................................3-35 3.6.1 Searching for Topology Objects..........................................................................................................3-36 3.6.2 Adjusting the Position of an NE...........................................................................................................3-37 3.6.3 Moving a NodeB..................................................................................................................................3-41 3.6.4 Viewing/Modifying the Basic Attributes of a Subnet..........................................................................3-45 3.6.5 Viewing/Modifying NE Properties......................................................................................................3-46 3.6.6 Viewing/Modifying a Physical Link....................................................................................................3-47 3.6.7 Viewing/Modifying a Virtual Link......................................................................................................3-48 3.6.8 Deleting Subnets..................................................................................................................................3-48 3.6.9 Deleting a Virtual NE...........................................................................................................................3-49 3.6.10 Deleting Physical NEs in Batches......................................................................................................3-49 3.6.11 Deleting a Physical Link....................................................................................................................3-50 3.6.12 Deleting a Virtual Link......................................................................................................................3-50 3.6.13 Refreshing a Topology View.............................................................................................................3-51 3.7 Adjusting the Topology View.......................................................................................................................3-51 3.7.1 Showing/Hiding the Navigation Tree of a Topology View.................................................................3-52 3.7.2 Setting Alarm Display on the Topology View.....................................................................................3-53 3.7.3 Switching the Current Subnet..............................................................................................................3-53 3.7.4 Display the filtered topology view.......................................................................................................3-54 3.7.5 Zooming In/Out on a Topology View..................................................................................................3-54 3.7.6 View the topology aerial view.............................................................................................................3-55 3.7.7 Laying Out Topology Objects Automatically......................................................................................3-55 3.7.8 Expand or Collapse Child Objects.......................................................................................................3-56 3.7.9 Sorting Topology Objects....................................................................................................................3-56 3.7.10 Displaying the Alarm Pop-Up Pane...................................................................................................3-57 3.7.11 Customizing Topology Tips...............................................................................................................3-57 3.7.12 Setting a Subnet Displayed When the Topology View is Started......................................................3-58 3.7.13 Enabling the E-Map...........................................................................................................................3-58 3.8 Printing a Topology View.............................................................................................................................3-59 3.9 Reference for Topology Management Interfaces..........................................................................................3-59 3.9.1 Interface Description: Topology Management.....................................................................................3-61 vi Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

3.9.2 Interface Description: Moving a NodeB..............................................................................................3-69 3.9.3 Parameters for Setting a Physical Subnet.............................................................................................3-70 3.9.4 Parameters for Creating an IP Device..................................................................................................3-72 3.9.5 Parameters for Physical Link...............................................................................................................3-75 3.9.6 Parameters for Setting a Virtual Link..................................................................................................3-76 3.9.7 Parameters for Setting the Topology View..........................................................................................3-77 3.9.8 Parameters for Exporting an NE Information Template (in .ini Format).............................................3-78 3.9.9 Parameters for Creating an NE.............................................................................................................3-79 3.9.10 Parameters for Batch Creating Physical NEs.....................................................................................3-80 3.9.11 Parameters for Monitoring the Status of an NE.................................................................................3-80 3.9.12 Parameters for Viewing/Modifying the Basic Attributes of a Subnet................................................3-81 3.9.13 Parameters for Setting Topology Filter Display................................................................................3-81 3.9.14 Parameters for Printing a Topology View..........................................................................................3-82 3.9.15 Parameters for SNMP Parameter Templates......................................................................................3-84 3.9.16 Parameters for Moving a NodeB........................................................................................................3-87

4 Security Management................................................................................................................4-1
4.1 Basic Knowledge of Security Management....................................................................................................4-3 4.1.1 Centralized User Management...............................................................................................................4-3 4.1.2 User Authority........................................................................................................................................4-4 4.1.3 NE User..................................................................................................................................................4-5 4.1.4 Introduction to the FTPS........................................................................................................................4-5 4.2 Refreshing the Security Management Interface..............................................................................................4-6 4.3 Configuring the M2000...................................................................................................................................4-6 4.3.1 Setting the M2000 Security Policy.........................................................................................................4-7 4.3.2 Setting Single-User Mode......................................................................................................................4-9 4.3.3 Setting the System ACL.......................................................................................................................4-10 4.3.4 Setting FTPS Parameters......................................................................................................................4-10 4.4 Customizing MML Authority.......................................................................................................................4-11 4.4.1 Customizing an NE Type Command Group........................................................................................4-12 4.4.2 Customizing an NE Command Group.................................................................................................4-13 4.4.3 Setting Authority Rules for NE Types.................................................................................................4-13 4.4.4 Issuing Authority Rules for NE Types.................................................................................................4-14 4.4.5 Synchronizing NE Security Data.........................................................................................................4-16 4.5 Creating OM Users........................................................................................................................................4-16 4.5.1 Process for Creating OM Users............................................................................................................4-17 4.5.2 Creating an OM User Group................................................................................................................4-18 4.5.3 Setting the Managed Domain for an M2000 User Group....................................................................4-19 4.5.4 Assigning Operation Rights to an OM User Group.............................................................................4-19 4.5.5 Assigning Rights of New NEs to an OM User Group.........................................................................4-20 4.5.6 Granting MML Authority to an OM User Group................................................................................4-21 4.5.7 Creating an OM User Account.............................................................................................................4-22 4.5.8 Synchronize OM User Data.................................................................................................................4-23 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. vii

Contents

M2000 Operator Guide 4.5.9 Adding an OM User to a User Group..................................................................................................4-23 4.5.10 Assigning Operation Rights to an OM User......................................................................................4-24 4.5.11 Setting the Managed Domain for an OM User..................................................................................4-24 4.5.12 Setting the User ACL.........................................................................................................................4-25 4.5.13 Grant MML Authority to an OM user................................................................................................4-25

4.6 Modifying an OM User.................................................................................................................................4-27 4.6.1 Viewing the Details of an OM User.....................................................................................................4-27 4.6.2 Modifying the Public Authority of an OM User..................................................................................4-28 4.6.3 Modifying the Private Authority of an OM User.................................................................................4-32 4.6.4 Modifying the Information About an OM User ..................................................................................4-36 4.6.5 Resetting the Password of an OM User...............................................................................................4-36 4.7 Deleting an OM User Group.........................................................................................................................4-37 4.8 Deleting an OM User....................................................................................................................................4-37 4.9 Querying Authorization.................................................................................................................................4-38 4.10 Comparing the OM User Rights..................................................................................................................4-38 4.11 Managing NE Users....................................................................................................................................4-38 4.11.1 Creating an NE User..........................................................................................................................4-39 4.11.2 Deleting an NE User..........................................................................................................................4-40 4.11.3 Changing the Password of an NE User..............................................................................................4-41 4.11.4 Associating OM User with NE User..................................................................................................4-42 4.11.5 Disassociating OM User with NE User..............................................................................................4-43 4.12 Monitoring OM Users.................................................................................................................................4-43 4.12.1 User Operation Logs..........................................................................................................................4-44 4.12.2 User Sessions......................................................................................................................................4-44 4.12.3 Monitoring Operation of OM Users on the M2000...........................................................................4-46 4.12.4 Viewing Operation of NE Users........................................................................................................4-47 4.12.5 Setting the Status of Special NE User................................................................................................4-48 4.12.6 Forcing an OM User to Exit from the M2000....................................................................................4-48 4.12.7 Forcing an NE User to Exit from the LMT........................................................................................4-49 4.12.8 Unlocking an OM User......................................................................................................................4-49 4.12.9 Setting OM User Auto-Locking.........................................................................................................4-50 4.13 Reference for Security Management Interfaces..........................................................................................4-50 4.13.1 Interface Description: NM Security Management.............................................................................4-51 4.13.2 Interface Description: NE User Management Interface.....................................................................4-52 4.13.3 Interface Description: NE Login Management Interface...................................................................4-54 4.13.4 Interface Description: MML Authority Information of an OM User.................................................4-55 4.13.5 Interface Description: Authority Rules for NE Type.........................................................................4-55 4.13.6 Interface Description: Viewing Operations of OM Users on the M2000..........................................4-56 4.13.7 Interface Description: Viewing Operations of NE Users...................................................................4-57 4.13.8 Parameters for Adding an OM User Group.......................................................................................4-58 4.13.9 Parameters for the Operation Authority of an OM User or an OM User Group................................4-59 4.13.10 Parameters for the MML Authority to an OM User Group or an OM User....................................4-60 viii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

4.13.11 Parameters for the Information of an OM User...............................................................................4-61 4.13.12 Parameters for NE User....................................................................................................................4-62 4.13.13 Parameters for Creating an M2000 User Account...........................................................................4-63 4.13.14 Parameters for Customizing an NE Command Group.....................................................................4-66 4.13.15 Parameters for the System Security Policy......................................................................................4-67 4.13.16 Parameters for FTPS Parameter.......................................................................................................4-71

5 Log Management........................................................................................................................5-1
5.1 Basic Knowledge of Log Management...........................................................................................................5-2 5.1.1 Log Types...............................................................................................................................................5-2 5.1.2 Log Templates........................................................................................................................................5-2 5.1.3 Procedure for Reporting NE Logs..........................................................................................................5-3 5.2 Synchronizing NE Logs..................................................................................................................................5-7 5.3 Querying Logs.................................................................................................................................................5-7 5.3.1 Creating a Log Query Template.............................................................................................................5-8 5.3.2 Querying Operation Logs.......................................................................................................................5-8 5.3.3 Querying System Logs...........................................................................................................................5-9 5.3.4 Querying Security Logs.......................................................................................................................5-10 5.3.5 Querying NE Operation Logs..............................................................................................................5-11 5.3.6 Saving Log Query Results....................................................................................................................5-12 5.3.7 Printing Log Query Results..................................................................................................................5-12 5.4 Taking Statistics of Logs...............................................................................................................................5-13 5.4.1 Creating a Log Statistical Template.....................................................................................................5-13 5.4.2 Collecting Statistics on Operation Logs...............................................................................................5-14 5.4.3 Collecting Statistics on System Logs...................................................................................................5-14 5.4.4 Collecting Statistics on Security Logs.................................................................................................5-15 5.4.5 Taking Statistics of an NE Log............................................................................................................5-16 5.5 Managing Log Templates..............................................................................................................................5-17 5.5.1 Creating Log Templates.......................................................................................................................5-17 5.5.2 Modifying Log Template Condition....................................................................................................5-18 5.5.3 Deleting Log Template.........................................................................................................................5-19 5.6 References for Log Management Interfaces.................................................................................................5-20 5.6.1 Interface Description: Log Management..............................................................................................5-21 5.6.2 Parameters for Operation Log Details..................................................................................................5-22 5.6.3 Parameters for System Log Details......................................................................................................5-23 5.6.4 Parameters for Security Log Details....................................................................................................5-23 5.6.5 Parameters for NE Operation Log Information....................................................................................5-24 5.6.6 Parameters for NE Security Log Information......................................................................................5-25 5.6.7 Parameters for Operation Log Statistics...............................................................................................5-26 5.6.8 Parameters for Security Log Statistics.................................................................................................5-28 5.6.9 Parameters for System Log Statistics...................................................................................................5-30 5.6.10 Parameters for Statistics of an NE Operation Log.............................................................................5-31 5.6.11 Parameters for Statistics of an NE Security Log................................................................................5-32 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. ix

Contents

M2000 Operator Guide 5.6.12 Parameters for Querying Operation Logs..........................................................................................5-32 5.6.13 Parameters for Querying System Logs...............................................................................................5-34 5.6.14 Parameters for Querying Security Logs.............................................................................................5-35 5.6.15 Parameters for Querying NE Operation Logs....................................................................................5-36 5.6.16 Parameters for Querying NE Security Logs.......................................................................................5-37

6 Performance Management........................................................................................................6-1
6.1 Basic Knowledge of Performance Management.............................................................................................6-3 6.1.1 Performance Measurement Counters.....................................................................................................6-3 6.1.2 Performance Measurement Objects........................................................................................................6-4 6.1.3 Measurement Function Sets and Subsets...............................................................................................6-5 6.1.4 Performance Measurement Periods........................................................................................................6-5 6.1.5 Performance Measurement Results........................................................................................................6-6 6.1.6 Performance Counter Thresholds...........................................................................................................6-6 6.1.7 Performance Measurement States..........................................................................................................6-7 6.1.8 Performance Measurement Procedure....................................................................................................6-7 6.2 Monitoring NE Performances.........................................................................................................................6-9 6.2.1 Setting a Performance Measurement Range for an NE........................................................................6-10 6.2.2 Managing Class 3 Object.....................................................................................................................6-11 6.2.3 Synchronizing NE Measurement Results.............................................................................................6-13 6.2.4 Subscribing to NE Measurement Results.............................................................................................6-14 6.2.5 Querying the Reliability of Measurement Results...............................................................................6-14 6.2.6 Querying Missing Measurement Results.............................................................................................6-15 6.2.7 Checking the Integrity of NE Results .................................................................................................6-16 6.2.8 Managing NE Measurement States......................................................................................................6-18 6.3 Querying Performance Measurement Results...............................................................................................6-19 6.3.1 Querying Results by Templates...........................................................................................................6-20 6.3.2 Querying Results by New Conditions..................................................................................................6-21 6.3.3 Query Results by Busy Hour................................................................................................................6-21 6.3.4 Re-querying Results.............................................................................................................................6-22 6.3.5 Setting Result Query Conditions..........................................................................................................6-23 6.3.6 Displaying Performance Measurement Results...................................................................................6-27 6.3.7 Saving Performance Measurement Results..........................................................................................6-30 6.3.8 Printing Performance Measurement Results........................................................................................6-30 6.3.9 Managing Result Query Templates......................................................................................................6-31 6.4 Managing Measurement Objects...................................................................................................................6-34 6.4.1 Querying Measurement Objects...........................................................................................................6-34 6.4.2 Querying Measurement Counters.........................................................................................................6-35 6.4.3 Importing Measurement Object Data...................................................................................................6-36 6.4.4 Exporting Measurement Object Data...................................................................................................6-36 6.4.5 Importing Setting of Measurement......................................................................................................6-37 6.4.6 Exporting Setting of Measurement......................................................................................................6-37 6.4.7 Modifying Remarks of a Measurement Object....................................................................................6-38 x Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

6.4.8 Activating/Deactivating a Measurement Task.....................................................................................6-38 6.5 Managing User-Defined Counters................................................................................................................6-39 6.5.1 Adding a User-Defined Counter..........................................................................................................6-40 6.5.2 Modifying a User-Defined Counter.....................................................................................................6-41 6.5.3 Importing a User-Defined Counter......................................................................................................6-42 6.5.4 Exporting a User-Defined Counter......................................................................................................6-42 6.6 Managing Counter Thresholds......................................................................................................................6-43 6.6.1 Setting a Simple Counter Threshold....................................................................................................6-44 6.6.2 Setting a Combined Counter Threshold...............................................................................................6-45 6.6.3 Modifying a Counter Threshold...........................................................................................................6-46 6.6.4 Modifying a Combined Counter Threshold.........................................................................................6-47 6.6.5 Activating/Deactivating a Counter Threshold......................................................................................6-47 6.7 Reference for Performance Management Interfaces.....................................................................................6-48 6.7.1 Interface Description: Query Result.....................................................................................................6-49 6.7.2 Interface Description: Measure Management......................................................................................6-50 6.7.3 Interface Description: Threshold Management....................................................................................6-52 6.7.4 Interface Description: User-defined Counter Management.................................................................6-53 6.7.5 Parameters for Adding/Modifying a User-Defined Counter................................................................6-54 6.7.6 Parameters for Setting the Conditions for Filtering Result .................................................................6-54 6.7.7 Parameters for Querying Missing Measurement Results.....................................................................6-55 6.7.8 Parameters for Querying the Reliability of Measurement Results.......................................................6-55 6.7.9 Parameters for Setting the Mode of Sorting Displayed Results...........................................................6-56 6.7.10 Parameters for Setting a Background Color for a Measurement Results Chart.................................6-56 6.7.11 Parameters for Synchronizing NE Measurement Results..................................................................6-56 6.7.12 Parameters for Setting a Simple Counter Threshold..........................................................................6-57 6.7.13 Parameters for Setting a Combined Counter Threshold.....................................................................6-59 6.7.14 Parameters for Setting Threshold Alarm Triggering or Restoration..................................................6-61 6.7.15 Parameters for Specifying the Time Range of Results.......................................................................6-61 6.7.16 Parameters for Measurement States of Measurement Objects and Counters.....................................6-62

7 Performance Report Management..........................................................................................7-1


7.1 Basic Knowledge of Performance Report Management.................................................................................7-3 7.2 Managing Performance Reports......................................................................................................................7-3 7.2.1 Generating a Performance Report..........................................................................................................7-4 7.2.2 Setting a Template for Querying Performance Reports.........................................................................7-5 7.2.3 Filtering the Contents of a Performance Report.....................................................................................7-6 7.2.4 Setting the Display of a Performance Report Based on Conditions...................................................... 7-8 7.2.5 Displaying a Performance Report in a Sequence Chart.........................................................................7-9 7.2.6 Displaying a Performance Report in a Comparison Chart...................................................................7-10 7.2.7 Setting a Related Report.......................................................................................................................7-12 7.2.8 Viewing the Attributes of a Performance Report Template.................................................................7-13 7.2.9 Saving a Performance Report...............................................................................................................7-13 7.2.10 Printing a Performance Report...........................................................................................................7-14 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xi

Contents

M2000 Operator Guide 7.2.11 Managing a Custom Performance Report Template..........................................................................7-15

7.3 Managing KPIs..............................................................................................................................................7-20 7.3.1 Viewing KPIs.......................................................................................................................................7-21 7.3.2 Filtering KPIs.......................................................................................................................................7-21 7.3.3 Setting the Display of a KPI Based on Conditions..............................................................................7-22 7.3.4 Managing Custom KPIs.......................................................................................................................7-23 7.4 MSC Server Performance Reports................................................................................................................7-26 7.4.1 MSC Basic Service Report...................................................................................................................7-26 7.4.2 Mobility Management Report..............................................................................................................7-29 7.4.3 CPU Load Report.................................................................................................................................7-30 7.4.4 Office Direction Traffic Report............................................................................................................7-31 7.4.5 Trunk Group Report.............................................................................................................................7-32 7.4.6 Signaling Link Report..........................................................................................................................7-33 7.5 MSC POOL Report Group............................................................................................................................7-39 7.5.1 Global Traffic of a Pool Report............................................................................................................7-40 7.5.2 Local Traffic of a Pool Report.............................................................................................................7-41 7.5.3 Incoming Traffic of a Pool Report.......................................................................................................7-42 7.5.4 PoolOutTerCall Report........................................................................................................................7-42 7.5.5 MobileOfficeInTfc Report...................................................................................................................7-43 7.5.6 MobileOfficeOutTfc Report.................................................................................................................7-44 7.5.7 VLRSubscriber Report.........................................................................................................................7-45 7.5.8 MeasurementForSMS Report...............................................................................................................7-45 7.5.9 MeasurementForMTC Report..............................................................................................................7-46 7.5.10 MeasurementForLOCUp Report........................................................................................................7-47 7.5.11 Pool Cell Handover Report................................................................................................................7-48 7.5.12 Traffic Measurement For LAI Report................................................................................................7-49 7.5.13 GSM Call Drop Report......................................................................................................................7-50 7.5.14 UMTS Call Drop Report....................................................................................................................7-51 7.5.15 Traffic Measurement of BSCOFI Assignment Report.......................................................................7-52 7.5.16 Traffic Measurement of RNCOFI Assignment Report......................................................................7-52 7.6 MSCe Pool Report Group.............................................................................................................................7-53 7.6.1 Global Traffic of a Pool Report............................................................................................................7-54 7.6.2 Local Traffic of a Pool Report.............................................................................................................7-55 7.6.3 Pool Incoming Traffic Report..............................................................................................................7-56 7.6.4 Pool Outgoing Traffic Report..............................................................................................................7-57 7.6.5 VLR Subscriber Report........................................................................................................................7-57 7.6.6 Pool Cell Handover Report..................................................................................................................7-58 7.6.7 LAI Traffic Measurement Report.........................................................................................................7-59 7.6.8 SMS Measurement Report...................................................................................................................7-60 7.6.9 Paging Measurement Report................................................................................................................7-60 7.6.10 Location Update Measurement Report...............................................................................................7-61 7.6.11 Assignment Measurement Report......................................................................................................7-62 xii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

7.7 RNC Performance Reports............................................................................................................................7-62 7.7.1 RNC Reports........................................................................................................................................7-63 7.7.2 Cell Reports..........................................................................................................................................7-68 7.7.3 Troubleshooting Reports......................................................................................................................7-74 7.8 PCU Performance Reports............................................................................................................................7-79 7.8.1 Data Throughput Report.......................................................................................................................7-79 7.8.2 Transmission Report............................................................................................................................7-81 7.8.3 Accessibility Report.............................................................................................................................7-82 7.8.4 Availability Report...............................................................................................................................7-83 7.8.5 Retainability Report.............................................................................................................................7-84 7.9 Reference for Performance Report Management Interfaces.........................................................................7-85 7.9.1 Interface Description: KPI List............................................................................................................7-85 7.9.2 Parameters for Setting Conditions for Querying Performance Reports...............................................7-86 7.9.3 Parameters for Setting Filter Conditions for Performance Reports.....................................................7-91 7.9.4 Parameters for Setting the Condition Display of the KPIs...................................................................7-92 7.9.5 Parameters for Setting the Sequence Chart and the Comparison Chart of Performance Reports........7-93 7.9.6 Parameters for Setting the Background Color of the Sequence Chart and the Comparison Chart of Performance Reports.....................................................................................................................................7-94 7.9.7 Parameters for Creating or Modifying a Custom Performance Report Template................................7-94 7.9.8 Parameters for Creating or Modifying a Sub-Report...........................................................................7-95 7.9.9 Parameters for KPIs.............................................................................................................................7-95

8 Software Management..............................................................................................................8-1
8.1 Basic Knowledge of Software Management...................................................................................................8-2 8.1.1 NE Software...........................................................................................................................................8-2 8.1.2 Software Patch........................................................................................................................................8-2 8.1.3 Patch States............................................................................................................................................8-3 8.1.4 Software Management File Types..........................................................................................................8-4 8.1.5 RAN License..........................................................................................................................................8-6 8.1.6 Software Management Procedure..........................................................................................................8-7 8.2 Managing Software and Files..........................................................................................................................8-8 8.2.1 Viewing File Information on the Server................................................................................................8-9 8.2.2 Viewing File Information on an NE.......................................................................................................8-9 8.2.3 Transferring Files from the Server to the Client....................................................................................8-9 8.2.4 Transferring Files from the Server to an NE........................................................................................8-10 8.2.5 Transferring Files from the Client to the Server..................................................................................8-11 8.2.6 Transferring Files from an NE to the Server........................................................................................8-12 8.2.7 Managing Task List..............................................................................................................................8-13 8.2.8 Setting Parameters of File Transferring...............................................................................................8-15 8.2.9 Managing Voice Files..........................................................................................................................8-15 8.3 Upgrading NE Software and Patches............................................................................................................8-19 8.3.1 Managing a Scheduled Upgrade..........................................................................................................8-20 8.3.2 Upgrading the RNC Software and Patch..............................................................................................8-23 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xiii

Contents

M2000 Operator Guide 8.3.3 Upgrading the SGSN Software and Patch............................................................................................8-28 8.3.4 Upgrading the GGSN Software and Patch...........................................................................................8-35 8.3.5 Upgrading the MSC Server Software Patch.........................................................................................8-41 8.3.6 Upgrading the MGW Software and Patch............................................................................................8-45 8.3.7 Upgrading the AG Software and Patch................................................................................................8-46 8.3.8 Upgrading the ICS Software................................................................................................................8-52 8.3.9 Upgrading NodeB NE Software and Patch..........................................................................................8-53 8.3.10 Upgrading the BSC Software and Patch............................................................................................8-55 8.3.11 Upgrading the BTS Software.............................................................................................................8-61 8.3.12 Upgrading the ASN-GW Software and Patch....................................................................................8-65 8.3.13 Monitoring the Procedure of Software Upgrade................................................................................8-71

8.4 Managing NE Licenses................................................................................................................................. 8-71 8.4.1 Managing RAN Licenses.....................................................................................................................8-72 8.4.2 Managing Licenses Between NEs........................................................................................................8-79 8.5 Querying Version Information on Software Installed on the Server.............................................................8-91 8.6 Reference for Software Management Interfaces...........................................................................................8-93 8.6.1 Interface Description: Software Browser.............................................................................................8-93 8.6.2 Interface Description: NE Licenses Management................................................................................8-95 8.6.3 Parameters for RNC Patch................................................................................................................... 8-99 8.6.4 Parameters for Other NE Software and Patch....................................................................................8-100 8.6.5 Parameters for NE Data......................................................................................................................8-101 8.6.6 Parameters for Upgrading the NodeB Software.................................................................................8-103 8.6.7 Parameters for License Information of NodeBs Controlled by an RNC............................................8-104 8.6.8 Parameters for Setting Parameters of Files Transferring...................................................................8-106 8.6.9 Parameters for the Operator...............................................................................................................8-106 8.6.10 Parameters for Adding/Modifying License Sharing Groups............................................................8-109 8.6.11 Parameters for Version Information on Software Installed..............................................................8-110

9 Configuration Management.....................................................................................................9-1
9.1 Basic Knowledge of Configuration Management...........................................................................................9-3 9.1.1 Management Information Tree (MIT)....................................................................................................9-3 9.1.2 MML command......................................................................................................................................9-3 9.1.3 NE Resource States................................................................................................................................9-4 9.1.4 CBSS Device Panel................................................................................................................................9-5 9.2 Configuring NEs by MML Commands...........................................................................................................9-8 9.2.1 Executing an MML Command...............................................................................................................9-9 9.2.2 Viewing the Result of an MML Command............................................................................................9-9 9.2.3 Viewing Follow-Up Reports................................................................................................................9-10 9.2.4 Setting the Attributes of the "MML Command" Interface...................................................................9-11 9.2.5 Setting Report Redirection...................................................................................................................9-11 9.2.6 Setting Report Scroll Display...............................................................................................................9-12 9.2.7 Clearing History Commands................................................................................................................9-12 9.2.8 Saving the Result of an MML Command............................................................................................ 9-12 xiv Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

9.3 Viewing NE Configuration Information.......................................................................................................9-13 9.3.1 Viewing NE MIT Information.............................................................................................................9-14 9.3.2 Viewing NE Resource Reports............................................................................................................9-15 9.3.3 Viewing NE Link Reports....................................................................................................................9-15 9.3.4 Viewing NE Statistics Reports.............................................................................................................9-16 9.3.5 Viewing NE Reports............................................................................................................................9-16 9.4 Handling NE Configuration Data..................................................................................................................9-16 9.4.1 Manually Synchronizing NE Configuration Data................................................................................9-17 9.4.2 Manually Exporting NE Configuration Data.......................................................................................9-19 9.4.3 Importing the Configuration Files of PCU...........................................................................................9-19 9.4.4 Exporting the Configuration Files of PCU...........................................................................................9-20 9.5 Managing Inventory Data..............................................................................................................................9-20 9.5.1 Adding Inventory Data.........................................................................................................................9-21 9.5.2 Querying Inventory Data......................................................................................................................9-22 9.5.3 Importing Inventory Data.....................................................................................................................9-23 9.5.4 Modifying Inventory Data....................................................................................................................9-24 9.5.5 Manually Synchronizing Inventory Data.............................................................................................9-24 9.5.6 Manually Exporting Inventory Data....................................................................................................9-25 9.6 Viewing NE Resource Information...............................................................................................................9-25 9.6.1 Viewing NE Resource States...............................................................................................................9-26 9.6.2 Monitoring NE Resource States in Real Time.....................................................................................9-27 9.7 Starting the CME...........................................................................................................................................9-28 9.8 Starting the LMT of an NE...........................................................................................................................9-29 9.9 Starting the Telnet.........................................................................................................................................9-29 9.10 Operating CBSS Device..............................................................................................................................9-30 9.10.1 Operating CBSS Board......................................................................................................................9-30 9.10.2 Maintaining CBSC.............................................................................................................................9-36 9.10.3 Maintaining CBTS.............................................................................................................................9-58 9.11 Reference for Configuration Management Interfaces.................................................................................9-69 9.11.1 Interface Description: MML Command.............................................................................................9-71 9.11.2 Interface Description: Follow-Up Reports Browser..........................................................................9-72 9.11.3 Interface Description: MIT Browsing................................................................................................9-72 9.11.4 Interface Description: Inventory Management...................................................................................9-74 9.11.5 Interface Description: Device Panel...................................................................................................9-75 9.11.6 Parameters for Monitoring NE Resource States in Real Time...........................................................9-76 9.11.7 Parameters for Setting the Attributes of the MML Command Interface............................................9-76 9.11.8 Parameters for NE MIT Information..................................................................................................9-78 9.11.9 Parameters for NE Resource Report..................................................................................................9-79 9.11.10 Parameters for NE Statistics Report.................................................................................................9-79 9.11.11 Parameters for Querying Inventory Data.........................................................................................9-79 9.11.12 Parameters for Querying the Board Information..............................................................................9-82 9.11.13 Parameters for Querying the Subsystem Status...............................................................................9-83 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xv

Contents

M2000 Operator Guide 9.11.14 Parameters for Querying the Clock Status.......................................................................................9-84 9.11.15 Parameters for Querying the A2 Circuit Status................................................................................9-86 9.11.16 Parameters for Querying the PCF Buffer Usage..............................................................................9-86 9.11.17 Parameters for Querying the DSP Information................................................................................9-87 9.11.18 Parameters for Querying the EVC Timeslot Occupancy................................................................. 9-87 9.11.19 Parameters for Querying the L Interface Channel............................................................................9-88 9.11.20 Parameters for Downloading the BTS Software or Data.................................................................9-88 9.11.21 Parameters for Blocking the BTS CPM Board................................................................................ 9-89 9.11.22 Parameters for Querying the BTS Ethernet IP.................................................................................9-90 9.11.23 Parameters for Querying the FE Port Information...........................................................................9-90

10 Data Management..................................................................................................................10-1
10.1 Basic Knowledge of Data Management......................................................................................................10-3 10.1.1 NM Backup Data................................................................................................................................10-3 10.1.2 NE Backup Data.................................................................................................................................10-4 10.1.3 NM Log Data..................................................................................................................................... 10-4 10.2 NE Backup Data..........................................................................................................................................10-5 10.2.1 Manual NE Backup Data....................................................................................................................10-5 10.2.2 Viewing NE Backup File................................................................................................................... 10-6 10.2.3 Restoring NE Data............................................................................................................................. 10-6 10.3 NM Backup Data.........................................................................................................................................10-7 10.3.1 Manual Backup of M2000 Data.........................................................................................................10-7 10.3.2 Viewing NM Backup File..................................................................................................................10-8 10.4 Collecting Network Optimization Data.......................................................................................................10-9 10.4.1 Collecting Neighbor Cell Optimization Data.....................................................................................10-9 10.4.2 Collecting the Uplink ARFCN Data................................................................................................10-13 10.5 Collecting NM Log File............................................................................................................................10-15 10.6 Reference for Data Management Interfaces..............................................................................................10-16 10.6.1 Interface Description: Backup Management....................................................................................10-17 10.6.2 Interface Description: Log Information Collector............................................................................10-17 10.6.3 Parameters for Collecting NM Logs Parameters..............................................................................10-18 10.6.4 Parameter Description of the Fields in the Backup and Restore Task List......................................10-20 10.6.5 Parameters for NE Backup File........................................................................................................10-21 10.6.6 Parameters for NM Backup File.......................................................................................................10-21 10.6.7 Parameters for Creating the Data Collection Task for Neighbor Cell Optimization.......................10-22 10.6.8 Parameters for Creating a Task of Collecting the Uplink ARFCN Data.........................................10-24

11 Dual-Homing and LN Domain Management...................................................................11-1


11.1 Basic Knowledge.........................................................................................................................................11-2 11.1.1 Dual-Homing......................................................................................................................................11-2 11.1.2 Local Network Domain......................................................................................................................11-3 11.2 Managing the Dual-Homing........................................................................................................................11-4 11.2.1 Checking the Dual-Homing Information........................................................................................... 11-5 11.2.2 Checking the Dual-Homing Data.......................................................................................................11-5 xvi Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

11.2.3 Setting the Attributes for Data Check Interface.................................................................................11-6 11.2.4 Saving the Audit Result of Dual-Homing Data.................................................................................11-7 11.2.5 Generating the Script for Adjusting Difference Data.........................................................................11-8 11.2.6 Delivering the MML Command.........................................................................................................11-9 11.2.7 Synchronizing the Dual-Homing Data.............................................................................................11-10 11.3 Managing the Local Network Domain......................................................................................................11-11 11.3.1 Creating a Local Network Domain..................................................................................................11-12 11.3.2 Managing Local Network Resources...............................................................................................11-12 11.3.3 Managing Users in the Local Network Domain...............................................................................11-12 11.3.4 Managing NEs in the Local Network Domain.................................................................................11-13 11.3.5 Modifying the Name of Local Network Domain.............................................................................11-14 11.3.6 Synchronizing the Information of Local NE Domain......................................................................11-14 11.3.7 Deleting Local Network Domain.....................................................................................................11-15 11.3.8 Instances of Area-Based Privilege Configuration............................................................................11-16 11.4 Reference for Management of Dual-Homing and Local Network Domain Interfaces.............................11-16 11.4.1 Interface Description: Managing the Dual-Homing.........................................................................11-17 11.4.2 Interface Description: Checking the Dual-Homing Data.................................................................11-18 11.4.3 Interface Description: Managing the Local Network Element Domain...........................................11-19

12 MSC Pool Management........................................................................................................12-1


12.1 Basic Knowledge of MSC Pool..................................................................................................................12-3 12.1.1 Basic Scheme of MSC Pool...............................................................................................................12-3 12.1.2 Load balance scheme of MSC Pool...................................................................................................12-5 12.1.3 Transfer Scheme of MSC Pool Users................................................................................................12-7 12.1.4 MSC Pool Networking Application.................................................................................................12-10 12.1.5 User Authority Management of the MSC Pool................................................................................12-11 12.2 Creating MSC Pool Topology on the M2000...........................................................................................12-13 12.3 Initial Configuration of MSC Pool............................................................................................................12-15 12.3.1 Setting an Alarm for MSC Pool Load Imbalance............................................................................12-15 12.3.2 Creating the Task of Auto-Checking MSC Pool..............................................................................12-16 12.3.3 Setting the Attributes of MSC Pool..................................................................................................12-18 12.4 Routine Maintenance of MSC Pool..........................................................................................................12-36 12.4.1 Viewing the Alarms of MSC Pool...................................................................................................12-37 12.4.2 Monitoring the Load of MSC Pool in Real Time.............................................................................12-40 12.4.3 Viewing the Operation Logs of MSC Pool......................................................................................12-42 12.4.4 Viewing the MSC Where a Specific User Is Located......................................................................12-43 12.4.5 Viewing the Relation Between the MGW and the RAN..................................................................12-44 12.4.6 Viewing the Proxy Relation Between the MGW and the RAN.......................................................12-44 12.4.7 Displaying MSC Pool Topology......................................................................................................12-45 12.4.8 Managing the Task of Auto-Checking MSC Pool...........................................................................12-45 12.4.9 Viewing the MSC Pool Performance Report...................................................................................12-47 12.5 MSC Pool Network Maintenance.............................................................................................................12-48 12.5.1 Balancing MSC Pool Load...............................................................................................................12-48 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xvii

Contents

M2000 Operator Guide 12.5.2 Checking MSC Pool Data................................................................................................................12-54

12.6 Management Interface of MSC Pool.........................................................................................................12-60 12.6.1 Interface Description: Main Interface of Pool OM..........................................................................12-62 12.6.2 Interface Description: Viewing MSC Pool Alarms..........................................................................12-65 12.6.3 Interface Description: MSC Pool Configuration..............................................................................12-66 12.6.4 Parameters for Creating/Modifying MSC Pool................................................................................12-68 12.6.5 Parameters for Browsing MSC Pool Basic Information..................................................................12-69 12.6.6 Parameters for Viewing the Connection Between MGW and RAN................................................12-70 12.6.7 Parameters for Transferring MSC Pool Users Manually.................................................................12-70 12.6.8 Parameters for Specifying User Numbers to Be Transferred...........................................................12-73 12.6.9 Parameters for Setting the Auto-Check of MSC Pool......................................................................12-74 12.6.10 Parameters for Setting CN ID of an MSC Server..........................................................................12-75 12.6.11 Parameters for Setting NRI of an MSC Pool.................................................................................12-76 12.6.12 Parameters for Setting Non-Broadcast LAI of an MSC Pool........................................................12-77 12.6.13 Parameters for Setting Load-Balancing of an MSC Pool..............................................................12-77 12.6.14 Parameters for Setting NE State of MSC Pool...............................................................................12-79 12.6.15 Parameters for Superior Settings....................................................................................................12-80 12.6.16 Parameters for Setting Load Unbalance Alarm..............................................................................12-81

13 CDMA Pool Management....................................................................................................13-1


13.1 Basic Knowledge of CDMA Pool...............................................................................................................13-3 13.1.1 Basic Scheme of CDMA Pool............................................................................................................13-3 13.1.2 Load Balancing Scheme of CDMA Pool...........................................................................................13-5 13.1.3 Transfer Scheme of CDMA Pool Users.............................................................................................13-6 13.1.4 CDMA Pool Networking Application................................................................................................13-6 13.1.5 User Authority Management of the CDMA Pool..............................................................................13-7 13.2 Creating CDMA Pool..................................................................................................................................13-9 13.3 Initial Configuration of CDMA Pool........................................................................................................13-11 13.3.1 Setting an Alarm for CDMA Pool Load Imbalance.........................................................................13-11 13.3.2 Creating the Task of Auto-Checking CDMA Pool..........................................................................13-12 13.3.3 Setting the Parameters of CDMA Pool............................................................................................13-14 13.4 Commissioning the CDMA Pool Network...............................................................................................13-20 13.5 Routine Maintenance of CDMA Pool.......................................................................................................13-20 13.5.1 Viewing the Alarms of CDMA Pool................................................................................................13-21 13.5.2 Monitoring the Load of CDMA Pool in Real Time.........................................................................13-24 13.5.3 Viewing the Operation Logs of CDMA Pool...................................................................................13-27 13.5.4 Viewing the MSCe Where a Specific User Is Located....................................................................13-27 13.5.5 Displaying CDMA Pool Topology..................................................................................................13-29 13.5.6 Managing the Task of Auto-Checking CDMA Pool........................................................................13-29 13.5.7 Viewing the CDMA Pool Performance Report................................................................................13-31 13.6 CDMA Pool Network Maintenance..........................................................................................................13-32 13.6.1 Balancing CDMA Pool Load...........................................................................................................13-32 13.6.2 Checking CDMA Pool Data.............................................................................................................13-36 xviii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

13.7 Management Interface of CDMA Pool.....................................................................................................13-42 13.7.1 Interface Description: Main Interface of Pool OM..........................................................................13-43 13.7.2 Interface Description: Viewing CDMA Pool Alarms......................................................................13-47 13.7.3 Interface Description: CDMA Pool Configuration..........................................................................13-48 13.7.4 Parameters for Creating/Modifying CDMA Pool............................................................................13-49 13.7.5 Parameters for Browsing the Basic Information About the CDMA Pool........................................13-50 13.7.6 Parameters for Setting the Auto-Check of CDMA Pool..................................................................13-51 13.7.7 Parameters for Setting MSCe Server ID of CDMA Pool.................................................................13-52 13.7.8 Parameters for Setting Load Balancing of CDMA Pool..................................................................13-53 13.7.9 Parameters for Setting NE State of CDMA Pool.............................................................................13-54 13.7.10 Parameters for Setting Load Unbalance Alarm of CDMA Pool....................................................13-55

14 Integrated Task Management..............................................................................................14-1


14.1 Basic Knowledge.........................................................................................................................................14-3 14.1.1 Types of Integrated Tasks..................................................................................................................14-3 14.1.2 System Timing Tasks.........................................................................................................................14-7 14.1.3 User Timing Tasks.............................................................................................................................14-9 14.1.4 Task Scheduling Parameters............................................................................................................14-10 14.1.5 States of a Scheduled Task...............................................................................................................14-11 14.1.6 Customizing the Interface for Managing Timing Tasks..................................................................14-12 14.2 Creating Timing Tasks for Users..............................................................................................................14-13 14.2.1 Creating MML Command Script.....................................................................................................14-14 14.2.2 Creating Software Download...........................................................................................................14-16 14.2.3 Creating NE Backup.........................................................................................................................14-17 14.2.4 Creating CME Upload......................................................................................................................14-18 14.2.5 Creating CME Download.................................................................................................................14-19 14.2.6 Creating HSL Script.........................................................................................................................14-20 14.2.7 Creating Dual-Home Management..................................................................................................14-22 14.2.8 Copying User Timing.......................................................................................................................14-24 14.3 Modifying Timing Tasks for Users...........................................................................................................14-24 14.3.1 Modifying MML Command Script..................................................................................................14-25 14.3.2 Modifying Software Download........................................................................................................14-26 14.3.3 Modifying NE Backup.....................................................................................................................14-27 14.3.4 Modifying CME Upload..................................................................................................................14-28 14.3.5 Modifying CME Download.............................................................................................................14-28 14.3.6 Modifying HSL Script......................................................................................................................14-29 14.3.7 Modifying Dual-Home Management...............................................................................................14-30 14.4 Modifying Data Synchronization..............................................................................................................14-31 14.4.1 Modifying NE Alarm Synchronization............................................................................................14-32 14.4.2 Modifying the Synchronization of NE Configuration Data.............................................................14-33 14.4.3 Modifying the Synchronization of NE Log......................................................................................14-34 14.4.4 Modifying the Synchronization of Inventory Data..........................................................................14-34 14.5 Modifying Database Capacity...................................................................................................................14-35 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xix

Contents

M2000 Operator Guide 14.5.1 Modifying the Capacity of Operation Log Database.......................................................................14-36 14.5.2 Modifying the Capacity of System Log Database...........................................................................14-37 14.5.3 Modifying the Capacity of Security Log Database..........................................................................14-37 14.5.4 Modifying the Capacity of NE Operation Log Database.................................................................14-38 14.5.5 Modifying the Capacity of NE Security Log Database....................................................................14-39 14.5.6 Modifying the Capacity of Alarm Database.....................................................................................14-40 14.5.7 Modifying the Capacity of Performance Database..........................................................................14-41

14.6 Modifying Data Export.............................................................................................................................14-41 14.6.1 Modifying the Export of Performance Data.....................................................................................14-43 14.6.2 Modifying the Export of Alarm Data...............................................................................................14-44 14.6.3 Modifying the Export of Configuration Data...................................................................................14-45 14.6.4 Modifying the Export of Operation Log..........................................................................................14-46 14.6.5 Modifying the Export of System Log..............................................................................................14-47 14.6.6 Modifying the Export of Security Log.............................................................................................14-48 14.6.7 Modifying the Export of NE Operation Log....................................................................................14-49 14.6.8 Modifying the Export of NE Security Log.......................................................................................14-49 14.6.9 Modifying the Export of Inventory Data..........................................................................................14-50 14.6.10 Modifying the Export of Basic NE Information............................................................................14-51 14.7 Modifying Data Backup in the M2000.....................................................................................................14-52 14.8 Modifying Alarm Timing Acknowledgement...........................................................................................14-53 14.9 Modifying NE License Sharing Management...........................................................................................14-54 14.10 Managing Timing Tasks..........................................................................................................................14-55 14.10.1 Deleting Timing Tasks...................................................................................................................14-56 14.10.2 Suspending Timing Tasks..............................................................................................................14-56 14.10.3 Resuming Timing Tasks.................................................................................................................14-57 14.10.4 Cancelling Timing Tasks...............................................................................................................14-57 14.10.5 Setting Time of Timing Tasks........................................................................................................14-58 14.10.6 Browsing CME Subtask.................................................................................................................14-59 14.10.7 Setting Period of CME Subtask.....................................................................................................14-59 14.10.8 Terminating Descendant Tasks......................................................................................................14-60 14.10.9 Rolling Back Descendant Tasks.....................................................................................................14-61 14.11 Browsing the Information of Timing Tasks............................................................................................14-61 14.12 Checking the Task Progress....................................................................................................................14-62 14.13 Checking the Task Execution..................................................................................................................14-62 14.14 Downloading Result Files.......................................................................................................................14-63 14.15 Reference for Integrated Task Management Interfaces..........................................................................14-65 14.15.1 Interface Description: Managing Timing Tasks.............................................................................14-67 14.15.2 Parameters for Setting Filtering Conditions...................................................................................14-69 14.15.3 Parameters for Creating/Copying Common Information...............................................................14-69 14.15.4 Parameters for Setting Common Information................................................................................14-70 14.15.5 Parameters for Setting Common Information for CME Download Tasks.....................................14-71 14.15.6 Parameters for Creating/Copying Time Settings for Scheduled Tasks..........................................14-71 xx Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Contents

14.15.7 Parameters for Creating/Copying Time Settings for One-Off Tasks.............................................14-72 14.15.8 Parameters for Creating/Modifying/Copying MML Command Script..........................................14-73 14.15.9 Parameters for Creating/Modifying Software Download..............................................................14-74 14.15.10 Parameters for Creating/Modifying/Copying NE Backup...........................................................14-74 14.15.11 Parameters for Creating/Modifying/Copying CME Upload........................................................14-75 14.15.12 Parameters for Modifying the Synchronization of NE Configuration Data ................................14-75 14.15.13 Parameters for Modifying the Synchronization of Inventory Data..............................................14-76 14.15.14 Parameters for Creating/Modifying CME Download..................................................................14-76 14.15.15 Parameters for Creating/Modifying/Copying HSL Script...........................................................14-77 14.15.16 Parameters for Creating/Modifying/Copying Dual-Home Management.....................................14-77 14.15.17 Parameters for Modifying Alarm Timing Acknowledgement.....................................................14-78 14.15.18 Parameters for Modifying Database Capacity..............................................................................14-79 14.15.19 Parameters for Modifying the Export of Alarm Data...................................................................14-80 14.15.20 Parameters for Modifying the Export of Configuration Data......................................................14-81 14.15.21 Parameters for Modifying the Export of NE Log........................................................................14-83 14.15.22 Parameters for Modifying the Export of Operation Log..............................................................14-83 14.15.23 Parameters for Modifying the Export of Performance Data........................................................14-84 14.15.24 Parameters for Modifying the Export of Inventory Data.............................................................14-85 14.15.25 Parameters for Modifying Data Backup in the M2000................................................................14-85 14.15.26 Parameters for Setting Time of Timing Tasks.............................................................................14-86 14.15.27 Parameters for Browsing CME Subtask.......................................................................................14-87 14.15.28 Parameters for Setting Period of CME Subtask...........................................................................14-88

15 NE Commissioning................................................................................................................15-1
15.1 Managing a NodeB Commissioning Project...............................................................................................15-2 15.1.1 NodeB Commissioning Items............................................................................................................ 15-2 15.1.2 Creating a NodeB Commissioning Project........................................................................................ 15-3 15.1.3 Viewing the NodeB Commissioning Progress...................................................................................15-5 15.1.4 Adjusting the Commissioning Object................................................................................................15-6 15.1.5 Deleting an NE Commissioning Task................................................................................................15-7 15.1.6 Starting/Stopping a NodeB Commissioning Task............................................................................. 15-7 15.2 Obtaining the NodeB Commissioning Report............................................................................................ 15-8 15.3 Reuploading the NE Configuration File......................................................................................................15-9 15.4 Reference to the NE Commissioning Interface...........................................................................................15-9 15.4.1 Interface Description: Viewing the NodeB Commissioning Progress.............................................15-10 15.4.2 Parameter for Creating an NodeB Commissioning Project.............................................................15-11 15.4.3 Parameter for Selecting the Path to the Configuration File..............................................................15-12

16 NE Maintenance Enhanced Management.........................................................................16-1


16.1 Upgrading the Version of Enhanced NE Maintenance...............................................................................16-2 16.2 Equipment Management............................................................................................................................. 16-3 16.3 Tracing Management...................................................................................................................................16-3 16.4 Monitoring Management.............................................................................................................................16-3 16.5 Realtime Performance Monitoring Management........................................................................................16-3 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xxi

Contents

M2000 Operator Guide

17 FAQ...........................................................................................................................................17-1
17.1 Why Cannot I Log In to the Client?............................................................................................................17-3 17.1.1 Prompt "Login failed. Confirm that your user name and password are case sensitive and correct." .......................................................................................................................................................................17-3 17.1.2 Prompt "Invalid user account." .........................................................................................................17-4 17.1.3 Prompt "Invalid login duration."........................................................................................................17-4 17.1.4 Prompt "Invalid password." ..............................................................................................................17-5 17.1.5 Prompt "The password has expired. Please change your password!"................................................17-5 17.1.6 Prompt "Maintenance Mode." ...........................................................................................................17-5 17.1.7 Prompt "The User Has Reached the Maximum Login Attempts. The User Account Has Been Locked, and It Can Be Unlocked in 1 Minute."..........................................................................................................17-6 17.1.8 Prompt "The Server Doesn't Exist or Service Is Not Running."........................................................17-6 17.1.9 Prompt "Exceed Maximum Sessions."...............................................................................................17-7 17.1.10 Prompt "Loading Module Failed, System Will Exit."......................................................................17-7 17.1.11 Prompt "Failed to Log in to the Server after the Auto Client Upgrade or Running Exception" .......................................................................................................................................................................17-7 17.2 Why Does the Client Abort?.......................................................................................................................17-8 17.3 Why Can't the Client Work?.......................................................................................................................17-8 17.4 Why Is the Client Interface Abnormal?......................................................................................................17-9 17.5 Why Is the Connection Between Client and Server Discontinuous?..........................................................17-9 17.6 Why Can't a Topology View Be Refreshed?............................................................................................17-10 17.7 Why Does the Automatic NodeB Search Fail?.........................................................................................17-11 17.8 Why Is the Name of a New Topology Object a Repeat One?...................................................................17-11 17.9 Why Cannot Creating/Deleting an NE /Be Completed after a Long Time?.............................................17-11 17.10 Why Does a Real-Time Print Delay?......................................................................................................17-12 17.11 Why Can't Alarm Notifications by SMS Be Received?..........................................................................17-13 17.12 How to select or unselect multiple nodes?..............................................................................................17-13

18 Terms, Acronyms, and Abbreviations...............................................................................18-1


18.1 Terms...........................................................................................................................................................18-2 18.2 Abbreviations..............................................................................................................................................18-2

Index.................................................................................................................................................i-1

xxii

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

Figures

Figures
Figure 1-1 Process of login authentication...........................................................................................................1-5 Figure 1-2 M2000 client interface......................................................................................................................1-29 Figure 1-3 Organization tree..............................................................................................................................1-36 Figure 1-4 Status table........................................................................................................................................1-37 Figure 1-5 Time parameter.................................................................................................................................1-38 Figure 1-6 Others................................................................................................................................................1-39 Figure 2-1 Model of the fault Alarm status conversion.......................................................................................2-6 Figure 2-2 Alarm reporting procedure.................................................................................................................2-9 Figure 2-3 Fault handling procedure..................................................................................................................2-30 Figure 2-4 Alarm Board Icon.............................................................................................................................2-40 Figure 2-5 Alarm Board.....................................................................................................................................2-41 Figure 2-6 Model of WRAN configured objects..............................................................................................2-109 Figure 2-7 Highlighting Alarms.......................................................................................................................2-151 Figure 2-8 Color settings..................................................................................................................................2-151 Figure 2-9 Sound settings.................................................................................................................................2-152 Figure 2-10 Alarm Board.................................................................................................................................2-152 Figure 2-11 Alarm Box....................................................................................................................................2-153 Figure 2-12 Remote Notification interface.......................................................................................................2-154 Figure 2-13 Simple correlation rule.................................................................................................................2-155 Figure 2-14 Advanced alarm correlation rule..................................................................................................2-155 Figure 2-15 Alarm Filtering interface..............................................................................................................2-156 Figure 2-16 Automatic Acknowledgement......................................................................................................2-157 Figure 2-17 Knowledge and Explanation.........................................................................................................2-158 Figure 2-18 Alarm Level Redefinition.............................................................................................................2-158 Figure 2-19 NE Alarm Settings dialog box......................................................................................................2-159 Figure 2-20 Alarm Query.................................................................................................................................2-160 Figure 2-21 Alarm statistics interface..............................................................................................................2-160 Figure 2-22 Performance Monitor interface-1.................................................................................................2-161 Figure 2-23 Performance Monitor interface-2.................................................................................................2-162 Figure 2-24 Performance Monitor interface-3.................................................................................................2-163 Figure 2-25 Object Group Manager interface..................................................................................................2-163 Figure 2-26 RAN network monitoring.............................................................................................................2-164 Figure 2-27 Monitoring panel..........................................................................................................................2-165 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xxiii

Figures

M2000 Operator Guide Figure 2-28 System Monitor Browser interface...............................................................................................2-166

Figure 3-1 An example of CSV templates.........................................................................................................3-31 Figure 3-2 NE Property......................................................................................................................................3-38 Figure 3-3 Process for moving a NodeB in the same RNC................................................................................3-42 Figure 3-4 Process for moving a NodeB to another RNC..................................................................................3-44 Figure 3-5 Main Topology interface.................................................................................................................3-61 Figure 3-6 NodeB Re-Parent interface...............................................................................................................3-70 Figure 4-1 Security Management Interface.....................................................................................................4-52 Figure 4-2 NE User Management Interface.....................................................................................................4-53 Figure 4-3 NE Login Management Interface...................................................................................................4-54 Figure 4-4 OM User Binded NE Tab................................................................................................................4-55 Figure 4-5 NE Type Rules Tab..........................................................................................................................4-56 Figure 4-6 OM User Monitor Tab....................................................................................................................4-57 Figure 4-7 Local Maintenance MonitorTab....................................................................................................4-58 Figure 5-1 Process for reporting NE logs through the FTP server.......................................................................5-4 Figure 5-2 Process for reporting NE logs rather than through the FTP server.....................................................5-6 Figure 5-3 Log management interface...............................................................................................................5-21 Figure 6-1 Levels of measurement counters........................................................................................................6-5 Figure 6-2 Procedure of performance measurement............................................................................................6-8 Figure 6-3 Query result interface - 1..................................................................................................................6-49 Figure 6-4 Query result interface - 2..................................................................................................................6-49 Figure 6-5 Query result interface - 3..................................................................................................................6-50 Figure 6-6 Measure management interface - 1...................................................................................................6-51 Figure 6-7 Measure management interface - 2...................................................................................................6-51 Figure 6-8 Threshold management interface......................................................................................................6-52 Figure 6-9 User-defined counter management interface....................................................................................6-53 Figure 7-1 KPI list..............................................................................................................................................7-86 Figure 8-1 State transition of a patch...................................................................................................................8-3 Figure 8-2 Server tab File Structure of NodeB ...................................................................................................8-5 Figure 8-3 Server tab File Structure of Other NEs..............................................................................................8-5 Figure 8-4 NE tab File Structure of NodeB.........................................................................................................8-6 Figure 8-5 NE tab File Structure of Other NEs....................................................................................................8-6 Figure 8-6 Flow chart of software management...................................................................................................8-7 Figure 8-7 Software management networking.....................................................................................................8-8 Figure 8-8 Process for checking NE licenses.....................................................................................................8-88 Figure 8-9 Software Browser interface under the Server tab.............................................................................8-94 Figure 8-10 Software browser interface under the NE tab.................................................................................8-95 Figure 8-11 Interface of NE license sharing management.................................................................................8-96 Figure 8-12 Interface of license management in the RAN system.....................................................................8-98 Figure 9-1 MML Command interface on the client...........................................................................................9-71 Figure 9-2 Follow-Up Reports Browser Interface..............................................................................................9-72 Figure 9-3 MIT browsing interface....................................................................................................................9-73 xxiv Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

Figures

Figure 9-4 Inventory management interface......................................................................................................9-74 Figure 9-5 Client window of the GBSS device panel........................................................................................9-75 Figure 9-6 Setting search conditions..................................................................................................................9-81 Figure 9-7 Search results....................................................................................................................................9-82 Figure 10-1 Backup Management Interface.....................................................................................................10-17 Figure 10-2 Log Information Collector interface.............................................................................................10-18 Figure 11-1 Dual Homing window (for 1+1 mutual-aid networking mode)..................................................11-17 Figure 11-2 Dual Homing window (for 1+1 active/standby networking mode).............................................11-18 Figure 11-3 Dual Homing window (for N+1 active/standby networking mode)............................................11-18 Figure 11-4 The Consistency Check tab page..................................................................................................11-19 Figure 11-5 Interface for managing the local network element domain..........................................................11-20 Figure 12-1 Networking of the MSC Pool.........................................................................................................12-4 Figure 12-2 Load balancing principle................................................................................................................12-6 Figure 12-3 TMSI Structure.............................................................................................................................12-23 Figure 12-4 Load balancing principle..............................................................................................................12-50 Figure 12-5 Main Interface of MSC Pool OM...............................................................................................12-62 Figure 12-6 Main Interface of CDMA Pool OM...........................................................................................12-64 Figure 12-7 Alarm Viewing interface of the MSC Pool..................................................................................12-66 Figure 12-8 Pool Parameter Setting interface................................................................................................12-67 Figure 13-1 Networking of the CDMA Pool......................................................................................................13-4 Figure 13-2 Main Interface of MSC Pool OM...............................................................................................13-43 Figure 13-3 Main Interface of CDMA Pool OM...........................................................................................13-45 Figure 13-4 Interface for viewing the CDMA Pool alarms..............................................................................13-47 Figure 13-5 CDMA Pool parameter setting interface......................................................................................13-48 Figure 14-1 State transition of a scheduled task...............................................................................................14-12 Figure 14-2 Timing Task Management interface.............................................................................................14-68 Figure 15-1 NodeB Commissioning interface................................................................................................15-10 Figure 17-1 The connection fails between the client and the server..................................................................17-9 Figure 17-2 Check box arrange style 1............................................................................................................17-13 Figure 17-3 Selected check boxes style 1.........................................................................................................17-14 Figure 17-4 Selected check boxes style 2.........................................................................................................17-14 Figure 17-5 Check box arrange style 2............................................................................................................17-14 Figure 17-6 Selected check boxes style 3.........................................................................................................17-14

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

xxv

M2000 Operator Guide

Tables

Tables
Table 1-1 Parameters..........................................................................................................................................1-29 Table 1-2 Menu bar............................................................................................................................................1-30 Table 1-3 System management tool buttons.......................................................................................................1-32 Table 1-4 Description of the fault management tool..........................................................................................1-33 Table 1-5 Buttons of the performance management tool...................................................................................1-33 Table 1-6 Descriptions of software management tool buttons...........................................................................1-34 Table 1-7 Descriptions of the configuration management tool buttons.............................................................1-34 Table 1-8 Descriptions of integrated task management tool buttons.................................................................1-35 Table 2-1 Differences between fault alarms and event alarms.............................................................................2-7 Table 2-2 Examples..............................................................................................................................................2-7 Table 2-3 Complete procedure for creating a user...............................................................................................2-8 Table 2-4 Fault handling procedure....................................................................................................................2-31 Table 2-5 MSC server performance monitoring counters..................................................................................2-79 Table 2-6 RNC performance monitoring counters.............................................................................................2-83 Table 2-7 BSC performance monitoring counters..............................................................................................2-84 Table 2-8 BSC6000 performance monitoring counters......................................................................................2-85 Table 2-9 GGSN80 performance monitoring counters......................................................................................2-85 Table 2-10 SGSN performance monitoring counter on the MML interface......................................................2-87 Table 2-11 SGSN performance monitoring counter on the FTP MML interface..............................................2-88 Table 2-12 HLR performance monitoring counters...........................................................................................2-90 Table 2-13 PCU performance monitoring counters...........................................................................................2-90 Table 2-14 iMSC performance monitoring counters..........................................................................................2-90 Table 2-15 MSC Pool performance monitoring counters..................................................................................2-91 Table 2-16 CDMA Pool performance monitoring counters...............................................................................2-91 Table 2-17 System Task.....................................................................................................................................2-98 Table 2-18 RNC Monitoring Counters.............................................................................................................2-110 Table 2-19 Cell Monitoring Counters..............................................................................................................2-112 Table 2-20 Description of the tabs i the NE Alarm Settings dialog box..........................................................2-159 Table 2-21 Description of the monitoring panel..............................................................................................2-165 Table 2-22 Functions of tabs on the system monitor browser interface...........................................................2-166 Table 2-23 Parameters related to the settings of alarm statistics .....................................................................2-226 Table 2-24 Parameters related to alarm statistics by levels .............................................................................2-227 Table 2-25 Parameters related to alarm statistics by IDs.................................................................................2-227 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xxvii

Tables

M2000 Operator Guide Table 2-26 Parameters related to alarm statistics on a TopN basis .................................................................2-228 Table 2-27 Parameters about the information on basic configuration of the RNC object group.....................2-228 Table 2-28 Parameters about the information on basic configuration of object groups...................................2-229 Table 2-29 Parameters about the information on the Iu/Iur interface..............................................................2-229 Table 2-30 Parameters about the information on specified links of the Iu/Iur interface..................................2-230 Table 2-31 Basic parameters of the Iub interface.............................................................................................2-230 Table 2-32 Basic parameters of the Iub interface.............................................................................................2-231 Table 2-33 Parameters about E1T1 status........................................................................................................2-232 Table 2-34 Parameters about the distribution of NodeB and cells on the RNC...............................................2-233 Table 2-35 Parameters about the information on basic configuration of object groups...................................2-233 Table 2-36 Parameters related to the basic configuration of a cell...................................................................2-234 Table 2-37 Parameters related to the basic configuration of the common channel in a cell............................2-236 Table 2-38 Parameters related to intra-frequency neighboring cells................................................................2-238 Table 2-39 Parameters related to inter-frequency neighboring cells................................................................2-239 Table 2-40 Parameters related to GSM neighboring cells................................................................................2-241 Table 2-41 Parameters related to NodeB and cell statistics ............................................................................2-242 Table 2-42 Parameters for searching for monitored objects.............................................................................2-242 Table 3-1 Network devices categorized according to their home networks.......................................................3-13 Table 3-2 Categorize According to Service Functions.......................................................................................3-15 Table 3-3 NEs categorized according to the supported functions......................................................................3-18 Table 3-4 Basic NE information.........................................................................................................................3-20 Table 3-5 Description of the Physical Topology interface.................................................................................3-61 Table 3-6 Description of topology legends........................................................................................................3-62 Table 3-7 Description of NE connection states..................................................................................................3-63 Table 3-8 Samples of alarm states......................................................................................................................3-64 Table 3-9 Samples of alarm states......................................................................................................................3-64 Table 3-10 Description of the topology tool bar................................................................................................3-65 Table 3-11 Description of the shortcut menu.....................................................................................................3-67 Table 3-12 Description of the NodeB Re-Parent interface.................................................................................3-70 Table 4-1 Impact of ESN and license on Maximum Sessions............................................................................4-8 Table 4-2 Simple process for creating OM users...............................................................................................4-17 Table 4-3 Complete Process for Creating OM Users.........................................................................................4-18 Table 4-4 Examples of user sessions..................................................................................................................4-45 Table 4-5 Impact of ESN and license on Maximum Sessions..........................................................................4-45 Table 4-6 NE User Management Interface Description...................................................................................4-53 Table 5-1 Parameters related to NE operation logs............................................................................................5-24 Table 5-2 Parameters Related to NE security logs.............................................................................................5-25 Table 5-3 Parameters for querying NE operation logs.......................................................................................5-36 Table 5-4 Parameters for querying NE security logs.........................................................................................5-37 Table 6-1 Description of the options under Query Result................................................................................6-20 Table 6-2 Interface description...........................................................................................................................6-50 Table 6-3 Interface description...........................................................................................................................6-52

xxviii

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

Tables

Table 6-4 Interface description...........................................................................................................................6-52 Table 6-5 Interface description...........................................................................................................................6-53 Table 6-6 Simple Threshold Parameters............................................................................................................6-57 Table 6-7 Counter Measurement Status.............................................................................................................6-63 Table 6-8 Object measurement status.................................................................................................................6-63 Table 8-1 Mapping relationship between NEs and files.......................................................................................8-4 Table 8-2 Scheduled download template............................................................................................................8-22 Table 8-3 Scheduled activation template............................................................................................................8-22 Table 8-4 Concepts related to license sharing....................................................................................................8-80 Table 8-5 Process for checking NE licenses......................................................................................................8-88 Table 8-6 Interface description...........................................................................................................................8-94 Table 8-7 File type..............................................................................................................................................8-94 Table 8-8 Interface description of NE license sharing management..................................................................8-96 Table 8-9 Interface description of license management in the RAN system.....................................................8-99 Table 8-10 Parameters of RNC patch.................................................................................................................8-99 Table 8-11 Parameters used to upgrade NE software and patches...................................................................8-100 Table 8-12 NE data...........................................................................................................................................8-101 Table 8-13 Parameters related to the NodeB software upgrade.......................................................................8-103 Table 8-14 NodeB license list.......................................................................................................................... 8-105 Table 8-15 NodeB license distribution list.......................................................................................................8-105 Table 8-16 File transfer parameters..................................................................................................................8-106 Table 9-1 NE Resource States..............................................................................................................................9-4 Table 9-2 Operations supported by the CBSC board...........................................................................................9-5 Table 9-3 Operations supported by the CBTS board...........................................................................................9-7 Table 9-4 Link types matching the NE link reports...........................................................................................9-15 Table 9-5 Resetting parameters in the A2 circuit...............................................................................................9-53 Table 9-6 Operating and maintaining the EMUA..............................................................................................9-66 Table 9-7 Operating and maintaining the PSU...................................................................................................9-68 Table 9-8 Operating and maintaining the PSU (DC/DC)...................................................................................9-69 Table 9-9 Description of the MIT Browsing interface.......................................................................................9-73 Table 9-10 Description of the interface management interface..........................................................................9-74 Table 9-11 Descriptions of the parameters for real-time monitoring of NE resources......................................9-76 Table 9-12 Descriptions of the parameters for configuring MML Command Client.........................................9-77 Table 9-13 Parameters for querying NE configuration......................................................................................9-78 Table 9-14 Parameters for querying the resource status of the NEs...................................................................9-79 Table 9-15 Descriptions of the parameters in the NE statistic report.................................................................9-79 Table 9-16 Parameters for querying the board information...............................................................................9-82 Table 9-17 Parameters for querying the subsystem status.................................................................................9-83 Table 9-18 Parameters for querying the clock status..........................................................................................9-85 Table 9-19 Parameters for querying A2 circuit status........................................................................................9-86 Table 9-20 Parameters for querying PCF or BSC buffer usage.........................................................................9-87 Table 9-21 Parameters for querying the DSP information.................................................................................9-87 Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xxix

Tables

M2000 Operator Guide Table 9-22 Parameters for querying the EVC timeslot occupancy....................................................................9-88 Table 9-23 Parameters for querying the L interface channel.............................................................................9-88 Table 9-24 Parameters for downloading the BTS software or data....................................................................9-89 Table 9-25 Parameters for blocking the BTS CPM board..................................................................................9-89 Table 9-26 Parameters for querying the BTS Ethernet IP address.....................................................................9-90 Table 9-27 Parameters for querying the FE port information............................................................................9-90 Table 10-1 Fields in the backup and restore task list.......................................................................................10-20 Table 10-2 Parameters for backing up NE files...............................................................................................10-21 Table 10-3 Parameters used for backing up the M2000 files...........................................................................10-21 Table 11-1 Interface description.......................................................................................................................11-19 Table 12-1 Basic concepts concerning the MSC Pool.......................................................................................12-4 Table 12-2 Load balance scheme of MSC Pool.................................................................................................12-5 Table 12-3 Principles of user transfer.................................................................................................................12-8 Table 12-4 Scenarios of MSC Pool..................................................................................................................12-10 Table 12-5 MSC Pool operation settings..........................................................................................................12-12 Table 12-6 MSC Pool operation rights list.......................................................................................................12-12 Table 12-7 Parameters of Pool attributes.........................................................................................................12-19 Table 12-8 Description of the operations.........................................................................................................12-28 Table 12-9 Real-time monitoring counters.......................................................................................................12-42 Table 12-10 Load balance scheme of MSC Pool.............................................................................................12-49 Table 12-11 Transfer Mode..............................................................................................................................12-51 Table 12-12 Description of the Main Interface of MSC Pool OM.................................................................12-62 Table 12-13 Description of the Main Interface of CDMA Pool OM.............................................................12-64 Table 12-14 Pool Parameter Setting interface...............................................................................................12-67 Table 13-1 Basic concepts concerning the CDMA Pool....................................................................................13-5 Table 13-2 User block table................................................................................................................................13-6 Table 13-3 Scenarios of CDMA Pool.................................................................................................................13-7 Table 13-4 CDMA Pool Operation Settings.......................................................................................................13-8 Table 13-5 CDMA Pool Operation Rights List..................................................................................................13-8 Table 13-6 Parameters of CDMA Pool attributes............................................................................................13-15 Table 13-7 Real-time monitoring counters.......................................................................................................13-26 Table 13-8 User block table..............................................................................................................................13-33 Table 13-9 Manually transferring users............................................................................................................13-34 Table 13-10 Description of the Main Interface of MSC Pool OM.................................................................13-44 Table 13-11 Description of the Main Interface of CDMA Pool OM.............................................................13-45 Table 13-12 CDMA Pool parameter setting interface......................................................................................13-48 Table 14-1 Tasks divided according to execution period...................................................................................14-3 Table 14-2 Tasks divided according to functions...............................................................................................14-4 Table 14-3 Tasks divided according to task features..........................................................................................14-6 Table 14-4 System timing tasks..........................................................................................................................14-7 Table 14-5 User timing tasks..............................................................................................................................14-9 Table 14-6 Description of the task description parameters..............................................................................14-11

xxx

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

Tables

Table 14-7 Allowable operations for different task types................................................................................14-63 Table 14-8 Description of the Timing Task Management interface.................................................................14-68 Table 14-9 Descriptions of extended parameters............................................................................................. 14-80 Table 14-10 Extension parameters of NIC CMExport tasks............................................................................14-81 Table 14-11 Extension parameters of Configuration Data Export tasks..........................................................14-82 Table 14-12 Descriptions of extended parameters........................................................................................... 14-83 Table 14-13 Descriptions of extended parameters........................................................................................... 14-83 Table 14-14 Descriptions of extended parameters........................................................................................... 14-84 Table 14-15 Descriptions of extended parameters........................................................................................... 14-85 Table 14-16 Descriptions of parameters for setting timing task time.............................................................. 14-86 Table 14-17 Descriptions of CME subtask parameters....................................................................................14-87 Table 14-18 Descriptions of parameters of execution time of each period......................................................14-88 Table 15-1 NE commissioning items.................................................................................................................15-3

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

xxxi

M2000 Operator Guide

About This Document

About This Document

Purpose
This guide describes how to operate and maintain the network equipment.

Related Versions
The following table lists the product versions related to this document. Product Name M2000 Version V200R006

Intended Audience
The intended audiences of this document are:
l l

Network administrator Shift operator

Update History 06(2008-12-16)


Sixth formal release. Compared with V200R006 05(2008-09-26), the following content is modified. Context Integrated Task Management Data Management Description Add the contents related to NE Basic Information Export and NIC CM Export. Add the contents related to collecting network optimization data.

05(2008-09-26)
Fifth formal release. Compared with V200R006 04(2008-05-20), the following content is modified.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1

About This Document

M2000 Operator Guide

Context Data Management Monitoring NE Performance in Real Time Performance Management

Description Add the contents related to selecting storage medium for backup of M2000 data. Add the contents related to setting the triggering times for monitor threshold alarms. Add the contents related to adding class 3 objects in batches.

04(2008-05-20)
Fourth formal release. Compared with V200R006 03(2008-03-15), the following content is modified. Context Integrated Task Management FAQ Description Modified the contents related to MML Command Script task. Add the contents related to causes of running client failure.

03(2008-03-15)
Third formal release. Compared with V200R006 02(2008-01-08), the following content is modified. Context Getting Started Software Management CDMA Pool Management Description Add the contents related to login authentication. Add the contents related to NE license sharing. Add the contents related to CDMA Pool management.

02(2008-01-08)
Second formal release. Compared with V200R006 01(2007-10-17), the following content is modified. Context NE Commissioning Configuration Management Data Management
2

Description Add the contents related to NodeB commissioning. Add the contents related to IMS, C02 and WiMAX. Add the contents related to IMS.
Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

M2000 Operator Guide

About This Document

Context Fault Management Getting Started Integrated Network Monitoring Integrated Task Management Log Management Security Management Terms, Acronyms, and Abbreviations Topology Management Performance Management Software Management

Description Add the contents related to IMS. Add the contents related to IMS and WiMAX. Add the contents related to C02. Add the contents related to IMS. Add the contents related to IMS. Add the contents related to WiMAX. Add the contents related to WiMAX. Add the contents related to IMS, C02 and WiMAX. Add the contents related to IMS and C02. Add the contents related to IMS, C02 and WiMAX.

01(2007-10-17)
This is the first formal release.

Organization
1 Getting Started You can know the operation GUI of the M2000 client, how to log in to, log out of, lock, and unlock the client, how to set the broadcasting message, and how to modify the user password and customize the display style of the client. 2 Network Monitoring On the M2000 client, you can monitor the alarms on the network, real-time NE performances, the RAN network, and operational status of the NM system. In this way, you can detect network faults in time and then perform the related operations. 3 Topology Management Topology management offers the function of constructing and managing the topology structure of the whole network to display the networking situation and running status of the equipment. You can query and monitor the entire network operation in real time through the topology view. 4 Security Management This describes how to guarantee the security of the M2000. The M2000 security management manages the user and the user's rights. Through the security management, the security of the M2000 is guaranteed. 5 Log Management
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3

About This Document

M2000 Operator Guide

Log management involves the management of user logs, NE logs, and system logs. This function enables you to query logs and collect statistics of logs, thus helps monitoring and analyzing operational status of the system and troubleshooting. 6 Performance Management Through the performance measurement, you can measure and observe the security, the running status and the signaling connection status of the equipment, also you can measure and observe the utilization of the user and system resources. This function provides reliable data support for the measurement, designing and operation management of the communication network. The M2000 can measure the performance of multiple NEs. When an NE is successfully set up and communicates normally with the M2000, the NE automatically reports the measurement results of key performance counters to M2000 for data query and analysis based on a certain period. 7 Performance Report Management The M2000 provides the function of performance report management. You can set the query conditions of system reports and custom reports on the GUI. The M2000 can display the queried performance report on the report query interface. By analyzing the report data, you can obtain the information about the performance of each NE. You can also manage KPIs, such as create, modify, and delete KPIs on the KPI management interface. 8 Software Management By using the software management function, the M2000 performs integrated management of software , configuration data, and file information for NEs. The NEs that support this function are RNC, NodeB, MSC Server, MGW, GGSN, SGSN, BSC, BTS, and ASN-GW. 9 Configuration Management The M2000 provides the NE centralized management function. On the M2000 client, you can run the MML command or start the LMT of an NE to configure the NE. The NEs of class B and class C do not support the configuration of MML commands. 10 Data Management The M2000 manages both NE data and NM data. The management of NM data covers manually or periodically backing up NM data, and viewing NM backup files. The management of NE data covers manually or periodically backing up NE data, viewing NE backup files, restoring NE data, and collecting network optimization data. The M2000 also provides the function of collecting NM log files. 11 Dual-Homing and LN Domain Management This part describes the basic functions provided by dual-homing and local network domain management. 12 MSC Pool Management MSC Pool refers to a resource pool composed of MSC servers. The access network RNC/ BSC is connected to all the MSC servers in the pool. By using the MSC Pool, you can distribute the user service to the MSC servers in the pool according to the capacity ratio. In this way, the traffic peak in different districts and different time ranges can be balanced. The operator can make an investment based on the maximum traffic of the whole city rather than that of each district. Thus, the network capacity can be optimized and the investment is economized. Through the M2000 client, you can monitor and maintain the MSC Pool network and configure data. 13 CDMA Pool Management
4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

About This Document

This describes the CDMA pool, which is comprised of multiple MSCes. The CBSC of the access network connects to all MSCes in the pool. If the network is deployed as a CDMA pool, user services are distributed to MSCes on the basis of the capacity proportion of each MSCe. In this way, you can balance the traffic of MSCe in the pool in different regions on weekdays or weekends. Therefore, operators calculate the device investment on the basis of the maximum traffic of the city rather than that of each region. This helps operators to optimize network capacity and reduce the investment. You can configure data, monitor the performance, and maintain the CDMA pool network through the M2000 client. 14 Integrated Task Management The M2000 provides the function of integrated management of scheduled tasks. Thus, you can browse information such as the task status and the progress. You can also create, modify, and delete user-scheduled tasks. In addition, you can suspend, restore, cancel scheduled tasks, and save task result files to the client. 15 NE Commissioning The M2000 automatically commissions NEs. The commissioning items are as follows: the automatic detection and configuration of NEs, the automatic performance check of new NEs, and the automatic report generation. You can monitor the commissioning process, and collect and analyze the commissioning report on the M2000 client. Currently, the commissioning of NodeB can be performed. 16 NE Maintenance Enhanced Management The M2000 provides the enhanced maintenance management for some NEs to facilitate servicing these NEs. The NE enhanced maintenance management involves device management, trace management, monitoring management, and real-time performance monitoring. You can start this function only after the related components are upgraded on the client. 17 FAQ This part describes the typical faults of the M2000 client, analyzes the possible causes, and provides the solution. 18 Terms, Acronyms, and Abbreviations This part gives the M2000 glossary and abbreviations.

Conventions
Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates a hazard with a high level of risk, which if not avoided,will result in death or serious injury. Indicates a hazard with a medium or low level of risk, which if not avoided, could result in minor or moderate injury.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

About This Document

M2000 Operator Guide

Symbol

Description Indicates a potentially hazardous situation, which if not avoided,could result in equipment damage, data loss, performance degradation, or unexpected results. Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points of the main text.

General Conventions The general conventions that may be found in this document are defined as follows. Convention Times New Roman Boldface Italic Courier New Description Normal paragraphs are in Times New Roman. Names of files, directories, folders, and users are in boldface. For example, log in as user root. Book titles are in italics. Examples of information displayed on the screen are in Courier New.

Command Conventions The command conventions that may be found in this document are defined as follows. Convention Boldface Italic [] { x | y | ... } [ x | y | ... ] { x | y | ... }* Description The keywords of a command line are in boldface. Command arguments are in italics. Items (keywords or arguments) in brackets [ ] are optional. Optional items are grouped in braces and separated by vertical bars. One item is selected. Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected.

[ x | y | ... ]*

GUI Conventions
6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

About This Document

The GUI conventions that may be found in this document are defined as follows. Convention Boldface > Description Buttons, menus, parameters, tabs, window, and dialog titles are in boldface. For example, click OK. Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder .

Keyboard Operations The keyboard operations that may be found in this document are defined as follows. Format Key Key 1+Key 2 Key 1, Key 2 Description Press the key. For example, press Enter and press Tab. Press the keys concurrently. For example, pressing Ctrl+Alt +A means the three keys should be pressed concurrently. Press the keys in turn. For example, pressing Alt, A means the two keys should be pressed in turn.

Mouse Operations The mouse operations that may be found in this document are defined as follows. Action Click Double-click Drag Description Select and release the primary mouse button without moving the pointer. Press the primary mouse button twice continuously and quickly without moving the pointer. Press and hold the primary mouse button and move the pointer to a certain position.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

M2000 Operator Guide

1 Getting Started

1
About This Chapter

Getting Started

You can know the operation GUI of the M2000 client, how to log in to, log out of, lock, and unlock the client, how to set the broadcasting message, and how to modify the user password and customize the display style of the client. 1.1 Logging In to the M2000 This section describes how to log in to the M2000, and how to log out the current user or exit the M2000 client. 1.2 Changing Password This section describes how to modify the login password. 1.3 Shortcuts to Client GUI Controls This section describes the GUI controls on the M2000 client, such as the menu, button, and dropdown list. 1.4 Customizing Client GUI Style You can customize the GUI effect of the M2000 client. 1.5 Locking Client This section describes how to lock the M2000 client. 1.6 Unlocking the Client You can perform this task to unlock the locked M2000 client. 1.7 Setting the Running Mode of the System The running mode of the system can be the single-user mode or the multi-user mode. You can allow one user or multiple users to log in by setting the running mode of the system. 1.8 Setting the Alarm Sound When the Network Is Disconnected You can set the alarm sound when the network is disconnected on the M2000 client. When the M2000 client is disconnected from the network, the sound box plays the corresponding alarm sound. 1.9 Setting the LMT Proxy The local maintenance terminal (LMT) is the local O&M system of an NE. If the firewall is set on the NE, the LMT cannot be directly connected to the NE. You can set the M2000 server as
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-1

1 Getting Started

M2000 Operator Guide

the LMT proxy, through which you can connect the LMT to the NEs. This function is applicable when you start the LMT through the M2000 rather than starting the LMT manually. 1.10 Setting the LMT Prompt You can determine whether to display a dialog box, which prompts the M2000 user when NE user logs in or exits the NE LMT. 1.11 Sending Broadcasting Messages This section describes how to send broadcast messages from the client. 1.12 Viewing NM License Information You can view information about all function control items in the licence control items configured in the M2000 server. 1.13 Viewing NE Partitioning This topic descirbes how to view the NE partitioning. If the M2000 server applies the multiserver load-sharing system, different NEs can be managed by different service partitions. On the client, you can view different NE partitioning. 1.14 Downloading NE Mediation Data to the M2000 Client When the NE version on the client is inconsistent with that on the server, you can manually download the NE mediation file to the M2000 client to reach the consistency. The dynamic NE upgrade refers to upgrading dynamically the NE configuration files on the M2000 Client. When detecting that the NE version changes, the M2000 server obtains the new version configuration files from the NE. You can upgrade manually these files on the M2000 Client. 1.15 Managing the Exported Files in the Server In the File Browser window, you can view the information that are exported from the server according to the path to the exported file. 1.16 Managing User-Defined Object Groups You can group objects of the same type into an object group. In this way, you can perform the same operation on all the objects in this object group. The M2000 allows you to create, view, and modify the information about a user-defined object group. 1.17 Reference for M2000 Client Interfaces This describes the M2000 client interface and related parameters, which helps you perform the related operations on the client.

1-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

1.1 Logging In to the M2000


This section describes how to log in to the M2000, and how to log out the current user or exit the M2000 client. 1.1.1 Logging In to theM2000 Server The M2000 uses the client/server mode. To perform an operation, you need to log in to the server through the M2000 client. 1.1.2 Logging Out the User Account To ensure security, when you do not need to perform any operations on the client, you can log out the user account. This operation does not end the client program. 1.1.3 Exiting the M2000 Client when you do not need to do any operations on the client, exit the M2000 client. And this operation will end the client program. 1.1.4 Checking Whether the Client Need Upgrade After the server is updated, the server and the client do not match. Therefore, the client has to be updated accordingly. The user can use the manual check function to check whether the client version and the server version match with each other. 1.1.5 Setting the Interval for Update Checking of M2000 Client After the server is updated, the server and the client do not match. Therefore, the client has to be updated accordingly. After the interval for update checking is set, the M2000 periodically checks whether the client needs to be updated. 1.1.6 Automatically Upgrading the Client Software After a minor upgrade of the server software, that is, the change of SP version in the software version: product name+VxxxRxxxCxxBxxy[SPxx], the M2000 can automatically upgrade the client software to ensure the consistency.

1.1.1 Logging In to theM2000 Server


The M2000 uses the client/server mode. To perform an operation, you need to log in to the server through the M2000 client.

Prerequisite
Before login, ensure that the M2000 client and server are connected normally, and the server works correctly.

Context
l

Except the Administrator, if you have not logged in to M2000 for more than 30 days, your user account becomes invalid automatically. Before you can use the account again, the account need be set to valid by a user who has the Administrator rights. If you do not log in during the preset period after the previous login, the M2000 disables or delete the user account. If a new user account has not logged in to the M2000 server, M2000 does not delete or invalidate it.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-3

Issue 06 (2008-12-16)

1 Getting Started
l

M2000 Operator Guide

Different NEs support different management functions .Whether some functions are visible is associated with the license of the system and the rights of users.

Procedure
Step 1 Start the M2000 client from the start menu. Step 2 In the Login dialog box, click 1. 2. Click Add. In the Add Server Information dialog box, enter the host name and IP address of the server.
NOTE

on right of Server.

Step 3 In the Server List dialog box, configure the M2000 server.

l l l

The default port number is 9999. Do not change it. Click Modify to change the host name and IP address of the server. Click Delete to delete the server information.

3.

Click OK.

Step 4 In the Login dialog box, select a server, then enter the user name and password. Step 5 Click Login. Figure 1-1 shows the process of login authentication.

1-4

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Figure 1-1 Process of login authentication

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-5

1 Getting Started

M2000 Operator Guide

The process of login authentication is as follows: 1. 2. 3. 4. 5. 6. 7. 8. 9.


l

The current client checks whether another client is being upgraded. If a client is being upgraded, the login is not allowed. Initialize the communication connection between the client and the server. Check whether the daemon service is running properly. Obtain the copyright notice on the server and display the contents. Check whether the client version is consistent with the server version. It the two versions are inconsistent, display the inconsistent messages or prompt the user to upgrade. Invoke the login interface on the server. Check whether the user account and password are correct. Check whether the user password expires according to the security policy. If the password expires, it must be changed for a successful login. Check whether the login is within the allowable time period according to the security policy. After the user account passes the authentication, the client loads each software module. If the user name and the password are correct, the Loading dialog box is displayed, indicating the loading progress. If the user name or password is wrong, the Information dialog box is displayed, saying Login failed. Please enter the correct user name and password. If the password is to expire in the specified days, the system prompts you to change the password before the expiration date. If the license is to expire in the specified days, the system notifies you of the expiration date.

----End

Related References
1.17.3 Parameters for Logging In to the M2000 Server

1.1.2 Logging Out the User Account


To ensure security, when you do not need to perform any operations on the client, you can log out the user account. This operation does not end the client program.

Context
l

To ensure security, when you do not need to perform any operations on the client, you can log out the user account or exit the M2000 client. This operation does not end the client program. After logout, the Login dialog box is displayed. You can enter the proper information in the dialog box to log in to the M2000 again.

Procedure
Step 1 Choose System > Logout. Step 2 In the Confirmation dialog box, click OK. ----End
1-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

1.1.3 Exiting the M2000 Client


when you do not need to do any operations on the client, exit the M2000 client. And this operation will end the client program.

Context
l

To ensure security, when you do not need to do any operations on the client, exit the M2000 client or log out the user account. If you do not need to do any operations for a while, you can 1.5.2 Locking Client Manuallyor 1.5.1 Locking the Client Automatically. This operation will end the client program. If you want to do some operations on the client, restart the M2000 client.

Procedure
Step 1 Choose System > Exit. Step 2 In the Confirmation dialog box, click OK. ----End

1.1.4 Checking Whether the Client Need Upgrade


After the server is updated, the server and the client do not match. Therefore, the client has to be updated accordingly. The user can use the manual check function to check whether the client version and the server version match with each other.

Context
After the M2000 server is upgraded, you can perform this operation to check whether the version of the client match that of the server. If the versions do not match, you can upgrade the client.

Procedure
Step 1 Choose Help > Check For Upgrades to check whether the client version matches the server version. l l When the versions match, the system prompts that the client version matches the server version and the client does not need to be upgraded. Click OK. When the version do not match, the system prompts that the versions do not match and the client needs to be upgraded, and it asks you whether to start the upgrade immediately. Click OK to continue with the next step.

Step 2 In the Update Wizard: Update Applications window, click Continue. The upgrade progress is displayed. Step 3 In the Update Wizard: Update Applications window, click Finish. ----End

1.1.5 Setting the Interval for Update Checking of M2000 Client


After the server is updated, the server and the client do not match. Therefore, the client has to be updated accordingly. After the interval for update checking is set, the M2000 periodically checks whether the client needs to be updated.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-7

1 Getting Started

M2000 Operator Guide

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences dialog box, in the navigation tree on the left, select Upgrade. In the Time Interval drop-down list, select the interval for update checking. Step 3 Click OK. ----End

1.1.6 Automatically Upgrading the Client Software


After a minor upgrade of the server software, that is, the change of SP version in the software version: product name+VxxxRxxxCxxBxxy[SPxx], the M2000 can automatically upgrade the client software to ensure the consistency.

Context
NOTE

l l

You can check whether the versions on the client and the server are consistent. For details, refer to 1.1.4 Checking Whether the Client Need Upgrade. The client can be correctly upgraded only when the software version of the server has the same version sequence with and greater than that of the client. The same version sequence means that in the software versions, that is, product name+VxxxRxxxCxxBxxy[SPxx], the numbers after B are the same.

Only when the software version of the client is of the same version sequence as that of the server and the software version of the server is later than the client version, the client can be correctly updated. The software version is in the format of Name of the product + VxxxRxxxCxxBxxy [SPxx]. For instance, if the software version of the server is V200R005C01B066SP01, the software version of the client can be updated only when it is of the V200R005C01B066. According to the flag in the version response, the client determines whether the upgrade tool is required.

Procedure
Step 1 Start the client. Select the server and then click Login.
NOTE

The M2000 automatically compares the versions of the client and server. If the versions are not consistent, the system displays a dialog box, prompting you to upgrade the client.

Step 2 Click OK. The client exits and the Upgrade Wizard dialog box is displayed. Step 3 Click Continue. The client downloads the client programs from the corresponding directories on the server. Step 4 Click OK. ----End
1-8 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

1.2 Changing Password


This section describes how to modify the login password.

Context
l

When using the default password policy, the user password cannot be less than six characters. The password of Admin cannot be less than eight characters. To ensure the security of the M2000, you are recommended to change the user password periodically.

l l

Procedure
Step 1 Choose Security > Change Password. Step 2 In the Change Password dialog box, in the Old Password text box, enter the password of the login user. Step 3 In the Change Password dialog box, in the New Password text box, enter the new password. Step 4 In the Change Password dialog box, in the Confirm Password text box, enter the new password again. Step 5 Click OK. ----End

1.3 Shortcuts to Client GUI Controls


This section describes the GUI controls on the M2000 client, such as the menu, button, and dropdown list.

For Menu
For any menu followed by the asterisk * (* represents a letter or a number), you can press Alt +* to choose the root menu and press * to choose a sub-menu.

For Button
l

For any button followed by the asterisk * (* represents a letter or a number), you can press Alt+* instead of clicking the button. When a dialog box is open and a dot square is on a button, this button is the default button. If the dot square is not on any button, OK is the default button. If you click Apply in a window, the settings in the window take effect and the window is not closed. You can continue with other operations. If you click OK in a window, the settings in the window take effect and the window is closed. When a dot square is on a button, you can press Enter or space bar instead of clicking the button.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-9

Issue 06 (2008-12-16)

1 Getting Started
l

M2000 Operator Guide

When the button that gets the dot square does not support the Enter operation and you press Enter, the default button in that dialog box is clicked.

For Drop-Down List


l

When a dot square is on a drop-down list, you can press the down arrow key to expand the drop-down list. You can press the up arrow key and down arrow key to switch between options in a drop-down list, and press Enter to select the current option. For any drop-down list followed by the asterisk *(* represents a letter or a number) and when the drop-down list is expanded, you can press * instead of choosing an option.

For Option Button and Check box


l l

If a dot square is on an option button, you can press the space bar to select the option button. If a dot square is on a check box, you can press the space bar to select or clear the check box.

For Navigation Tree


When a dot square is on the navigation tree, you can press the down arrow key or up arrow key to switch between the nodes, and press the left or right arrow key to collapse or expand a node.

Other Combined Shortcut Keys


The client provides various combined shortcut keys. These shortcut keys help you perform operations faster. Operation Exit a dialog box or prompt Unlock a terminal Open the Help Close the current window Restore down (when the service window in the public window is maximized) Minimize the window (applied to the service window in the public window) Maximize the window (when the service window in the public window is restored) Shortcut keys Esc Ctrl+Alt+U F1 Ctrl+F4 Ctrl+F5 Ctrl+F9 Ctrl+F10

NOTE

The public window area refers to the area below the toolbar on the M2000 client.

1.4 Customizing Client GUI Style


You can customize the GUI effect of the M2000 client.

1-10

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

1.4.1 Setting Output Information The output window is at the bottom of the M2000 client GUI. It displays the prompt messages and feedback information of the errors that affect the running of the M2000. You can manage the display of output messages and export the messages by setting the output window. 1.4.2 Setting the Display Effect of Alarm Status in the Topology View This section describes how to select the alarm state that needs to be displayed on the topology view, adjust the priority of the alarm state. So, on the topology view, the alarm state of the network element icon is displayed according to the priority. 1.4.3 Setting the Toolbar You can perform this task to set the shortcut buttons on the toolbar. 1.4.4 Custom Menu This describes how to trigger the execution files by setting the customizing menu. On the M2000 client, you can start programs outside the M2000 system. 1.4.5 Customizing Client Time Display Mode You can customize the time display mode as desired. 1.4.6 Customizing the Display Mode of Numbers Through this operation, customize the number display mode of the client, such as, the display mode of the system monitoring data. 1.4.7 Customizing the Mesurement You can set the metrology, namely, imperial (IMP) measurement system or metric measurement system (MET). The default setting is MET. 1.4.8 Setting Common Options for Performance Management The system can save the settings of some common options to execute the related functions according to the parameter settings.

1.4.1 Setting Output Information


The output window is at the bottom of the M2000 client GUI. It displays the prompt messages and feedback information of the errors that affect the running of the M2000. You can manage the display of output messages and export the messages by setting the output window.

Procedure
Step 1 Choose System > Preferences. Step 2 From the navigation tree on the left of the Preferences window, select Output Window, and then set relevant parameters.
NOTE

l l l l l l

Right-click in the output pane and choose Save As to save the output information as an *.txt file. Right-click in the output pane and choose Clear to clear all the displayed output information. Right-click in the output pane and choose Select All, and then right-click again and choose Copy to copy all the displayed output information to the clipboard. Right-click in the output window and choose Auto Scroll. The output information is set to scroll automatically. Right-click in the output window again and choose Auto Scroll, the auto scroll is cancelled. Right-click in the output window and choose Parameter Setting. The Output Window pane is displayed in the Preferences window. Right-click in the output window and choose Find. Enter the keywords in the Find what dialog box.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-11

1 Getting Started

M2000 Operator Guide

Step 3 Click OK. ----End

Related References
1.17.5 Parameters for Output GUI Information

1.4.2 Setting the Display Effect of Alarm Status in the Topology View
This section describes how to select the alarm state that needs to be displayed on the topology view, adjust the priority of the alarm state. So, on the topology view, the alarm state of the network element icon is displayed according to the priority.

Context
l

The settings take effect only after you log in to the M2000 client again.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences window, select Topology Status Display. Step 3 In Alarm Status, select the alarm status you want to display. Step 4 Select the alarm status for which you want to adjust the display sequence. Click Up or Down to adjust the display sequence in the topology view. Step 5 Click OK. ----End

1.4.3 Setting the Toolbar


You can perform this task to set the shortcut buttons on the toolbar.

Procedure
Step 1 Choose System > Customize Toolbar. Step 2 In the Customize Toolbar dialog box, deselect the checkboxed under Toolbar Groups, for example, System or Fault as desired. Step 3 Click Advanced to display a new dialog box.
NOTE

The new dialog box consists of two sections: Usable Tools and Customize Tools. All the buttons in Customize Tools are displayed on the toolbar, and the buttons in Usable Tools are not displayed on the toolbar. Click Advanced again. The new dialog box is hidden. Click Reset to restore the toolbar so that you can reset it.

l l

Step 4 In the Toolbar Buttons dialog box, set the buttons you want to display on the toolbar.
1-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

l l

In the Usable Tools group box, select the buttons you want to display. Click move the buttons to Customize Tools. In the Customize Tools group box, select the buttons you do not want to display. Click to move the buttons to Usable Tools.

to

Step 5 Click OK. ----End

Related References
1.17.4 Tool Buttons

1.4.4 Custom Menu


This describes how to trigger the execution files by setting the customizing menu. On the M2000 client, you can start programs outside the M2000 system.

Prerequisite
You have logged in to the M2000 client.

Context
NOTE

l l

The executable file triggered by the customizing menu is a program outside the M2000 and this program is owned by the client. The length of character strings entered in the Menu Group Name and Menu Name fields is 1 to 20. Characters such as `!@#$%^&*+={}[]\\|;':\"<>,.?/ are not allowed.

Procedure
Step 1 Choose Custom Menu > Menu Setting. The Custom Menu Setting window is displayed. Step 2 Right-click the Custom Menu node and choose Add Menu Group from the shortcut menu. Step 3 In the displayed Menu Attribute Modifying dialog box, enter the name of the menu group.
NOTE

A maximum of 10 menu groups can be added.

Step 4 Right-click the menu group node, and then choose Add Menu from the shortcut menu. Step 5 In the displayed Menu Attribute Modifying dialog box, set the menu information. 1. 2. 3. Enter the menu name in the Menu Name field. In File Path, click be triggered. . In the displayed Open dialog box, select the executable file to

Optional: You can use the custom menu to start all the applications that can be started by DOS commands. The format of the start parameters varies based on the application. In Parameters, you can enter the parameters according to the program format. For example, according to the LMT client configuration, the startup parameter of the LMT client is -u "username" -p "password" -o "NE name" -pip "proxyip" -nip "neip" -closeall "true" -t "bamid". You can enter the startup parameters in the Parameters field.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-13

Issue 06 (2008-12-16)

1 Getting Started

M2000 Operator Guide

After you customize the menu, you can log in to the LMT of the NE through the custom menu.
NOTE

l l

A menu group supports a maximum of 10 menus. In the Parameters field, you can enter a maximum of 20 characters.

Step 6 Click OK. The added information about the custom menu, which includes the menu name and the path of the executable file, is displayed in the right of the Custom Menu Setting window. Step 7 Click OK. The Custom Menu Setting dialog box is closed. ----End

Postrequisite
Choose the corresponding menu under Custom Menu . Start up the executable file that is set on the M2000 client.

1.4.5 Customizing Client Time Display Mode


You can customize the time display mode as desired. 1.4.5.1 Setting the Time Format of the Client This section describes how to set the time format of the client. 1.4.5.2 Setting the Time Mode of the Client By setting the time mode of the client, set the default time mode while querying the alarm. Here, the time mode is divided into the server time and the network element time. 1.4.5.3 Setting the Date Format of the Client This section describes how to set the date format of the client.

Setting the Time Format of the Client


This section describes how to set the time format of the client.

Context
l

This setting is bound to users. That is, the setting is valid only to the user who performs this setting. The setting does not affect other users of the client. After you set the time format, you need to log in to the server again for the settings to take effect. You can preview the time format in Appearance Example.

Procedure
Step 1 Choose System > Preferences. Step 2 From the navigation tree on the left of the Preferences window, expand the Region Setting node and select Time. Step 3 In the Time Settings group box, set the time format.
1-14 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

1 Getting Started

The time format is displayed in Appearance Example.

Step 4 Click OK. ----End

Related References
1.17.7 Parameters for Setting the Time Style

Setting the Time Mode of the Client


By setting the time mode of the client, set the default time mode while querying the alarm. Here, the time mode is divided into the server time and the network element time.

Context
The settings take effect after you log in to the client again.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences dialog box, select Time Mode.
NOTE

The time can be displayed in two modes:


l l

Server time mode: If you select this mode, the alarms are queried according to the server time. NE time mode: If you select this mode, the alarms are queried according to the NE time.

You are recommended to select the default value NE time mode.

Step 3 Click OK. ----End

Setting the Date Format of the Client


This section describes how to set the date format of the client.

Context
l

This setting is bound to users. That is, the setting is valid only to the user who performs this setting. The setting does not affect other users of the client. After you set the date format, you need to log in to the server again for the settings to take effect. You can preview the new date format in Appearance Example.

Procedure
Step 1 Choose System > Preferences. Step 2 In the navigation tree on the left of the Preferences window, expand the Region Setting node and select Date.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-15

1 Getting Started

M2000 Operator Guide

Step 3 In the Date Settings group box, set the date format.
NOTE

l l l

Date Separator: symbol to separate the date. There are three symbols for you to select: "/", "-", and ".". The default is "-". Date Format: display format of the date. It can be set to "yyyy/MM/dd", "dd/MM/yyyy", or "MM/dd/yyyy". The default is "yyyy/MM/dd". The date display effect that you set is displayed in Appearance Example.

Step 4 Click OK. ----End

1.4.6 Customizing the Display Mode of Numbers


Through this operation, customize the number display mode of the client, such as, the display mode of the system monitoring data.

Context
l l

The settings take effect after you log in to the client again. Modifications to the region number settings may adjust the number display and sequence effect. The display effect is displayed in the Positive number text box and Negative number text box.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Region Settings dialog box, click the Number tab, and set Digits of Decimal Fraction, Number Separator, and Start with 0.
NOTE

l l l

Digits of Decimal Fraction: digits of decimal fraction. The default is two digits, and the value ranges from 0 to 3, 2 by default. Number Separator: whether to use the comma (,) to group the integer part of numbers. The default is blank space. You can choose the blank space or comma ",". Start with 0: whether to add 0 before the decimal point. The default is to add a 0.

Step 3 Click OK. ----End

1.4.7 Customizing the Mesurement


You can set the metrology, namely, imperial (IMP) measurement system or metric measurement system (MET). The default setting is MET.

Context
The setting has effects on the display mode of performance measurement results. The performance measurement data is automatically displayed according to the defined metrology.
1-16 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Procedure
Step 1 Choose System > Metrology Setting. The Metrology Setting dialog box is displayed. Step 2 Select IMP or MET. Step 3 Click OK to save the setting. Click Cancel to cancel the setting.
NOTE

After the modification, the setting takes effect on the client only.

----End

1.4.8 Setting Common Options for Performance Management


The system can save the settings of some common options to execute the related functions according to the parameter settings.

Context
Common option settings are bound to the client. In other words, the parameters set on the same client apply to all its users.

Procedure
Step 1 Choose Performance > Preference to view the System Setting dialog box. Step 2 Set the parameters. Step 3 Click Apply or OK. ----End

Related References
1.17.8 Parameters for Setting Common Options for Performance Management 1.17.2 Interface Description: Common Options for Performance Management

1.5 Locking Client


This section describes how to lock the M2000 client. 1.5.1 Locking the Client Automatically You can set the M2000 to lock the client automatically in case you forget to lock the client. After you set the auto lock and there is no operation performed on the client during the preset time period, the M2000 locks the client automatically. 1.5.2 Locking Client Manually When you do not need to perform any operations on the M2000 client, you can lock the client manually to prevent illegal operations.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-17

1 Getting Started

M2000 Operator Guide

1.5.1 Locking the Client Automatically


You can set the M2000 to lock the client automatically in case you forget to lock the client. After you set the auto lock and there is no operation performed on the client during the preset time period, the M2000 locks the client automatically.

Procedure
Step 1 Choose System > Preferences. Step 2 From the navigation tree on the left of the System Setting window, select Locking Interval. Step 3 Select Automatically locked check box. In the minutes later, this client will be automatically locked. text box, enter the lock time.
NOTE

l l

Clear Automatically locked check box. The function of auto lock is disabled. minutes later, this client will be automatically locked.: Set the time to start the auto lock. The value ranges from 1 minute to 35000 minutes. The default is 3 minutes.

Step 4 Click OK. ----End

1.5.2 Locking Client Manually


When you do not need to perform any operations on the M2000 client, you can lock the client manually to prevent illegal operations.

Procedure
You can lock the client in two ways: l l Choose System > Lock Terminal. Click on the toolbar.

The client is locked. The operations on the keyboard and the mouse cannot be performed. ----End

1.6 Unlocking the Client


You can perform this task to unlock the locked M2000 client.

Context
l l

If you unlock your own account, the M2000 becomes operable after it is unlocked. If your user account is in the Administrators user group and you unlock a user account of someone else, that account is logged out after it is unlocked.

Procedure
Step 1 When the client is locked, press Ctrl+Alt+U .
1-18 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Step 2 In the Unlock dialog box, enter the user name and the password, and then click OK. ----End

1.7 Setting the Running Mode of the System


The running mode of the system can be the single-user mode or the multi-user mode. You can allow one user or multiple users to log in by setting the running mode of the system.

Prerequisite
l l

You are the admin user. No admin users have logged in to other clients.

Context
l

Single-user mode: applicable for maintenance. Only one user is allowed to log in and to establish the session. Mulit-user mode: applicable for normal operation. Multiple users are allowed to log in to the system at the same time.

Procedure
Step 1 Choose System > Preferences. The System Setting dialog box is displayed. Step 2 In the navigation tree, select the System Login Mode node. Choose the system running mode in the right pane. Running Mode Multi-user mode Single-user mode Step 3 Click OK. Step 4 Enter the delay time for mode switching. Enter the delay time for mode switching in the Set Switch Delay dialog box. Operation Go to Step 5. Go to Step 3.

CAUTION
The single-user mode allows only one user to log in and to establish the session. Therefore, after the change of the running mode, the current client is still active, while other online clients that are not authorized to change the mode are forced to exit. You need to set the switch delay time based on actual situations so that clients have time for preparations. Step 5 Click OK.
l

For the multi-user mode, the System Setting dialog box is closed.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-19

Issue 06 (2008-12-16)

1 Getting Started
l

M2000 Operator Guide

For the single-user mode, the system will count down the mode switching and inform other online clients. Then you can click Cancel to cancel the mode switching.

The system counts down the mode switching and informs other online clients. ----End

1.8 Setting the Alarm Sound When the Network Is Disconnected


You can set the alarm sound when the network is disconnected on the M2000 client. When the M2000 client is disconnected from the network, the sound box plays the corresponding alarm sound.

Context
l l

You can use the sound file of the M2000 or others. Only the sound files of the Wav type in the PCM format are supported. The Microsoft ADPCM type is not supported. You can set the delay time of the alarm sound in $iManagerM2000Client\style\defaultstyle \conf\sf\ConnectionConfig.properties on the M2000 client. The unit of the delay time is second. If the connection between the client and the network is not recovered within the preset delay time, the sound box plays the corresponding alarm sound.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences dialog box, from the navigation tree on the left, select Disconnection Sound. Step 3 In the Disconnection Sound group box, choose Enable, and then click box, select a sound file, and then click Open. Step 4 Optional: Click Step 5 Click OK. ----End to listen to the sound. . In the Open dialog

1.9 Setting the LMT Proxy


The local maintenance terminal (LMT) is the local O&M system of an NE. If the firewall is set on the NE, the LMT cannot be directly connected to the NE. You can set the M2000 server as the LMT proxy, through which you can connect the LMT to the NEs. This function is applicable when you start the LMT through the M2000 rather than starting the LMT manually.

Context
l

For NodeB, the M2000 automatically starts the LMT proxy. You are not allowed to change the LMT proxy setting. For other NEs that support the LMT proxy, the M2000 does not start the LMT proxy by default. You, however, can start or stop the LMT proxy.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

1-20

M2000 Operator Guide

1 Getting Started

CAUTION
You must use the M2000 as the proxy when you plan to log in to the NodeB because the NodeB has no BAM.
l

The parameters that you set are saved on the server in real time and overwrite the previous setting. When other users log in to the client, the client automatically reads and uses the setting saved on the server. If a user changes the setting, the changed setting is stored on the server. It takes effect to the clients that log in later rather than those who have logged in.

Procedure
Step 1 Choose System > Proxy Service Setting. Step 2 Select the types of NE maintenance stations on the Proxy Service Setting window. When these NE maintenance stations are started, the M2000 proxy enables them to connect to the NEs. Step 3 Click OK. ----End

1.10 Setting the LMT Prompt


You can determine whether to display a dialog box, which prompts the M2000 user when NE user logs in or exits the NE LMT.

Procedure
Step 1 Choose System > LMT Prompt Setting. The LMT Prompt Setting dialog box is displayed. Step 2 Select or deselect the check box Prompt when LMT user login or logout. Step 3 Click OK. ----End

1.11 Sending Broadcasting Messages


This section describes how to send broadcast messages from the client.

Context
l l

Broadcast messages are only sent to the clients that log in to the server normally. A client can receive the broadcast messages sent by itself. A prompt is given in the output window.

Procedure
Step 1 Choose System > Broadcast Message.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-21

1 Getting Started

M2000 Operator Guide

Step 2 In the Broadcast Message dialog box, in the Message entry box, enter the message content.
NOTE

l l

A broadcast message cannot be null, and cannot exceed 128 characters. The system automatically adds line feeds according to the length of broadcast messages.

Step 3 Click Send. Step 4 In the Prompt dialog box, click OK. ----End

1.12 Viewing NM License Information


You can view information about all function control items in the licence control items configured in the M2000 server.

Context
The license keys are divided into resource keys and function keys. For the resource keys, the system controls the number of the items, such as the frequency of the CBSC. For the function keys, the system controls if the function can be performed by the user. Only authorized users can use the function keys.

Procedure
Step 1 Choose Help > About. The About dialog box is displayed. Step 2 Click the License Information tab. ----End

Related References
1.17.6 Parameters for Viewing NM License Information

1.13 Viewing NE Partitioning


This topic descirbes how to view the NE partitioning. If the M2000 server applies the multiserver load-sharing system, different NEs can be managed by different service partitions. On the client, you can view different NE partitioning.

Prerequisite
You have logged in to the M2000 client.

Procedure
Step 1 Select Configuration > Query NE SubArea, the Query NE Subarea window is displayed. Step 2 Select the query condition, and then click Query. You can view the NEs based on either the NE partitions or the NE names.
1-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


l

1 Getting Started

Query based on the NE partitions: In the Query Result dialog box, the NE distribution conditions and the NE information such as the NE type, the NE name, the NE version of the selected partition will be displayed. In the Statistic dialog box, the partition information such as the host name, the IP address, and the instance name of the database will be displayed. Query based on the NE name: In the Query Result dialog box, the NE distribution conditions and the NE information such as the NE type, the NE name, the NE version of the selected partition will be displayed. In the Statistic dialog box, the partition information such as the host name, the IP address, and the instance name of the database will be displayed.
NOTE

Click Save, the query results are saved to the file.

For parameter related description, refer to 1.17.9 Parameters for the NE Partitioning Information. ----End

Related References
1.17.9 Parameters for the NE Partitioning Information

1.14 Downloading NE Mediation Data to the M2000 Client


When the NE version on the client is inconsistent with that on the server, you can manually download the NE mediation file to the M2000 client to reach the consistency. The dynamic NE upgrade refers to upgrading dynamically the NE configuration files on the M2000 Client. When detecting that the NE version changes, the M2000 server obtains the new version configuration files from the NE. You can upgrade manually these files on the M2000 Client.

Context
The macro file provides the collection of all commands defined by NEs. From this file, you can know what commands are supported by the version and the meaning of each parameter.

Procedure
Step 1 Choose Help > Online Update to view a progress bar through which the client queries the new version file from the server. Step 2 If new version files exist, the server displays the Update Available dialog box to show the NE type and version number of the files and prompts you to upgrade them.
NOTE

If new version files do not exist, the progress closes automatically.

Step 3 In Update Available, click Yes to upgrade the files. Click No to cancel the upgrade. A percentage is displayed in the upgrade progression bar to show the upgrade progression. Step 4 Click Ok. The displayed Update prompt box shows the update progress. Step 5 When you see 100%, click OK. The upgrade is complete. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-23

1 Getting Started

M2000 Operator Guide

1.15 Managing the Exported Files in the Server


In the File Browser window, you can view the information that are exported from the server according to the path to the exported file.

Procedure
Step 1 Choose Maintenance > File Browser. The File Browser window is displayed. You can view the exported timing tasks in the server in the File Browser window. Step 2 In the File Browser window, view the exported results according to the name of the exported file. ----End

1.16 Managing User-Defined Object Groups


You can group objects of the same type into an object group. In this way, you can perform the same operation on all the objects in this object group. The M2000 allows you to create, view, and modify the information about a user-defined object group. 1.16.1 User-Defined Object Groups You can group objects of the same type into an object group, such as cell group, server group, and RNC group. In this way, you can perform the same operation on all the objects in an object group. This function applies to only commissioning cells. 1.16.2 Adding a User-Defined Object Group You can create a user-defined object group to perform the same operation on all the objects in this object group. This function applies to only commissioning cells. 1.16.3 Modifying a User-Defined Object Group This describes how to modify the name, remarks, and objects of a user-defined object group. 1.16.4 Viewing User-Defined Object Groups This describes how to view and modify the information about the user-defined object groups on the server.

1.16.1 User-Defined Object Groups


You can group objects of the same type into an object group, such as cell group, server group, and RNC group. In this way, you can perform the same operation on all the objects in an object group. This function applies to only commissioning cells. By default, the types of the NEs and object groups that support this function are: MSC Server (MSCServer NE Group, Office Group), and RNC (RNC NE Group, Cell Group). You can add or delete the types of NEs and object groups by modifying the configuration file on the server.

Related Tasks
1.16.2 Adding a User-Defined Object Group 1.16.3 Modifying a User-Defined Object Group 1.16.4 Viewing User-Defined Object Groups
1-24 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Related References
1.17.10 Parameters for User-Defined Object Groups

1.16.2 Adding a User-Defined Object Group


You can create a user-defined object group to perform the same operation on all the objects in this object group. This function applies to only commissioning cells.

Prerequisite
l l

You have logged in to the M2000 client. You are authorized with the relevant operation privileges.

Procedure
Step 1 Choose Performance > Object Set Management . The Object Set Management window is displayed. Step 2 Click New. Step 3 Select the type of the object group to be created, set the attributes, and then click Next. For detailed information about the parameters, refer to 1.17.10 Parameters for User-Defined Object Groups. Step 4 Select the object scope and create type, and then click Next.
NOTE

If the type of the object group is NE group, the corresponding scope of the object group can only be Network.

Step 5 Perform the related operations based on the selected type. Create Type Operation By Condition 1. Click Add and set the search condition. The logical operator of the search condition in the last line must be none. The logical operators used in other lines cannot be none. 2. Click Search. 3. In the displayed Objects In Scope dialog box, click OK. 4. Click Next and modify the name and remarks of the object group. By Manual 1. In Objects, select the objects to be added to the object group. Click to add them to Selected Objects. 2. Click Next and modify the name and remarks of the object group. AUTO Step 6 Click Finish. Step 7 In the displayed Successful dialog box, click OK. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-25

Select the attribute of the object group in the drop-down list.

1 Getting Started

M2000 Operator Guide

Related Concepts
1.16.1 User-Defined Object Groups

Related References
1.17.10 Parameters for User-Defined Object Groups

1.16.3 Modifying a User-Defined Object Group


This describes how to modify the name, remarks, and objects of a user-defined object group.

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized with the relevant operation privileges. A user-defined object group is available.

Procedure
Step 1 Choose Performance > Object Set Management . The Object Set Management window is displayed. Step 2 In the navigation tree, select the node of the object group to be modified. In the right pane, select the object group to be modified. Step 3 Click Modify, or right-click the object group and choose Modify on the shortcut menu.

CAUTION
An object group whose create type is AUTO cannot be modified manually. Step 4 Perform the related operations based on the type of the user-defined object group. Create Type Operation By Condition 1. Modify the search conditions in Modify Object Group(Setting conditions) and then click Search. 2. In the displayed Objects In Scope dialog box, click OK. 3. Click Next and modify the name and remarks of the object group. By Manual 1. Select the objects in the object group again. 2. Click Next and modify the name and remarks of the object group.

For detailed information about the parameters, refer to 1.17.10 Parameters for User-Defined Object Groups. Step 5 Click Finish.
1-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Step 6 In the displayed dialog box that shows the operation result, click OK. ----End

Related Concepts
1.16.1 User-Defined Object Groups

Related References
1.17.10 Parameters for User-Defined Object Groups

1.16.4 Viewing User-Defined Object Groups


This describes how to view and modify the information about the user-defined object groups on the server.

Prerequisite
l l

You have logged in to the M2000 client. A user-defined object group is available.

Procedure
Step 1 Choose Performance > Object Set Management . The Object Set Management window is displayed. Step 2 In the navigation tree, select the Network node. In the right pane, view the information about the user-defined object group, such as name, NE type, object group type, scope, creator, and create type.
NOTE

l l

Select a user-defined object group in the right pane and click Information. Then you can view the details of its objects. Select a user-defined object group in the right pane and click Delete to delete it. Alternatively, you can right-click it and choose Delete on the shortcut menu.

----End

Related Concepts
1.16.1 User-Defined Object Groups

Related References
1.17.10 Parameters for User-Defined Object Groups

1.17 Reference for M2000 Client Interfaces


This describes the M2000 client interface and related parameters, which helps you perform the related operations on the client. 1.17.1 Interface Description: M2000 Client Interface
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-27

1 Getting Started

M2000 Operator Guide

This part describes the contents and functions of the M2000 client interface, such as the physical topology, system output window, menu bar, and status bar. Thus you can have a clear understanding of the client and perform corresponding operations. 1.17.2 Interface Description: Common Options for Performance Management The common options for performance management are organization tree, status table, time parameter, and others. 1.17.3 Parameters for Logging In to the M2000 Server This section describes the parameters in the Login dialog box. You can refer to these parameters when you log in to the M2000. 1.17.4 Tool Buttons Tool buttons are displayed as icons on the toolbar. You can perform operations faster through these buttons. 1.17.5 Parameters for Output GUI Information This section describes the parameters in the Output Window group box. You can refer to these parameters when you set output information. 1.17.6 Parameters for Viewing NM License Information This part gives the descriptions of the parameters for the License Information tab. You can view the NM license information by referring to the information below. 1.17.7 Parameters for Setting the Time Style This section describes the parameters in the Time dialog box. You can refer to these parameters when you set the client time style. 1.17.8 Parameters for Setting Common Options for Performance Management Setting common options for performance management involves setting the organization tree, status table, time parameter, and others. 1.17.9 Parameters for the NE Partitioning Information This topic describes the related parameters in the Query NE Subarea dialog box. You can refer to the these parameters when you check the NE partitioning information. 1.17.10 Parameters for User-Defined Object Groups This describes the parameters related to user-defined object groups. You can refer to this part when adding or modifying user-defined object groups.

1.17.1 Interface Description: M2000 Client Interface


This part describes the contents and functions of the M2000 client interface, such as the physical topology, system output window, menu bar, and status bar. Thus you can have a clear understanding of the client and perform corresponding operations.

Overview
Figure 1-2 shows the GUI after you log in to the system. For details of Figure 1-2, see Table 1-1.

1-28

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Figure 1-2 M2000 client interface

Table 1-1 Parameters Serial Number (1) Name System output window Description The system output window displays the information such as the system operation logs and the system alarms. The time displayed is the time of the client. The log, fault, and security information is provided by the server. Therefore, the displayed time is the time of the server. The menu bar shows the main menu of the system. The status bar displays the current status information of the system, such as the current user and the IP address of the connected server. The toolbar shows the shortcut icons for key operation tasks.

(2) (3)

Menu bar Status bar

(4)

Toolbar

Menu Bar
The menu bar shows the main menu of the system. It is designed according to the main functions of the M2000 to facilitate your operation. Table 1-2 describes the main menus on the interface and corresponding functions.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-29

1 Getting Started

M2000 Operator Guide

Table 1-2 Menu bar Main Menu System Description System provides robust system configuration functions. The menu options are System > Customize Topology Tips , System > Proxy Service Setting , System > LMT Prompt Setting, System > Metrology Setting, System > Log Management, System > Preferences, System > Customize Toolbar, System > Broadcast Message, System > Lock Terminal, System > Logout, and System > Exit. You can customize shortcut operations and the operation style. You can also configure the system to your preference before the usage. Monitor provides the function of monitoring and integrated fault management on all NEs in the entire network. . The menu options are Monitor > Current Fault Alarms, Monitor > History Fault Alarms , Monitor > Event Alarms, Monitor > Masked Fault Alarms, Monitor > Masked Event Alarms, Monitor > Performance Monitor, Monitor > Object Groups Management , Monitor > RAN Network Monitor, Monitor > Browse Current Fault Alarms By Status , Monitor > Browse Event Alarms By Status, Monitor > Fault Alarm Statistics, Monitor > Event Alarm Statistics, Monitor > Display Alarm Board, Monitor > Stop Client Sounding, Monitor > Alarm Box Manager, Monitor > Alarm Real-time Monitor, Monitor > NE Alarm Synchronize, Monitor > Settings, and Monitor > System Monitor. Maintenance provides the function of maintaining the system and NEs. The menu options are Maintenance > Follow-up Reports Browser , Maintenance > MML Command, Maintenance > Trigged Script, Maintenance > Task Management, Maintenance > File Browser, Maintenance > Backup Management, Maintenance > Pool Management, Maintenance > Network Health Check, and Maintenance > iSStar. Performance provides the function of measuring and observing the security, running status, signal connection status, and status of users and system resources. The menu options are Performance > Query Result, Performance > Measure Management, Performance > Threshold Management, Performance > User-defined Counter Management, Performance > Monitor Threshold Management , Performance > Object Set Management , and Performance > Preference.

Monitor

Maintenance

Performance

1-30

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Main Menu Software

Description Software provides the function of integrated management of NE software, configuration data and file. The menu options are Software > Browser, Software > License Management, Software > File Server Setting, Software > File Transfer Wizard, Software > Plan Upgrade Task, Software > NE Upgrade Wizard, Software > FTP Setting, and Software > FTPS Parameters Setting . Configuration provides the function of integrated NE configuration management. The menu options are Configuration > MIT Browser, Configuration > Domain Management, Configuration > Dual Homing, Configuration > Link Browser, Configuration > State Management, Configuration > SNMP Template Management , Configuration > Device Map, Configuration > Query NE SubArea, Configuration > Export NE Attribute Template, Configuration > PCU Integrated Configuration , Configuration > Inventory Management, and Configuration > Core Basic Navigation Configuration. Security provides the function of user and user right management. The menu options are Security > Security Management , Security > NE User Management, Security > NE Login Management,Security > Local Users Setting, Security > User Monitor, Security > Access Control List, Security > Security Policy, and Security > Change Password. Topology provides the function of topology management. The menu options are Topology > Main Topology, Topology > New, Topology > Delete, Topology > Modify Custom View, Topology > Delete Custom View, Topology > Back to Parent, Topology > Back to Top, Topology > Refresh, Topology > Save Position, Topology > Lock View, Topology > Search, Topology > Show, Topology > Layout, Topology > Set Background, and Topology > Zoom. Report provides the functions related to NE reports and performance reports. The menu options are Report > NE Report, Report > NE Resource Report, Report > NE Statistic Report, Report > Link Report Wizard, and Report > Performance Report > Report Management. Custom Menu provides the function of customizing menus, which enables you to directly start the programs other than those for the M2000 on the client. The menu options are Custom Menu > Menu Setting.

Configuration

Security

Topology

Report

Custom Menu

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-31

1 Getting Started

M2000 Operator Guide

Main Menu Window

Description Window provides the function of setting display mode of the windows. The menu options are Window > Close, Window > Close All, Window > Minimize, Window > Minimize All, Window > Toggle Window Tabbed Bar, Window > Toggle Message Output Area, Window > Cascade, Window > Tile, Window > Tile Horizontally, and Window > Tile Vertically. Help provides the online help of the M2000 client. The menu options are Help > Help Topics, Help > Check For Upgrades, Help > About, and Help > Online Update. The menu is displayed after you install the resource management tool on the client. The M2000 resource management tool provides the function of allocating interprovincial circuit resources of softswitch tandem, thus satisfying the operation and maintenance requirements of carriers. The resource management tool includes Standard Data Management , Real Data Manager and Task Manager .

Help

Resource Management

Toolbar
The toolbar of the M2000 client provides access to some common operations. You can rapidly open the corresponding windows or perform the corresponding operations by clicking the icons. The M2000 also allows you to customize the buttons on the toolbar.
l

System management tool buttons Table 1-3 shows the icons and functions of system management tool buttons. Table 1-3 System management tool buttons Icon Meaning Exit Description You can terminate client programs and exit the current M2000 client. You can log out of the current M2000 client but not terminate client programs. If the client is locked, you are not allowed to perform operations on the client. You must enter the correct password to unlock the client.

Logout

Lock terminal

1-32

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Icon

Meaning Full screen

Description You can hide the menu bar, toolbar, system output window, and status bar, thus expanding the display area of the main window. You can press Esc to exit the display mode of full screen.

Buttons of the fault management tool Table 1-4 shows the buttons of the fault management tool. Table 1-4 Description of the fault management tool Icon Meaning Current fault alarm query Description Provides the access to the Current Fault Alarms dialog box. Provides the access to the Event Alarms dialog box. Provides the access to the Browse Current Fault Alarms By Status dialog box. Provides the access to the Fault Alarm Statistics dialog box.

Event alarm query

Browse current fault alarms by status

Fault alarm statistics

Buttons of the performance management tool Table 1-5 shows the buttons of performance management tool. Table 1-5 Buttons of the performance management tool Icon Meaning Query result Description Provides the access to the Query Result dialog box, where you can query all the reported measure results after the NE is created.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-33

1 Getting Started

M2000 Operator Guide

Icon

Meaning Measure management

Description Provides the access to the Measure Management window, where you can query the measure results, measure status, measure transition status of a measure unit. Provides the access to the Threshold Setting dialog box. Provides the access to the Customer Counter Management window, where you can manage the system counters and user-defined counters.

Threshold setting

Customer counter management

Buttons of the software management tool Table 1-6 shows the buttons of software management tool. Table 1-6 Descriptions of software management tool buttons Icon Meaning Software browser Description Provides the access to the Software Browser pane, where you can centralize the software management, configuration data, and files of NEs.

Configuration management tool buttons Table 1-7 shows the icons and functions of configuration management tool buttons. Table 1-7 Descriptions of the configuration management tool buttons Icon Meaning MIT browser Description Provides the access to the MIT Browser, where you can browser the basic information of NEs.

1-34

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Icon

Meaning MML command

Description Provides the access to the MML Command window, where you can operate and maintain NEs through delivering MML commands to NEs. Provides the access to the Follow-up Reports Browser window, where you an view the reports returned from NEs.

Follow-up reports browser

Buttons of the integrated task management tool Table 1-8 shows the buttons of integrated task management tool. Table 1-8 Descriptions of integrated task management tool buttons Icon Meaning RAN Network Monitor Description Provides the access to the RAN Network Monitor pane, where you can monitor the RNC, the NodeB, and the cell in an integrated manner.

Status Bar
The status bar is located at the bottom of the interface. It displays the status information of the system, such as the current user and the IP address of the connected server. The status information is updated in real time. From left to right on the status bar are:
l l l l

Coordinates: displays the longitude and latitude of the current location. Login server: displays the IP address of the server that the client logs in to. Login user: displays the name of the current login user. Login mode: displays the login mode of the current user. Two modes are available: singleuser mode and multi-user mode. Connection status: displays the status of the connection to the server. When the server is disconnected, the indicator blinks and the system displays a prompt box showing that the server being connected. shows the indicator. Logo: the logo of Huawei Technologies Co., Ltd., that is, .

System Output Window


The system output window resides at the bottom of the client. It displays the prompts and messages that are associated with the operation of the M2000 or other clients.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-35

1 Getting Started

M2000 Operator Guide

The system output includes:


l l l l l

Prompt for the initialization of the system at the login Prompt for the start of log export Prompt for the end of log export Prompt for the start of alarm data export Prompt for the end of alarm data export

1.17.2 Interface Description: Common Options for Performance Management


The common options for performance management are organization tree, status table, time parameter, and others.

Organization Tree
Figure 1-3 shows the tab of organization tree. Figure 1-3 Organization tree

Status Table
Figure 1-4 shows the tab of status table.
1-36 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Figure 1-4 Status table

Time Parameter
Figure 1-5 shows the tab of time parameter.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-37

1 Getting Started

M2000 Operator Guide

Figure 1-5 Time parameter

Others
Figure 1-6 shows the tab of others.

1-38

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Figure 1-6 Others

Related Tasks
1.4.8 Setting Common Options for Performance Management

1.17.3 Parameters for Logging In to the M2000 Server


This section describes the parameters in the Login dialog box. You can refer to these parameters when you log in to the M2000.

Parameters
Name User Name Description Description: The valid user name registered in the M2000 server. Settings Value: Cannot be null.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-39

1 Getting Started

M2000 Operator Guide

Name Password

Description Description: Used to log in to the M2000 server, displayed as *.

Settings Value:
l

When using the default password policy, the user password cannot be less than six characters. For the description of the password policy parameters, see 4.3.1.1 Setting the Password Policy. The password of admin cannot be less than eight characters.

Server

Description: Select the M2000 server you want to log in from the drop-down list. Click the small button on the right, and then the Server List dialog box is displayed.

Value: Cannot be null.

Related Tasks
1.1.1 Logging In to theM2000 Server

1.17.4 Tool Buttons


Tool buttons are displayed as icons on the toolbar. You can perform operations faster through these buttons.

System Tool Buttons


Icon Name Exit Description Description: To exit the M2000. Logout Description: To log out the current user. Lock Terminal Description: To lock the Terminal. When the client is locked, you cannot do any operations on the client, and you need to enter your password to unlock the client.

1-40

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Icon

Name Full Screen

Description Description: By using this icon, the menu bar, toolbar, output window, and status bar can be hidden, thus the main window can have more space. Press Esc to exit the full screen mode.

Topology Tool Buttons


Icon Name Zoom In Description Description: To zoom in on the topology objects. You can click this icon eight times effectively based on the default object size. Zoom Out Description: To zoom out on the topology objects. You can click this icon eight times effectively based on the default object size. Magnifier Description: To magnify the topology objects in the selected rectangle area to adjust the view to the perfect size. You can zoom in four times based on the default size. Reset Zoom Description: To restore the topology objects to the default size. You can zoom out four times based on the default size.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-41

1 Getting Started

M2000 Operator Guide

Icon

Name Fit to Contents

Description Description: To display all the topology objects of the current topology view in the same topology window. When the button is clicked, the size of the topology elements may change, but their shapes and positions in the coordinates remain the same.

Print

Description: To set the print properties to print the topology view.

Preview

Description: To preview the print result of the topology view. You can also print by using this icon.

Overview

Description: To display the overview. You can have a full view of the topology structure through the overview.

Search

Description: To search topology objects. It supports the wildcard character *, and the characters entered for the search must be less than 65 characters, and cannot be less than 0.

Refresh

Description: To refresh the topology view, and obtain the latest data from the M2000 server.

Save Positions

Description: To save the icon position. When you open the view next time, the topology view displays this position.

Legend/Filter/Attribute

Description: The Legend/Filter/Attribute pane is displayed on the right.

1-42

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Fault Tool Buttons


Icon Name Current Fault Alarms Description Description: The shortcut icon to query current fault alarms. Event Alarms Description: The shortcut icon to query event alarms. Browse Current Fault Alarms By Status Description: The shortcut icon to display current fault alarms by status. Description: The shortcut icon to statistics fault alarms.

Statistics Fault

Related Tasks
1.4.3 Setting the Toolbar

1.17.5 Parameters for Output GUI Information


This section describes the parameters in the Output Window group box. You can refer to these parameters when you set output information.

Parameters
Name Maximum Output Lines Description Description: The maximum lines that can be displayed in the output window. If the lines of output information exceed the maximum lines, the earliest input lines are deleted automatically and the maximum lines are displayed. Description: If you select this option and there is new output information, the output window scrolls to the new information automatically. If you deselect this option, you can only scroll to the new information manually. Settings Value: Value range: 30-3000

Automatically scroll to the new message

Setting method: Check box

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-43

1 Getting Started

M2000 Operator Guide

Name Automatic dump

Description Description: If you select this option, the output information is dumped to a file according to the preset conditions. Description: Dump lines of output information. The value cannot exceed the value set in Maximum Output Lines. If the value exceeds the preset maximum value, the output information is dumped to the corresponding file automatically, and the dump lines are the same as that set in Dump Lines.

Settings Setting method: Check box

Dump Lines

Value: Value range: 20-300

Dump File Name

Description: The dump path and dump file name of output information. The files must be saved in TXT format.

Setting method: Cannot be null.

Related Tasks
1.4.1 Setting Output Information

1.17.6 Parameters for Viewing NM License Information


This part gives the descriptions of the parameters for the License Information tab. You can view the NM license information by referring to the information below.

Parameters
Parameter License key Message Description Name of the License key. For the resource keys, the number of the authorized resources are displayed. For the function keys, the function is authorized if the value true is displayed.

Related Tasks
1.12 Viewing NM License Information

1.17.7 Parameters for Setting the Time Style


This section describes the parameters in the Time dialog box. You can refer to these parameters when you set the client time style.

1-44

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Parameters
Name Morning Indicator Description Description: Morning indicator. Settings Setting method: The default is AM. Cannot be modified on the client. Afternoon Indicator Description: Afternoon indicator. Setting method: The default is PM. Cannot be modified on the client. Time Separator Description: The sign to separate the time. Setting method: The default is :. Cannot be modified on the client. Time Format Description: HH:mm:ss: HH means 24-hour format, and the morning and afternoon indicators are not displayed. hh:mm:ss tt: hh means 12-hour format. tt is the suffix of morning or afternoon indicator. Show time zone offset Description: If you select the check box, the time zone is displayed next to the time. Setting method: Check box. Example: For example, 15:10:20 +08:00. Show daylight saving time (DST) Description: If you select the check box, the DST is displayed next to the time. Setting method: Check box. Example: For example, 15:10:20 DST. Setting method: The default is HH:mm:ss.

NOTE

IMSOMU, CSCF, HSS, ATS, RM, CCF, DOPRA, SBC, and MRF do not support multi-zone management and the DST.

Related Tasks
1.4.5.1 Setting the Time Format of the Client

1.17.8 Parameters for Setting Common Options for Performance Management


Setting common options for performance management involves setting the organization tree, status table, time parameter, and others.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-45

1 Getting Started

M2000 Operator Guide

Parameter Description
Parameter Orga nizat ion tree Organization Value Object type, Function subset Description In the organization style of the object type, right-click an object type in the organization tree and choose View the Function Subset. In this situation, the organization tree are organized by function subsets and only the function subsets of the object type are displayed. In the organization style of the function subset, right-click function subsets in the organization tree and choose Filter with Object Type,In this situation, only the function subsets that map the object type are displayed. After you deselect the options, all the function subsets are displayed. Default type of NE on which you will perform operations related to performance management. Measurement status table displays the measurement statuses you have selected. Display style of the measurement status table. Includes integrity query, specific query, missing result, and synchronize result. Defaults from 00:00 to 23:59. -

Switchable Expansion Default NE type Statu s table Default status

Yes, No Expand, Collapse -

All, Set, Measuring, Error, Suspended, Not set Expand, Collapse Integers from 1 to 336 5 minutes, 15 minutes, 30 minutes, 60 minutes, 24 hours All, Set

Default style Time para mete r Default time range Result segment Default measurement period Othe rs Background color Measurement export item

Background color of result table and monitoring chart. Select All to export all measurement settings of the selected nodes. Select Set to export the information of objects or counters you have set.

1-46

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Parameter Searching Item

Value Counter, NE&Object, Organization tree

Description Select the items to show search box for organization tree, NE and object, or counter in the correspond fields of the Measure Management window. Fuzzy search is supported.

Related Tasks
1.4.8 Setting Common Options for Performance Management

1.17.9 Parameters for the NE Partitioning Information


This topic describes the related parameters in the Query NE Subarea dialog box. You can refer to the these parameters when you check the NE partitioning information.

Parameter Description
Parameter Query Condition NE Subarea Description Host Name of the NE Partitioning When you query the specific partitioning information, you can select names of all partitions or the name of a specific partition from the dropdown list. indicates the NE Name. indicates the serial number of the NE. indicates the NE Name. indicates the version of the NE. indicates the usable capacity available. indicates the partitioning information about the NE,including the host name, the IP address, and the instance name of the database.

Ne Name Query Result No. NE Name NE Version Capability Statistic

Related Tasks
1.13 Viewing NE Partitioning

1.17.10 Parameters for User-Defined Object Groups


This describes the parameters related to user-defined object groups. You can refer to this part when adding or modifying user-defined object groups.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-47

1 Getting Started

M2000 Operator Guide

Parameter Description
Parameter Object Group Type Description Type of an object group The default types are: Office Group and RNC NE Group for the MSC Server, Cell Group for the RNC, and MSCServer NE Group.
NOTE You can add or delete object group types by modifying the configuration file on the server.

Select Attribute

Attribute

Logical attribute of an object, such as commissioning cell and VIP cell. Logical attributes are defined by the configuration file on the server. You can add or delete attributes by modifying the configuration file. Logical attribute value of an object Logical attribute values are defined by the configuration file on the server. You can add or delete attribute values by modifying the configuration file. Indicates that the objects are selected from the entire network Indicates that the objects are selected among the specified NEs Indicates that objects are selected from the created object groups A method for adding objects to a group. You can set search conditions to group the objects that meet the conditions. A method for adding objects to an object group. You need to manually add objects to an object group. A method for adding objects to an object group. Based on the selected object attribute, the system groups the objects that have the same value into a group. Attribute of an object, such as office name and office ID. Object attributes are defined by the configuration file on the server. You can add or delete object attributes by modifying the configuration file.

Attribute Value

Object Group Scope

Network NE NE Group

Create Type

By Condition

By Manual

AUTO

Setting conditions

Attribute

1-48

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

1 Getting Started

Parameter Operation

Description Used to compare object attribute values, such as =, >, <, >=, <=, and ! =. Value of an object attribute Object attribute values are defined by the configuration file on the server. You can add or delete object attribute values by modifying the configuration file. Used to set the relations between search conditions, such as and, or, and none.
NOTE The logical operator of the search condition in the last line must be none. The logical oprators used in the other lines cannot be none.

Expression

Logic

Objects Selected Objects Attribute for the Object Group

Objects that can be added to an object group Objects that are added to an object group Attribute of an object attribute, such as office ID Object attributes are defined by the configuration file on the server. You can add or delete object attributes by modifying the configuration file. Name of an object group A maximum of 250 characters are allowed. You enter English letters, numbers, and special characters excluding ` ! @ $ # % ^ & * | ' \ " / = . ?.

Object Group Name

Remark

Remark for an object group A maximum of 250 characters are allowed.

Related Concepts
1.16.1 User-Defined Object Groups

Related Tasks
1.16.2 Adding a User-Defined Object Group 1.16.3 Modifying a User-Defined Object Group 1.16.4 Viewing User-Defined Object Groups

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-49

M2000 Operator Guide

2 Network Monitoring

2
About This Chapter

Network Monitoring

On the M2000 client, you can monitor the alarms on the network, real-time NE performances, the RAN network, and operational status of the NM system. In this way, you can detect network faults in time and then perform the related operations. 2.1 Basic Knowledge of Monitoring To monitor the alarms, you need to familiarize yourself with certain knowledge, such as alarm severity, alarm status, and alarm report procedure. This helps you to better monitor the alarms generated on the network. 2.2 Monitoring Network Alarms In the M2000, you can monitor the network alarm through topology diagram, alarm board, alarm query, alarm statistics and so on. 2.3 Setting Alarm Auto Processing You can set an auto processing rules, and then the M2000 processes the alarms that match the preset conditions. This helps to improve the work efficiency. 2.4 Setting NE Alarms The M2000 provides the function of alarm shielding and alarm severity redefinition. You can shield unwanted alarms to prevent NEs from reporting them to the M2000. You can also redefine the severity of alarms to make the severity correctly reflect the actual situation. 2.5 Monitoring NE Performance in Real Time You can monitor in real time the specified object types and instances. In addition, you can display the monitoring results in data tables and figures. You can set filter conditions and display effects for the results. Then you save the results and figures to a file. 2.6 Integrated Network Monitoring The M2000 provides integrated network monitoring of the RNC, NodeB, and cells. This function includes managing object groups, monitoring network services, and managing real-time monitoring. Among these three functions, real-time monitoring is the most important. 2.7 NM System Monitoring The M2000 network element management system is the uniform management platform of the Huawei mobile network. It uniformly manages the mobile network elements manufactured by Huawei. On the M2000 client, you can monitor the operational status of the NM system, such
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-1

2 Network Monitoring

M2000 Operator Guide

as the status information about the memory, CPU, hard disks, database, processes, and services. In addition, you can set the alarm threshold of the server. 2.8 Reference for Network Monitoring Interfaces This describes the parameters used on the network monitoring interface, such as alarm monitoring, performance monitoring, RAN network monitoring, and NM system monitoring.

2-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.1 Basic Knowledge of Monitoring


To monitor the alarms, you need to familiarize yourself with certain knowledge, such as alarm severity, alarm status, and alarm report procedure. This helps you to better monitor the alarms generated on the network. 2.1.1 Alarm Management Alarm management involves alarm display and statistics, audio and visual alarm notification, alarm acknowledgement and synchronization. 2.1.2 Alarm Levels The M2000 defines the alarm to be four levels according to the severity of the alarm. You can adopt corresponding processing strategy for different alarm levels and redefine the alarm levels. 2.1.3 Alarm Status The M2000 divides the alarm into different states according to whether the alarm is confirmed or cleared. You can adopt corresponding processing measures for alarms of different states. 2.1.4 Fault Alarms and Event Alarms In the M2000, the alarm is classified into the fault alarm and event alarm according to the effect of the alarm to the system. 2.1.5 Alarm Types Based on deferent alarms resources, alarms can be classified into 11 types such as power system alarm and environment system alarm. 2.1.6 Alarm Reporting Procedure It describes the process from generating the fault to receiving the alarm notification by the user. 2.1.7 Alarm Auto-Triggering Script The repeat operations of the daily routine maintenance can be defined as an alarm auto-triggering script, which enables the M2000 server to execute the triggered script when the alarm meets the requirements of the triggering setting. The alarm auto-triggering script also enables the automation of the daily routine maintenance and improves the work efficiency.

2.1.1 Alarm Management


Alarm management involves alarm display and statistics, audio and visual alarm notification, alarm acknowledgement and synchronization.

Alarm Display and Statistics


The M2000 receives the NEs alarms in real time. It provides various methods of alarm display and statistics.
l

Alarm display Alarm display involves alarm board output and alarm query.

Alarm board output The alarm board collects statistics on the alarms of the managed objects by alarm levels and states with templates. Working as the monitoring panel, it provides the fault status of the entire system. For the description of the alarm board, see 2.3.2.2 Introduction to the Alarm Board.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-3

2 Network Monitoring

M2000 Operator Guide

Alarm query Alarm query is to query the current fault alarms, history fault alarms, event alarms, filtered fault alarms, and filtered event alarms. The M2000 can display fault alarms and event alarms in a window by different alarm status.

Alarm statistics The M2000 can collect statistics on fault alarms and event alarms according to the preset statistical conditions. The statistical conditions include alarm name, alarm level, alarm type, alarm raised time, and alarm status, and can be combinations of these items.

Audio and Visual Alarm Notification


The M2000 provides two means of alarm notification: the alarm box and the audio adapter.
l

Alarm Box The M2000 uses the general alarm box of Huawei Technologies Co., Ltd. to provide audio and visual alarm notification. You can set the filter conditions for the alarms that are sent to the alarm box.

Audio Adapter You can set different audio files for the alarms of different levels on the M2000 client. When an alarm is reported, the M2000 client where the audio adapter and sound box are installed plays corresponding sound to notify users. When the M2000 receives a new alarm, it notifies users of the alarm arrival by the speaker. You can set different audio files for different levels of alarms.

Alarm Acknowledgement
The M2000 supports manual and automatic acknowledgement of alarms.

Alarm Synchronization
The M2000 supports alarm synchronization with NEs. Through a client, you can manually synchronize the alarms between the M2000 and an NE.

Alarm Redefinition
You can change the alarm levels displayed on the client and highlight the required alarms by redefinition. The M2000 supports the level redefinition of the alarms on the NEs. You can reset an alarm level by alarm name.

Alarm Correlation Analysis


Alarm correlation analysis aims to set the correlation rules for the M2000 to analyze various alarms completely and automatically. The M2000 then shields the non-root alarms and finds the root alarms so that the maintenance personnel can locate and remove the faults efficiently. The M2000 supports alarm correlation analysis. It also supports correlation analysis between multiple NEs.

2-4

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Alarm Explanation and Maintenance Experience


The alarm explanation database introduces the alarm details. You cannot edit the information, and you can only query it. You can record the maintenance experience in the alarm experience database. When a similar fault occurs, you can refer to the experience to handle it.

Alarm Remote Notification


Remote notification provides methods to notify remote maintenance personnel of alarms. At present, the methods of email and short message service(SMS) are supported.

Alarm Auto-Triggering Script


After you specify the script to be triggered and set conditions for the triggering, and when the alarm meets the requirements of the triggering conditions, the server automatically triggers the execution of the shell script file set by the user. Partial automation for the daily routine maintenance work is realized. You can also set the repeated operations of the daily routine maintenance to an alarm auto-triggering script.

2.1.2 Alarm Levels


The M2000 defines the alarm to be four levels according to the severity of the alarm. You can adopt corresponding processing strategy for different alarm levels and redefine the alarm levels.

Alarm Levels
The alarm levels are described as follows:
l

Critical The device or resource may be no longer available. The fault must be removed immediately. Major The Quality of Service(QoS) of the device or resource decreases greatly. Proper measures must be taken to recover the service.

Minor The QoS of the device or resource decreases slightly. Proper measures must be taken or further observation need to be done to avoid more severe faults.

Warning The QoS of the device or resource may be affected. Proper measures must be taken.

Alarm Level Redefinition


Different handling policies apply to different levels of alarms. The M2000 supports alarm level redefinition. You can change the level of an alarm according to the actual requirements. For example, NE Z generates a lot of critical alarms M during upgrade. If it is determined that alarm M is not critical, you can change the alarm level of M to warning.

2.1.3 Alarm Status


The M2000 divides the alarm into different states according to whether the alarm is confirmed or cleared. You can adopt corresponding processing measures for alarms of different states.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-5

2 Network Monitoring

M2000 Operator Guide

1.

Alarm status
l l

The status of an event alarm involves: unacknowledged and acknowledged. The status of a fault alarm involves: unacknowledged and uncleared, acknowledged and uncleared, unacknowledged and cleared, and acknowledged and cleared.

2.

Condition for changing alarm status A certain condition triggers the change of the alarm status.
l

Clear an alarm When the condition that causes a fault alarm is removed, the device recovers to its normal state, the device reports a cleared alarm to the M2000. The source alarm are cleared. You can also clear an alarm manually.

Acknowledge an alarm If an alarm is acknowledged, it is processed. You can unacknowledge an acknowledged alarm.

3.

Alarm status conversion Figure 2-1 shows the model of the fault alarm status conversion. Figure 2-1 Model of the fault Alarm status conversion

NOTE

The acknowledged and cleared alarms are history alarms. The fault alarms in other status are current alarms. That is, the unacknowledged and uncleared, acknowledged and uncleared, unacknowledged and cleared fault alarms are current alarms.

2.1.4 Fault Alarms and Event Alarms


In the M2000, the alarm is classified into the fault alarm and event alarm according to the effect of the alarm to the system. Table 2-1 lists the differences between fault alarms and event alarms.

2-6

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Table 2-1 Differences between fault alarms and event alarms Alarm Category Fault alarm Definition A notification that the system provides when it detects a fault. Related Concept A fault is a physical or logical factor that causes the system to fail. For example, Central Processing Unit(CPU) busy, hard disk failure, or network cable disconnectio n. An event is a situation of the managed object. For example, succeeded in periodic export of operation logs. Events occur all the time. They have no negative impacts on the system. Cannot be cleared, but can be acknowledge d and unacknowle dged. You do not have to handle the event. Impact The system probably cannot work properly. Handling Can be cleared. Recommen dation Clear the alarm to restore the system to normal.

Event alarm

A notification that the system provides when it detects an event.

Table 2-2 gives two examples to help you understand the differences between fault alarms and event alarms. Table 2-2 Examples Alarm Name ALM-040 Device serial numbers mismatch Alarm Category Fault alarm Cause The system detects a fault: The MAC address (device serial number) of the network adapter does not match the device serial number of license. Impact Some functions are disabled. The system cannot work properly. Recommenda tion Handle the alarm. For example, apply for a new license file according to the MAC address of the new network adapter.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-7

2 Network Monitoring

M2000 Operator Guide

Alarm Name ALM-016 Overflow export of operation logs succeeded

Alarm Category Event alarm

Cause The system detects an event: Exporting the overflowed operation logs succeeded.

Impact None.

Recommenda tion You do not have to handle the alarm.

2.1.5 Alarm Types


Based on deferent alarms resources, alarms can be classified into 11 types such as power system alarm and environment system alarm. Table 2-3 shows the 11 types of alarm. Table 2-3 Complete procedure for creating a user Name Power system alarm Environment system alarm Description A power system alarm is raised by the power supply. An environment system alarm is an alarm about the environment of the equipment room, such as the temperature, humidity, or gate. A signaling system alarm is an alarm about the signaling system, such as No. 7 signaling. A trunk system alarm is an alarm about the trunk system, such as E1, STM-1 optical or electrical relay. A hardware system alarm is an alarm about a board device, such as clock or CPU. A software system alarm is an alarm about the software. A running system alarm is an alarm about the M2000 running. A communication system alarm is an alarm about the communication system. A QoS alarm is an alarm about the QoS. Processing error alarms are alarms about other exceptions that are not described here. An internal alarm is raised by the M2000. Except such alarms, other types of alarms are all external alarms reported by the devices.

Signaling system alarm Trunk system alarm Hardware system alarm Software alarm Running system alarm Communication system alarm QoS alarm Processing error alarm Internal alarm

2-8

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.1.6 Alarm Reporting Procedure


It describes the process from generating the fault to receiving the alarm notification by the user.

Flow Chart
Figure 2-2 shows the alarm reporting procedure. Figure 2-2 Alarm reporting procedure

Flow Description
The following is the description of the flow in Figure 2-2. 1. Reporting a alarm When a device raises an alarm, it sends the alarm to the M2000 by the Man-Machine Language(MML) protocol or Simple Network Management Protocol(SNMP). 2. Masking alarms The M2000 masks alarms based on the mask condition set by users. The alarms that match the condition are masked. 3. 4. Redefining the alarm level The M2000 redefines the alarm levels based on the redefinition conditions set by users. Analyzing alarm correlation The M2000 analyzes the alarm correlation based on the correlation rule and shield the repetitive or non-root alarms. 5. 6.
Issue 06 (2008-12-16)

Saving alarms After processing, the M2000 writes the alarms into the alarm database. Notifying the user of alarms
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-9

2 Network Monitoring

M2000 Operator Guide

The M2000 sends the alarm notifications to users based on the alarm notification rules set by users.

2.1.7 Alarm Auto-Triggering Script


The repeat operations of the daily routine maintenance can be defined as an alarm auto-triggering script, which enables the M2000 server to execute the triggered script when the alarm meets the requirements of the triggering setting. The alarm auto-triggering script also enables the automation of the daily routine maintenance and improves the work efficiency. The alarm auto-triggering script is a kind of the shell script, and thus is provided by the user. Correct script files are also guaranteed by the user. The M2000 does not provide functions such as editing and proofreading for the script files.
NOTE

shell script: indicates the program that is edited using the programing language UNIX shell. The shell script can be used to execute the complicated tasks, which cannot be executed using the command of the UNIX system itself.

2.2 Monitoring Network Alarms


In the M2000, you can monitor the network alarm through topology diagram, alarm board, alarm query, alarm statistics and so on. 2.2.1 Setting Columns in an Alarm Interface You can modify the alarm information and show some necessary columns as required. In addition, you can decide the columns to be shown, and adjust the sequence of the shown columns. 2.2.2 Manually Synchronizing NE Alarms To ensure that the M2000 fault alarms are consistent with the device fault alarms, you can manually synchronize the NE alarms to reflect the current running status of the device. 2.2.3 Locating Alarms When you browse alarms in the topology view or browse/query alarms in the alarm browse window, you can use the alarm topology locating function to locate the NE that raises the alarm by the alarm record. 2.2.4 Manually Clearing an Alarm The M2000 helps to clear a certain fault alarm manually. You can manually clear the alarms that cannot be recovered automatically or that are confirmed to be cleared. After rectifying the faults, the system considers that the faulty function is recovered. 2.2.5 Monitoring Alarms Through the Topology View You can choose to display the alarm list area under the topology view to monitor the alarm situation of the NEs in real-time. 2.2.6 Setting Alarm Real-Time Monitoring You can set alarm monitoring conditions to monitor the alarms that meet the conditions in real time. 2.2.7 Querying Alarms In the M2000, you can set the frequently used query conditions as an alarm query template, so that you can query the alarms with the same conditions. You can also set query conditions to query the current fault alarms, history fault alarms, event alarms, and masked alarms. 2.2.8 Collecting Alarm Statistics
2-10 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

By collecting alarm statistics, you can know the fault status of the network and obtain relevant data to remove faults and improve the network. You can set a query template based on the frequently used statistical conditions for future use. 2.2.9 Saving Alarm Data When querying or collecting statistics of alarms, you can save the alarm data to files. 2.2.10 Printing Alarm Data This task is performed to print the results of alarm query or alarm statistics. 2.2.11 Handling Alarms When you find an alarm, you need to take actions to handle it. The procedure of handling an alarm consists of viewing alarm details, acknowledging, locating, and clearing the alarm. 2.2.12 Setting the Displaying Location for a New Alarm Through this operation, you can set the new fault/event alarm to display the front or back of the alarm list, in order to view the newly reported alarm.

2.2.1 Setting Columns in an Alarm Interface


You can modify the alarm information and show some necessary columns as required. In addition, you can decide the columns to be shown, and adjust the sequence of the shown columns.

Context
You can make this settings in the following windows:
l l l l l l l

Current Fault Alarms Event Alarms Masked Fault Alarms Masked Event Alarms History Fault Alarms Browse Current Fault Alarms by Status Browse Current Event Alarms by Status

Procedure
Step 1 Open the 2.2.7 Querying Alarms window. Step 2 Right-click one alarm and select Configure Columns. The Configure Columns dialog box is displayed. Available column and Selected column respectively list all the available and selected columns. Step 3 Click an icon and perform the corresponding operation as show in the table below. Icon Description Add the selected column Remove the selected column

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-11

2 Network Monitoring

M2000 Operator Guide

Icon

Description Add all selected columns Remove all selected columns

Step 4 In Selected column, select a column and then click Up or Down to adjust the display sequence. Step 5 Choose Effective for the current window and new window of the same type or Effective for the current pane only. Optional Box Effective for the current window and new windows of the same type Effective for the current pane only Step 6 Click OK. The settings take effect. ----End Description This setting is effective for the alarm windows of the same type. This setting is effective only for the current alarm window.

Related References
2.8.10 Parameters for Setting Columns in an Alarm Interface

2.2.2 Manually Synchronizing NE Alarms


To ensure that the M2000 fault alarms are consistent with the device fault alarms, you can manually synchronize the NE alarms to reflect the current running status of the device.

Prerequisite
l l

You have logged in to the M2000 client. Uncleared fault alarms exist.

Context
The M2000 supports automatic alarm synchronization.

Procedure
Step 1 In the result window after you open 2.2.7.1 Querying Current Fault Alarms or 2.2.7.6 Displaying Fault Alarms by Status, right-click the fault alarms to be synchronized. Step 2 From the shortcut menu, select Synchronize. ----End

Related References
2.8.15 Parameters for Selecting Alarm Objects
2-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.2.3 Locating Alarms


When you browse alarms in the topology view or browse/query alarms in the alarm browse window, you can use the alarm topology locating function to locate the NE that raises the alarm by the alarm record.

Context
The topology location is applicable to only one alarm. If multiple alarms are chosen, even if they are raised by the same network element, the Topology Location item is disabled.

Procedure
l In the window for browsing the alarm query or statistical result, right-click an alarm record and choose Topology Location. The cursor is located to the NE that raises the alarm. l In the lower window of the topology view, right-click an alarm and choose Topology Location . The cursor is located to the NE that raises the alarm. ----End

2.2.4 Manually Clearing an Alarm


The M2000 helps to clear a certain fault alarm manually. You can manually clear the alarms that cannot be recovered automatically or that are confirmed to be cleared. After rectifying the faults, the system considers that the faulty function is recovered.

Context
A cleared alarm exists with a fault alarm. When a device is faulty, a fault alarm is reported to the M2000 server. After the fault is rectified, the cleared alarm is sent to the M2000 server, notifying that the alarm is cleared. After a fault alarm is acknowledged and cleared, it becomes a history alarm. The system dumps the alarm in the history fault alarm database for future reference.

Procedure
Step 1 In the 2.2.7.1 Querying Current Fault Alarms or 2.2.7.6 Displaying Fault Alarms by Status window, right-click the alarm to be cleared. A cleared alarm cannot be cleared again. Step 2 Select Clear from the from the shortcut menu. Change the state of the alarm to cleared. ----End

2.2.5 Monitoring Alarms Through the Topology View


You can choose to display the alarm list area under the topology view to monitor the alarm situation of the NEs in real-time.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-13

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the Main Topology window, click
NOTE

on the toolbar.

Click

again, the alarm browse window is hidden.

All the NE alarms are displayed in the alarm browse window below the topology view. Step 3 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse

2.2.6 Setting Alarm Real-Time Monitoring


You can set alarm monitoring conditions to monitor the alarms that meet the conditions in real time.

Context
The M2000 monitors all the alarms by default.

Procedure
Step 1 Choose Monitor > Alarm Real-time Monitor. Step 2 In the Alarm Real-time Monitor window, click Step 3 In the Filter dialog box, set alarm filtering conditions. 1. 2. Click the Base Setting tab. Set the Acknowledgement and Clearance. Click the Alarm Source tab. Set the alarm sources. .

Step 4 Click OK. Step 5 Optional: Click Refresh. Monitor the alarms that are newly reported in real time. ----End

Related References
2.8.11 Parameters for Monitoring Alarms in Real Time

2.2.7 Querying Alarms


In the M2000, you can set the frequently used query conditions as an alarm query template, so that you can query the alarms with the same conditions. You can also set query conditions to query the current fault alarms, history fault alarms, event alarms, and masked alarms.
2-14 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.2.7.1 Querying Current Fault Alarms You can find the specific fault alarms quickly by setting the fault alarm query conditions. 2.2.7.2 Querying History Fault Alarms You can find the specific history fault alarms quickly by setting the query conditions for history fault alarms. 2.2.7.3 Querying Event Alarms You can find the specific event alarms quickly by setting the event alarm query conditions. 2.2.7.4 Querying the Masked Fault Alarms You can find the masked fault alarms quickly by setting the query conditions for masked fault alarms. 2.2.7.5 Querying the Masked Event Alarms You can find the masked event alarms quickly by setting the query conditions for masked event alarms. 2.2.7.6 Displaying Fault Alarms by Status By this task, you can view the fault alarms of different status in a window. 2.2.7.7 Displaying Event Alarms by Status By this task, you can view the event alarms of different status in a window. 2.2.7.8 Setting an Alarm Query Template You can save the frequently used query conditions as templates for future use.

Related References
2.8.12 Parameters for Setting Alarm Query/Browse 2.8.14 Parameters for Selecting NE for Query

Querying Current Fault Alarms


You can find the specific fault alarms quickly by setting the fault alarm query conditions.

Procedure
Step 1 Choose Monitor > Current Fault Alarms, or click Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Click Save As to save the query result in a file.
NOTE

on the toolbar.

The format of the file can be *.txt, *.html, or *.csv. The default is *.csv.

Step 5 Optional: Click Print. In the Print dialog box, set the print parameters and then click Print. Step 6 Optional: Select Auto Refresh in the fault browse window. The alarms in the fault browse window are refreshed in real time. You can browse the latest alarms.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-15

2 Network Monitoring
NOTE

M2000 Operator Guide

After select Auto Refresh, the alarms are refreshed in real time, and the Refresh button is disabled. After you clear Auto Refresh, the Refresh button is enabled, and you can click Refresh to refresh alarms manually.

Step 7 Optional: Right-click an alarm in the browse window and choose Synchronize. The alarm data on the M2000 keep consistent with that on the NE. Step 8 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 9 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 10 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 11 Optional: Choose one or more alarms in the browse window, right-click and then choose Send Notification > Email or Send Notification > SMS. In the displayed dialog box, set the E-mail address or SMS number. Click OK.
NOTE

l l

You can select up to 10 alarms for remote notification. Otherwise, Send Notification is disabled. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server.

Step 12 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 13 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 14 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse 2.8.15 Parameters for Selecting Alarm Objects 2.8.16 Parameters for Selecting Alarm Name

2-16

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Querying History Fault Alarms


You can find the specific history fault alarms quickly by setting the query conditions for history fault alarms.

Procedure
Step 1 Choose Monitor > History Fault Alarms . Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 5 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 6 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 7 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 8 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 9 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse

Querying Event Alarms


You can find the specific event alarms quickly by setting the event alarm query conditions.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-17

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 Choose Monitor > Event Alarms, or click on the toolbar.

Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Click Save As to save the query result in a file.
NOTE

The format of the file can be *.txt, *.html, or *.csv. The default is *.csv.

Step 5 Optional: Click Print. In the Print dialog box, set the print parameters and then click Print. Step 6 Optional: Select Auto Refresh in the fault browse window. The alarms in the fault browse window are refreshed in real time. You can browse the latest alarms.
NOTE

After select Auto Refresh, the alarms are refreshed in real time, and the Refresh button is disabled. After you clear Auto Refresh, the Refresh button is enabled, and you can click Refresh to refresh alarms manually.

Step 7 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 8 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 9 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 10 Optional: Choose one or more alarms in the browse window, right-click and then choose Send Notification > Email or Send Notification > SMS. In the displayed dialog box, set the E-mail address or SMS number. Click OK.
NOTE

l l

You can select up to 10 alarms for remote notification. Otherwise, Send Notification is disabled. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server.

Step 11 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 12 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 13 Optional: Right-click an alarm in the browse window and choose Masked Alarm .
2-18 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

l l

In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse 2.8.15 Parameters for Selecting Alarm Objects

Querying the Masked Fault Alarms


You can find the masked fault alarms quickly by setting the query conditions for masked fault alarms.

Context
The masked alarm is the alarm that is masked by the alarm correlation rules. It includes masked fault alarms and masked event alarms.

Procedure
Step 1 Choose Monitor > Masked Fault Alarms. Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Click Save As to save the query result in a file.
NOTE

The format of the file can be *.txt, *.html, or *.csv. The default is *.csv.

Step 5 Optional: Click Print. In the Print dialog box, set the print parameters and then click Print. Step 6 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 7 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 8 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 9 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-19

2 Network Monitoring

M2000 Operator Guide

Step 10 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 11 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse

Querying the Masked Event Alarms


You can find the masked event alarms quickly by setting the query conditions for masked event alarms.

Context
The masked alarm is the alarm that is masked by the alarm correlation rules. It includes masked fault alarms and masked event alarms.

Procedure
Step 1 Choose Monitor > Masked Event Alarms. Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Click Save As to save the query result in a file.
NOTE

The format of the file can be *.txt, *.html, or *.csv. The default is *.csv.

Step 5 Optional: Click Print. In the Print dialog box, set the print parameters and then click Print. Step 6 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 7 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 8 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time.
2-20 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

The alarms are displayed according to the time mode you set. Step 9 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 10 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 11 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Related References
2.8.12 Parameters for Setting Alarm Query/Browse

Displaying Fault Alarms by Status


By this task, you can view the fault alarms of different status in a window.

Context
NOTE

Up to 1000 fault alarms of each state can be displayed.

Procedure
Step 1 Choose Monitor > Browse Current Fault Alarms By Status , or click on the toolbar.

Step 2 In the Filter dialog box, set the parameters for the fault alarm display. Click OK. Step 3 Optional: Select Auto Refresh in the fault browse window. The alarms in the fault browse window are refreshed in real time. You can browse the latest alarms.
NOTE

After select Auto Refresh, the alarms are refreshed in real time, and the Refresh button is disabled. After you clear Auto Refresh, the Refresh button is enabled, and you can click Refresh to refresh alarms manually.

Step 4 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 5 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-21

2 Network Monitoring

M2000 Operator Guide

Step 6 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 7 Optional: Choose one or more alarms in the browse window, right-click and then choose Send Notification > Email or Send Notification > SMS. In the displayed dialog box, set the E-mail address or SMS number. Click OK.
NOTE

l l

You can select up to 10 alarms for remote notification. Otherwise, Send Notification is disabled. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server.

Step 8 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 9 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 10 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. Step 11 Optional: Click the number buttons 1, 2, 3, and 4 to open or close the panes corresponding to the numbers. ----End

Displaying Event Alarms by Status


By this task, you can view the event alarms of different status in a window.

Context
NOTE

Up to 1000 event alarms of each state can be displayed.

Procedure
Step 1 Choose Monitor > Browse Event Alarms By Status. Step 2 In the Filter dialog box, set the parameters for the event alarm display. Click OK. Step 3 Optional: Select Auto Refresh in the fault browse window. The alarms in the fault browse window are refreshed in real time. You can browse the latest alarms.
NOTE

After select Auto Refresh, the alarms are refreshed in real time, and the Refresh button is disabled. After you clear Auto Refresh, the Refresh button is enabled, and you can click Refresh to refresh alarms manually.

2-22

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 4 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 5 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 6 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 7 Optional: Choose one or more alarms in the browse window, right-click and then choose Send Notification > Email or Send Notification > SMS. In the displayed dialog box, set the E-mail address or SMS number. Click OK.
NOTE

l l

You can select up to 10 alarms for remote notification. Otherwise, Send Notification is disabled. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server.

Step 8 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 9 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 10 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End

Setting an Alarm Query Template


You can save the frequently used query conditions as templates for future use.

Context
l l

You can set a maximum of one default template and five autoloading templates. In the template navigation tree, the default icon of a template is template is , and the icon of an autoloading template is . and autoloading, the icon is , the icon of a default

. For the template that is default

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-23

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 In the alarm query window, click Template, choose New. Step 2 In the Enter The Template Name dialog box, set the template name. Click Set default template or Set auto load template as required, and then click OK.
l

After you log in M2000 on the client, the M2000 automatically opens all autoloading templates and displays corresponding alarms of these templates. When you query alarms, the M2000 automatically opens the default template.

Step 3 In the Filter dialog box, set the alarm query conditions. Step 4 Click OK. Step 5 In the Confirmation dialog box, click Yes. ----End

2.2.8 Collecting Alarm Statistics


By collecting alarm statistics, you can know the fault status of the network and obtain relevant data to remove faults and improve the network. You can set a query template based on the frequently used statistical conditions for future use. 2.2.8.1 Collecting Statistics on Fault Alarms You can collect statistics on fault alarms by setting fault alarm statistical conditions. 2.2.8.2 Collecting Statistics on Event Alarms You can collect statistics on event alarms by setting event alarm statistical conditions. 2.2.8.3 Setting a Manual Alarm Statistics Template You can set a manual alarm statistics template based on the frequently used statistical conditions. When you want to collect statistics on the alarms with the same conditions, you can use the template and do not have to set the conditions. It is very convenient.

Related References
2.8.13 Parameters for Setting Alarm Statistics

Collecting Statistics on Fault Alarms


You can collect statistics on fault alarms by setting fault alarm statistical conditions.

Context
The M2000 supports up to 400,000 statistical results. Because the count of the statistical results is the permutation result of all the statistical items and the statistical results with 0 are not displayed on the client, the displayed statistical results are less than the total statistical results.

Procedure
Step 1 Choose Monitor > Fault Alarm Statistics. Step 2 In the Statistic Filter dialog box, set the fault alarm statistical conditions, and then click OK.
2-24 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

2 Network Monitoring

The statistical results are displayed on the Table and Pie tabs.
l l

Table: The results are listed in a table. Pie: Different statistic items are displayed in different pie charts. Click the tab of an item name to view its pie chart.

Step 3 Optional: In the statistical result window, click Save As to save the result in a file.
NOTE

Click the Table tab. The file can be saved in the *.txt, *.html, or *.csv format.
NOTE

When a CSV file contains more than 256 lines, it cannot be opened by Excel. Use a text editing tool such as UltraEdit or notepad to open the file.
l

Click the Pie tab. The file is saved in the *.jpg format.

Step 4 Optional: In the statistical result window, click the Table tab. Click Print to print the statistical result. ----End

Related References
2.8.16 Parameters for Selecting Alarm Name

Collecting Statistics on Event Alarms


You can collect statistics on event alarms by setting event alarm statistical conditions.

Context
The M2000 supports up to 400,000 statistical results. Because the count of the statistical results is the permutation result of all the statistical items and the statistical results with 0 are not displayed on the client, the displayed statistical results are less than the total statistical results.

Procedure
Step 1 ChooseMonitor > Event Alarm Statistics. Step 2 In the Statistic Filter dialog box, set the event alarm statistical conditions, and then click OK.
NOTE

The statistical results are displayed on the Table and Pie tabs.
l l

Table: The results are listed in a table. Pie: Different statistic items are displayed in different pie charts. Click the tab of an item name to view its pie chart.

Step 3 Optional: In the statistical result window, click Save As to save the result in a file.
NOTE

Click the Table tab. The file can be saved in the *.txt, *.html, or *.csv format.
NOTE

When a CSV file contains more than 256 lines, it cannot be opened by Excel. Use a text editing tool such as UltraEdit or notepad to open the file.
l

Click the Pie tab. The file is saved in the *.jpg format.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-25

2 Network Monitoring

M2000 Operator Guide

Step 4 Optional: In the statistical result window, click the Table tab. Click Print to print the statistical result. ----End

Setting a Manual Alarm Statistics Template


You can set a manual alarm statistics template based on the frequently used statistical conditions. When you want to collect statistics on the alarms with the same conditions, you can use the template and do not have to set the conditions. It is very convenient.

Context
l l

You can set a maximum of one default template and five autoloading templates. In the template navigation tree, the default icon of a template is template is , and the icon of an autoloading template is . and autoloading, the icon is , the icon of a default

. For the template that is default

The M2000 supports up to 400,000 statistical results. Because the count of the statistical results is the permutation result of all the statistical items and the statistical results with 0 are not displayed on the client, the displayed statistical results are less than the total statistical results.

Procedure
Step 1 Choose Monitor > Fault Alarm Statistics or Monitor > Event Alarm Statistics. Step 2 In the Statistic Filter window, click Cancel. Step 3 In the statistic window, click Template, and then select New. Step 4 In the Enter The Template Name dialog box, enter the template name. Select Set Default Template or Set auto load template as required, and then click OK.
l

After you log in M2000 on the client, the M2000 automatically opens all autoloading templates and displays corresponding alarms of these templates. When you statistic alarms, the M2000 automatically opens the default template.

Step 5 In the Statistic Filter dialog box, set the alarm statistical conditions, and then click OK. Step 6 In the Confirmation dialog box, click Yes. ----End

2.2.9 Saving Alarm Data


When querying or collecting statistics of alarms, you can save the alarm data to files.

Prerequisite
The Alarm Browse, Query and Statistics window is open and the results of the alarm query or statistics are displayed.
2-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Context
l

You can save all or selected alarm information in the Current Fault Alarms tab, the Event Alarms tab, the History Fault Alarms, the Masked Fault Alarms tab, and the Masked Event Alarms tab. You can save only selected alarm information in the Browse Current Fault Alarms by Status tab and the Browse Current Event Alarms by Status tab. You can save the statistic results of all alarm records.

Procedure
Step 1 In the 2.2.7 Querying Alarms or 2.2.8 Collecting Alarm Statistics window, open the Save dialog box. Save Range All alarm records Operation Click Save As.

Selected alarm records Right-click the alarm information to be saved and choose Save Selected Record(s) on the shortcut menu.
NOTE You can press Ctrl or Shift to select multiple alarm records at the same time.

Step 2 Specify the file path. Step 3 Specify the file name. The name can comprise letters, numbers, and characters. The file name, however, cannot contain the following characters: * " ? / | < > Step 4 Specify the file type under File Type. Step 5 In the Save dialog box, click Save. The Saving ... dialog box is displayed. This dialog box indicates the saving progress. ----End

2.2.10 Printing Alarm Data


This task is performed to print the results of alarm query or alarm statistics.

Prerequisite
The alarm query or statistics interface is open and displays the required alarm information.

Context
l

You can print all or selected alarm information in the Current Fault Alarms tab, the Event Alarms tab, the History Fault Alarms tab, the Masked Fault Alarms tab, and the Masked Event Alarms tab. You can print the statistic results of all alarm records.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-27

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 In the 2.2.7 Querying Alarms or 2.2.8 Collecting Alarm Statistics window, open the Print dialog box. Print Range All alarm records Operation Click Print.

Selected alarm records Right-click the alarm information to be printed and choose Print Selected Record(s) on the shortcut menu.
NOTE You can press Ctrl or Shift to select multiple alarm records at the same time.

Step 2 On the General tab, specify the printing service, scope, and copies.
TIP

If you select Print To File on the General tab, the Print To File dialog box is displayed. Specify the file name and path in the dialog box, and then click OK to save the alarm information to a specific file.

Step 3 On the Page Setup tab, specify the paper attributes, such as the size, source, orientation, and margins. Step 4 On the Appearance tab, specify the printing attributes, such as the color appearance, quality, sides, and job attributes. Step 5 Click Print. The Printing... dialog box is displayed. This dialog box indicates the saving progress. ----End

2.2.11 Handling Alarms


When you find an alarm, you need to take actions to handle it. The procedure of handling an alarm consists of viewing alarm details, acknowledging, locating, and clearing the alarm. 2.2.11.1 Procedure for Handling Fault Alarms The procedure for fault handling consists of three phases: information collection, fault location, and fault removal. After receiving an alarm, you need to collect fault information, analyze fault causes, locate the fault, remove the fault, and restore the system. 2.2.7.1 Querying Current Fault Alarms You can find the specific fault alarms quickly by setting the fault alarm query conditions. 2.2.11.3 Viewing Alarm Details By querying alarm details, you can obtain the information such as the alarm name, alarm location, and alarm level. 2.2.11.4 Acknowledging Alarms Alarm acknowledgement allows you to check if an alarm has been handled. You can easily distinguish between the alarms you have handled and those you have not handled. You can then take proper measures to handle them. 2.2.11.5 Removing Alarm-Related Faults
2-28 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

To remove alarm-related faults, you find causes of the alarms and then clear the causes to ensure the proper operation of the system. To remove alarm-related faults, you many need relevant personnel to assist you. 2.2.11.6 Clearing Alarms You can manually clear the alarms that cannot be cleared automatically or the alarms that have been acknowledged. After a fault alarm is cleared, the M2000 considers that the fault that causes the alarm is removed. 2.2.11.7 Recording Alarm Handling Experience You can record the alarm handling experience in the knowledge base. When a similar alarm occurs, you can refer to the experience in the database to handle it. 2.2.11.8 Exporting Maintenance Experience When you record the alarm maintenance experience in a server, you can export the information from the alarm experience base to back up or synchronize the information to another server. 2.2.11.9 Importing Maintenance Experience You can import the alarm maintenance experience from a server to the alarm maintenance base, to back up or synchronize the information to another server. 2.2.11.10 Example: Alarm Handling This section provides an example on how to handle the issue of insufficient disk space. It describes the procedure and method for handling alarms. You can know the basic procedure and operation of alarm handling from this example.

Procedure for Handling Fault Alarms


The procedure for fault handling consists of three phases: information collection, fault location, and fault removal. After receiving an alarm, you need to collect fault information, analyze fault causes, locate the fault, remove the fault, and restore the system.

Flow Chart
Figure 2-3 shows the fault handling procedure.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-29

2 Network Monitoring

M2000 Operator Guide

Figure 2-3 Fault handling procedure

Procedure
The fault handling procedure, as shown in Figure 2-3, is described inTable 2-4.

2-30

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Table 2-4 Fault handling procedure Step 1 Operation Receive an alarm Description After you receive an alarm, start the alarm handling procedure. To ensure that the operators can receive notifications in time when a fault occurs, you need to set alarm notification methods on the M2000. This is where you start. View the alarm details, including the alarm location information, alarm help, and alarm maintenance experience. To avoid others handling the same alarm, you need to acknowledge it. When you acknowledge an alarm, it indicates that the alarm is being processed. By locating an alarm, you can query the fault information and analyze the causes of the fault. Analyze the causes of the fault according to the fault information. Work out the fault handling scheme according to the alarm details, device manuals, network status, and maintenance experience. Carry out the fault handling scheme to remove the fault. When the fault is removed, the alarm is cleared, and the M2000 receives the cleared alarm. After the fault is removed, check the handling results. After you complete the fault handling, record the maintenance experience.

View the alarm details

Acknowledge the alarm Collect fault information Analyze the causes of the alarm Work out the fault handling scheme Carry out the fault handling scheme Clear the alarm Check the handling results Record the maintenance experience

4 5 6

7 8 9 10

Querying Current Fault Alarms


You can find the specific fault alarms quickly by setting the fault alarm query conditions.

Procedure
Step 1 Choose Monitor > Current Fault Alarms, or click Step 2 In the Filter dialog box, set the alarm query conditions. Step 3 Click OK. The query result is displayed in the browse window. Step 4 Optional: Click Save As to save the query result in a file. on the toolbar.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-31

2 Network Monitoring
NOTE

M2000 Operator Guide

The format of the file can be *.txt, *.html, or *.csv. The default is *.csv.

Step 5 Optional: Click Print. In the Print dialog box, set the print parameters and then click Print. Step 6 Optional: Select Auto Refresh in the fault browse window. The alarms in the fault browse window are refreshed in real time. You can browse the latest alarms.
NOTE

After select Auto Refresh, the alarms are refreshed in real time, and the Refresh button is disabled. After you clear Auto Refresh, the Refresh button is enabled, and you can click Refresh to refresh alarms manually.

Step 7 Optional: Right-click an alarm in the browse window and choose Synchronize. The alarm data on the M2000 keep consistent with that on the NE. Step 8 Optional: Choose one or more alarms in the browse window, right-click and then choose Configure Columns. In the Configure Columns dialog box, select the columns to be displayed in the browse window and the area where the column settings take effect. Click OK. The alarms are displayed according to your settings. Step 9 Optional: Choose one or more alarms in the browse window, right-click and then choose Mix Sorting. In the Mix Sorting dialog box, set the keywords, and then select Ascending or Descending. Click OK. The alarms are displayed according to the keywords you set. Step 10 Optional: Choose one or more alarms in the browse window, right-click and then choose Display Time Mode > Server Time or Display Time Mode > NE Time. The alarms are displayed according to the time mode you set. Step 11 Optional: Choose one or more alarms in the browse window, right-click and then choose Send Notification > Email or Send Notification > SMS. In the displayed dialog box, set the E-mail address or SMS number. Click OK.
NOTE

l l

You can select up to 10 alarms for remote notification. Otherwise, Send Notification is disabled. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server.

Step 12 Optional: Right-click an alarm in the browse window and choose Topology Location . The cursor is located to the NE that raises the alarm. Step 13 Optional: Right-click an alarm in the browse window and choose Details , or double-click the alarm. In the displayed dialog box, you can view the name, location, and severity of the alarm. Step 14 Optional: Right-click an alarm in the browse window and choose Masked Alarm . l l In the displayed dialog box, you can click Previous to view the masked alarm of the previous alarm. In the displayed dialog box, you can click Next to view the masked alarm of the next alarm.

In the displayed dialog box, you can view the masked alarm of the alarm. ----End
2-32 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Related References
2.8.12 Parameters for Setting Alarm Query/Browse 2.8.15 Parameters for Selecting Alarm Objects 2.8.16 Parameters for Selecting Alarm Name

Viewing Alarm Details


By querying alarm details, you can obtain the information such as the alarm name, alarm location, and alarm level.

Procedure
Step 1 In the window for browsing alarm query result, double-click an alarm or right-click an alarm and choose Detail Information. Step 2 In the Detail Information window, click Modify below the Alarm Experience text box. Enter the alarm maintenance experience. Then Click Add or Modify below the Alarm Memo text box. Enter the remarks. Then click Close. ----End

Related References
2.8.20 Parameters for Viewing Alarm Details

Acknowledging Alarms
Alarm acknowledgement allows you to check if an alarm has been handled. You can easily distinguish between the alarms you have handled and those you have not handled. You can then take proper measures to handle them.

Procedure
Step 1 In the window for browsing the alarm query result, right-click an alarm and choose Acknowledge .
NOTE

If the alarm you click is acknowledged, Acknowledge in the shortcut menu is disabled, and Unacknowledge is enabled.

Step 2 In the Confirmation dialog box, click Yes.


NOTE

After an alarm is acknowledged, you can click Unacknowledge to recover the alarm state to unacknowledged.

----End

Removing Alarm-Related Faults


To remove alarm-related faults, you find causes of the alarms and then clear the causes to ensure the proper operation of the system. To remove alarm-related faults, you many need relevant personnel to assist you.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-33

2 Network Monitoring

M2000 Operator Guide

Prerequisite
You have obtained alarm-related information. For details, refer to 2.2.11.3 Viewing Alarm Details.

Context
l

For fault alarms, you need to remove related alarms based on the causes of the alarms. When multiple fault alarms exist at the same time, you need to determine the priority of these alarms according to the alarm severity and the operational status of the current network. For event alarms, you need only to inform the occurrence of the alarms and does not need to remove the faults.

Procedure
Step 1 Check the online help of an alarm to know alarm explanation and treatment suggestions. You can select the Alarm Details tab in the Alarm Details dialog box. Click More information to view the online help associated with the alarm. Step 2 Check the treatment experience of the alarm-related fault. You can choose the Knowledge and Explanation tab in the Alarm Details dialog box to view the information in the Knowledge frame. Step 3 Contact relevant personnel to remove alarm-related faults according to treatment suggestions and recorded fault treatment experience. ----End

Postrequisite
After fault alarms are removed, the system automatically sets the state of the alarm to be Cleared.

Clearing Alarms
You can manually clear the alarms that cannot be cleared automatically or the alarms that have been acknowledged. After a fault alarm is cleared, the M2000 considers that the fault that causes the alarm is removed.

Context
l

One cleared alarm corresponds to one fault alarm. When the device is faulty, the fault alarm is reported to the M2000. After the fault is removed, the device sends the notification to the M2000, and the fault alarm is cleared automatically. The acknowledged and cleared fault alarms are history fault alarms. They are saved in the database of the history fault alarm for further query.

Procedure
Step 1 In the window for browsing the alarm query result, right-click a fault alarm and select Clear .
2-34 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

2 Network Monitoring

If you right-click the fault alarm that has been cleared, the Clear menu is disabled.

Step 2 In the Confirmation dialog box, click Yes. The alarm status changes to Cleared. ----End

Recording Alarm Handling Experience


You can record the alarm handling experience in the knowledge base. When a similar alarm occurs, you can refer to the experience in the database to handle it.

Context
The initial knowledge base is empty.

Procedure
Step 1 ChooseMonitor > Settings > Explain and Experience. Step 2 In the Search by name text box, enter the key word of an alarm name. In the Alarm names navigation tree, alarm names with the key word are listed. Step 3 In the Alarm names navigation tree, choose an alarm name, ClickModify.
NOTE

You can choose one or more options from Group by NE Type, Group by Alarm Type, Group by Alarm Level, and Group by Category. This helps you to locate an alarm name more quickly in the navigation tree.

Step 4 In the Modify Experience group box, enter the alarm handling experience. Step 5 Click OK. ----End

Related References
2.8.17 Parameters for the Alarm Explanation and Maintenance Experience

Exporting Maintenance Experience


When you record the alarm maintenance experience in a server, you can export the information from the alarm experience base to back up or synchronize the information to another server.

Context
Do not modify the experience base file on the disk manually.

Procedure
Step 1 Choose Monitor > Settings > Explain and Experience. Step 2 In the Explain and Experience window, in the Search by name text box, enter the keywords of the alarm name.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-35

2 Network Monitoring

M2000 Operator Guide

The Alarm names navigation tree displays the alarm names that contain the keywords. Step 3 From the Alarm names navigation tree, select the name of the alarm whose maintenance experience you want to export, and then click Import. You can also select one or more from the Group by NE type, Group by alarm type, Group by alarm severity, and Group by category to sort the alarms. In the Alarm names navigation tree, select the name of the alarm whose maintenance experience you want to export. Step 4 In the Export Experience dialog box, click .

Step 5 In the Export dialog box, set the path, file name and file type of the exported file, and then click OK.
NOTE

The maintenance experience can only be exported as XML or CSV file.

Step 6 In the Export Experience dialog box, select Export All or Export by NE Type, and then click Export. ----End

Importing Maintenance Experience


You can import the alarm maintenance experience from a server to the alarm maintenance base, to back up or synchronize the information to another server.

Context
Do not modify the maintenance base file on the disk manually.

Procedure
Step 1 Choose Monitor > Settings > Explain and Experience. Step 2 In the Explain and Experience window, in the Search by name text box, enter the keywords of the alarm name. The Alarm names navigation tree displays the alarm names that contain the keywords. Step 3 From the Alarm names navigation tree, select the names of the alarms to be imported to the explanation and experience database. Click Import. You can also select one or more of Group by NE type, Group by alarm type, Group by alarm severity, and Group by category to sort the alarms. From the Alarm names navigation tree, select the names of the alarms to be imported to the explanation and experience database. Step 4 In the Import Experience dialog box, click .

Step 5 In the Open dialog box, select the target file, and then click Open.
NOTE

Only the files in the XML format can be imported to the explanation and experience database.

Step 6 In the Import Experience dialog box, select Add or Update, and then click Import. Step 7 In the Confirmation dialog box, click Yes. ----End
2-36 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Example: Alarm Handling


This section provides an example on how to handle the issue of insufficient disk space. It describes the procedure and method for handling alarms. You can know the basic procedure and operation of alarm handling from this example.

Background
Administrator A finds that the M2000 reports a new alarm.

Operation Guide
Based on the Alarm Handling Procedure, administrator A has taken the following actions: 1. Receive the alarm notification. On the client, choose Monitor > Current Fault Alarms to browse the alarm list. An uncleared alarm with Identity(ID) 34 is found. The M2000 server has insufficient disk space. 2. 3. View the alarm details. Double-click this alarm to view its details. Acknowledge the alarm. The results indicate that the fault is removed. Now, the alarm can be acknowledged. In the alarm list, right-click this alarm and choose Acknowledge . In the Configuration dialog box, click OK. 4. Work out the alarm handling method. According to the fault management tips, maintenance experience, and the running status of the M2000, administrator A decides to delete the redundant files and back up the exported data on other disks. 5. Remove the relevant fault. Delete the redundant files of the M2000. Back up the export files to other disks. Then delete the exported data from the source disk. The M2000 server then has more available disk space. 6. Check the handling results. On the client, choose Monitor > Current Fault Alarms to browse the alarm list. The status of the alarm is changed from uncleared to cleared. 7. Record the alarm handling experience. On the client, choose Monitor > Settings > Explain and Experience. In the Explain and Experience tab. Search for the alarm and edit its maintenance experience.

2.2.12 Setting the Displaying Location for a New Alarm


Through this operation, you can set the new fault/event alarm to display the front or back of the alarm list, in order to view the newly reported alarm.

Procedure
Step 1 Choose System > Preferences. Step 2 Expand Alarm Local Terminal Settings , and then select New Fault/Event Alarms.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-37

2 Network Monitoring

M2000 Operator Guide

Step 3 In the New Fault/Event Alarms group box, click Display on top or Display at the bottom. Step 4 Click OK. The new fault/event alarm is displayed at the beginning or end of the alarm list. ----End

2.3 Setting Alarm Auto Processing


You can set an auto processing rules, and then the M2000 processes the alarms that match the preset conditions. This helps to improve the work efficiency. 2.3.1 Alarm Auto Processing Policies Alarm auto processing policy involves alarm filter, alarm auto acknowledgement, and alarm level redefinition. By alarm auto processing, the M2000 processes the alarm that match certain conditions in different ways; thus it improves the efficiency of alarm processing. 2.3.2 Setting Alarm Notification The M2000 provides you with multiple alarm notification methods, such as alarm board, alarm box, email, and short message service (SMS). You can customize the methods to obtain the latest alarm information in time. 2.3.3 Setting Alarm Remote Notification When you set the remote notification for alarms, you need to set the parameters, including the parameters for the notification by email and SMS. 2.3.4 Setting Alarm Filter Rules You can set the alarm filter rules to filter fault alarms and event alarms. The filtered alarms are discarded and are not saved in the alarm database. 2.3.5 Setting Alarm Auto Acknowledgement For the purpose of maintenance, the M2000 provides the real-time auto acknowledgement for the unacknowledged and cleared fault alarms. 2.3.6 Setting Redefinition of Alarm Level In the M2000, you can redefine the alarm levels according to the actual requirements. You can set the levels of the alarms that are not concerned to lower ones, and set the levels of the alarms that are concerned to higher ones. 2.3.7 Setting Alarm Correlation Rules You can set an alarm correlation rule to enable the M2000 to filter unnecessary alarm information. This improves the efficiency of handling alarms.M2000The M2000 provides multiple analysis methods, such as intermittent fault alarm analysis, repeat event analysis, and custom correlation analysis. 2.3.8 Managing Auto-Triggering Script Tasks The alarm auto-triggering script task realizes partial automation of the routine maintenance work by automatically triggering and executing the shell script file that is set by the user. Through the M2000 client, you can add the auto-triggering tasks, check the task attributes,and check the specific task and the auto-triggering conditions.

2.3.1 Alarm Auto Processing Policies


Alarm auto processing policy involves alarm filter, alarm auto acknowledgement, and alarm level redefinition. By alarm auto processing, the M2000 processes the alarm that match certain conditions in different ways; thus it improves the efficiency of alarm processing.
2-38 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

The auto processing policies involve the following: 1. Alarm filter If you are not concerned about some alarms, you can set the M2000 to filter them. For example, when the equipment is under maintenance or test, mass alarms are raised. Such alarms can be filtered. 2. Alarm auto acknowledgement After the related faults are removed, you do not have to manually acknowledge the cleared alarms. You can set the auto acknowledgement condition so that the M2000 can acknowledge alarms based on the condition automatically. 3. Alarm level redefinition You can redefine the alarm levels on the M2000 according to the actual requirements.

2.3.2 Setting Alarm Notification


The M2000 provides you with multiple alarm notification methods, such as alarm board, alarm box, email, and short message service (SMS). You can customize the methods to obtain the latest alarm information in time. 2.3.2.1 Alarm Notification Methods The M2000 provides various notification methods, such as alarm browser notification, topology view icon notification, alarm sound box notification, alarm board notification, alarm box notification and remote notification. These notifications help you to obtain the alarm information. 2.3.2.2 Introduction to the Alarm Board The alarm board uses color indicators to identify different levels of alarms. You can customize the indicator colors and alarm sounds. 2.3.2.3 Setting the Alarm Board You can set the following on the alarm board: whether the alarm box pops up automatically and whether the alarm indicator blinks when an alarm is raised; and whether to bind the fault template or event template with the alarm board. 2.3.2.4 Setting the Alarm Box You can set filter conditions for the alarm box on the client. Alarms that match the conditions are sent to the alarm box and prompted in audio and visual mode. 2.3.2.5 Setting the Alarm Sound You can set the alarm sound for each alarm level. When an alarm is raised, the sound box plays the corresponding alarm sound. You can also disable or enable the alarm sound. 2.3.2.6 Setting the Alarm Color You can set a color for each alarm level. This helps you browse different alarms easily. 2.3.2.7 Setting Alarm Highlight After you set the alarm highlight, an alarm is highlighted in the alarm query result window when it is not handled in the preset period.

Alarm Notification Methods


The M2000 provides various notification methods, such as alarm browser notification, topology view icon notification, alarm sound box notification, alarm board notification, alarm box
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-39

2 Network Monitoring

M2000 Operator Guide

notification and remote notification. These notifications help you to obtain the alarm information. The M2000 provides the following notification methods:
l

Alarm browser The alarm browser is a window on the client. You can browse alarms in real time by using the browser. The M2000 also enables you to query specified alarms, such as event alarms, history alarms, or current alarms.

Topology view The topology view is a view that shows the device distribution on the client. The device icons in the view show the alarm status through their colors and status. You can observe the icons to know whether an alarm occurs to a device and the severity and status of the alarm.

Alarm speaker The alarm speaker notifies users of the current alarm by playing a sound. To use the alarm speaker, connect it to the M2000 server or client and set the parameters. You can know new alarms and their severities by using the alarm speaker.

Alarm board The alarm board is a board on the client. It displays the alarm status through flashing indicators and statistics. You can monitor the alarms in the network through this board to know alarm severity and related statistics.

Alarm box An alarm box is a hardware that prompts alarms in audio and video mode. An alarm box consists of an amplifier and four indicators. It connects to the M2000 client by a serial port cable. When an alarm is raised, the corresponding indicator is lighted and an alarm sound is played.

Alarm remote notification You can set a mail server or wireless modem for remote notification. The M2000 notifies the maintenance personnel of alarms by email or SMS.

Introduction to the Alarm Board


The alarm board uses color indicators to identify different levels of alarms. You can customize the indicator colors and alarm sounds.

Alarm Board
The minimized icon of the alarm board is displayed on the right of the toolbar. See Figure 2-4. Figure 2-4 Alarm Board Icon

Choose Monitor > Display Alarm Board, or in the M2000 client GUI, click alarm board, as shown in Figure 2-5.
2-40 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

to open the

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-5 Alarm Board

The four color indicators on the alarm board represent critical, major, monitor, and warning alarms. The numbers under the indicators are the counts of alarms. The alarm board is a window that runs on the client and displays the alarm statistics in real time. If a new alarm is raised, the relative indicator flashes and the alarm sound is played. The alarm statistics on the alarm board is refreshed in real time. Both the alarm box and alarm board notify users of new alarms in audio and visual mode. The alarm box is hardware. It cannot display the alarm statistics. You can set the condition to filter the alarms sent to the alarm box on the client. Compared with the alarm box, the alarm board is a window on the client. You can click Add at the bottom of the Alarm Board dialog box to bind the fault template and event template with the alarm board. You cannot set the filter conditions for it. It can display the alarm statistics based on the alarm status and severities according to templates in real time. shows that the data is being refreshed in the alarm board. and the template name is preceded by in the alarm board. show that the data is failed to be refreshed

l l

Setting the Alarm Board


You can set the following on the alarm board: whether the alarm box pops up automatically and whether the alarm indicator blinks when an alarm is raised; and whether to bind the fault template or event template with the alarm board.

Procedure
Step 1 ChooseMonitor > Display Alarm Board or click on the toolbar.

Step 2 In the Alarm Board dialog box, click Option. Set auto display for the alarm board or auto flash for the alarm lamp. Step 3 In the Alarm Board dialog box, click Add.
NOTE

You can select a template except the All objects in the Alarm Board dialog boxand then click Delete to delete the template.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-41

2 Network Monitoring

M2000 Operator Guide

Step 4 In the Add dialog box, select the event template or the current fault template. Then click Add. The alarm information on the bound template is added on the alarm board.
NOTE

If no fault template or event template is created, click New Event Template or New Fault Template to create a template.

----End

Setting the Alarm Box


You can set filter conditions for the alarm box on the client. Alarms that match the conditions are sent to the alarm box and prompted in audio and visual mode.

Procedure
Step 1 Choose Monitor > Alarm Box Manager. Step 2 In the Alarm Box Manager dialog box, set Control Sound and Light by Severity or Control Sound and Light by Template, select Enableand then select Serial Port.
NOTE

When the alarm box generates an alarm sound, click Mute current alarm sound to stop the alarm sound.

Step 3 Click OK. ----End

Related References
2.8.31 Parameters for Setting the Alarm Box

Setting the Alarm Sound


You can set the alarm sound for each alarm level. When an alarm is raised, the sound box plays the corresponding alarm sound. You can also disable or enable the alarm sound.

Context
l l

You can use the sound file of the M2000 or others. Only the sound files of the Wav type in the PCM format are supported. The Microsoft ADPCM type is not supported. By default, the sound files of the four alarm severities are located in style/defaultstyle/ conf/alarmclient/ of the M2000 client installation folder. The file names are Critical.wav, Major.wav, Minor.wav and Warning.wav.

Procedure
Step 1 Perform different operations according to different customized requirement.

2-42

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

If You Need to

Perform.

Enable or disable the client alarm sound Select or clear Monitor > Stop Client Sounding. Set the preference of alarm sound Step 2 Choose System > Preferences. Step 3 In the Preferences dialog box, from the navigation tree on the left, select Disconnection Sound. 1. 2. In the Sound group box, click the path of the sound file, and then Configuration dialog box, select a sound file, and then click OK. In Sound Time(S), enter the play duration of the sound. Click listen to the sound.
NOTE

Perform Step 2.

. In the Sound on the right to

l l

The play duration is from 0 to 600, and the unit is second. 0 indicates that the play time is unlimited. If the alarm indicator on the alarm board is set to flash when a new alarm is raised, when a new alarm is raised, the alarm indicator that corresponds to the severity of this alarm flashes for the preset duration. If alarms of different severities are raised, only the alarm indicator that corresponds to the highest alarm severity flashes. If the duration of the alarm sound of an alarm severity is set to 0, when an alarm of this severity is raised, the alarm indicator keeps flashing until the alarm is cleared.

3.

Optional: In the Sound group box, click Default to restore the alarm sound to the default.

Step 4 Click OK. ----End

Setting the Alarm Color


You can set a color for each alarm level. This helps you browse different alarms easily.

Context
l

After you complete the settings, the alarm icon in the topology view, the alarm record you query, and the alarm indicator on the alarm board are shown in the specified color. To recover the default color, click the Sound and Color tab and then click Default. Click Default in the Preferences dialog box to restore the alarm color to the default.

Procedure
Step 1 ChooseSystem > Preferences. Step 2 In the Preferences dialog box, from the navigation tree on the left, select Color. Step 3 In the Color group box, double-click the button next to an alarm level to select the alarm color. Step 4 Click OK. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-43

2 Network Monitoring

M2000 Operator Guide

Setting Alarm Highlight


After you set the alarm highlight, an alarm is highlighted in the alarm query result window when it is not handled in the preset period.

Context
l

The unacknowledged event alarm is highlighted when the interval between the local time on the client and the alarm raised time exceeds the threshold of the alarm highlight. The unacknowledged and uncleared fault alarm is highlighted when the interval between the local time on the client and the alarm raised time exceeds the threshold of the alarm highlight. The time on the client should synchronize with the time on the server. Otherwise, the time an alarm is highlighted differs from the highlight time you set. For example, if the highlight time you set is 5 minutes. But the time on the client is 5 minutes ahead of the time on the server. Then, the alarm is highlighted on the client immediately when it is raised.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences dialog box, in the navigation tree on the left, expand the Alarm Local Terminal Settings node, and then select Highlight. Step 3 In the Highlight group box, set the time for the alarms of a level.
NOTE

Time range: 0-1000000, Unit: minute. 0 indicates that the alarm is not highlighted.

Step 4 Click OK. ----End

2.3.3 Setting Alarm Remote Notification


When you set the remote notification for alarms, you need to set the parameters, including the parameters for the notification by email and SMS. 2.3.3.1 Setting the Remote Notification Rules for Alarms Before setting parameters for notification by email or SMS, you need to set the remote notification rules for alarms. These rules include notification conditions, notification time, and notification modes. 2.3.3.2 Setting Alarm Remote Notification Parameters You can set the parameters for alarm remote notification to send alarm information to users by email or SMS so that the users can know the alarm information on the M2000 server.

Setting the Remote Notification Rules for Alarms


Before setting parameters for notification by email or SMS, you need to set the remote notification rules for alarms. These rules include notification conditions, notification time, and notification modes.
2-44 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Context
l l

A user can set more than one remote notification mode. A user can add at most fifty remote notification rules for alarms. Attempts to add more than fifty cause error messages. In the Email or SMS, the alarm occurrence time and the alarm clearance time are the time of the M2000 server. The steps of setting event remote notification rule and fault remote notification rule are the same. The following example describes the steps by setting the latter rules.

Procedure
Step 1 Choose Monitor > Settings > Remote Notification . Step 2 In the Remote Notify tab click Add, and then choose Fault Notification . Step 3 In the Base Setting tab of the Add Remote Notify Rule dialog box, set the parameters such as Name and Severity. Step 4 Click the Alarm Source tab. On the Alarm Source tab, set the alarm source. Click Next. Step 5 In the Add Remote Notify Rule dialog box set the notification time. Click Next. Step 6 In the Add Remote Notify Rule dialog box set the email address or SMS number. Select Enable. Step 7 Click Finish. ----End

Related References
2.8.16 Parameters for Selecting Alarm Name 2.8.32 Parameters for Setting Alarm Remote Notification Rules

Setting Alarm Remote Notification Parameters


You can set the parameters for alarm remote notification to send alarm information to users by email or SMS so that the users can know the alarm information on the M2000 server.

Context
Only the users that have the right of Setting Remote notification parameters can perform this task.

Procedure
Step 1 Choose Monitor > Settings > Remote Notification . Step 2 On the lower left of the Remote Notify window, click Communication Settings. Step 3 In the Notify Device Communication Settings dialog box, click Add.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-45

2 Network Monitoring
NOTE

M2000 Operator Guide

In the Notify Device Communication Settings dialog box, select a row and click Modify. In the Modify Notify Device Communication Settings dialog box, modify the setting name and communication parameters. In the Notify Device Communication Settings dialog box, select a row and click Delete to delete the settings.

Step 4 In the Add Notify Device Communication Settings dialog box, enter the device name. Select the sending device. Click Next.
NOTE

There are four types of devices that can send alarm notification: Email, GSM Modem, CDMA Modem, and SMS Gateway(SMS Center). The method of email sends notifications by emails. The other methods send notifications by SMS. When you set GSM Modem or CDMA Modem, pay attention to the following points:
l l l l

If the sending address is the server, the modem must be correctly installed on the server. In this case, the clients that log in to the server can send short messages for alarm remote notification. If the sending address is the client, only the clients that are installed with the modem can send remote alarm notification. If the sending address is the client, the corresponding serial port of the client is always in use until the M2000 client is exited. If the sending address is the server, the corresponding serial port of the server is always in use until the M2000 server is exited.

Step 5 In the Add Notify Device Communication Settings dialog box, set the parameters. Select Enable.
NOTE

For details on the parameters, see 2.8.33 Parameters for Setting Notification by Email, 2.8.35 Parameters for Setting Notification by Modem or 2.8.37 Parameters for Setting Notification by SMS Gateway.

Step 6 Optional: Click Advanced. In the Notify Device Communication Settings dialog box, set the format of the sending content. Click OK.
NOTE

For details on the parameters, see 2.8.34 Parameters for Advanced Settings of Notification by Email, 2.8.36 Parameters for Advanced Settings of Notification by Modem or 2.8.38 Parameters for Advanced Settings of Notification by SMS Gateway.

Step 7 In the Add Notify Device Communication Settings dialog box, click Finish. Step 8 In the Notify Device Communication Settings dialog box, click Close. ----End

Related References
2.8.33 Parameters for Setting Notification by Email 2.8.34 Parameters for Advanced Settings of Notification by Email 2.8.35 Parameters for Setting Notification by Modem 2.8.36 Parameters for Advanced Settings of Notification by Modem 2.8.37 Parameters for Setting Notification by SMS Gateway 2.8.38 Parameters for Advanced Settings of Notification by SMS Gateway
2-46 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.3.4 Setting Alarm Filter Rules


You can set the alarm filter rules to filter fault alarms and event alarms. The filtered alarms are discarded and are not saved in the alarm database. 2.3.4.1 Adding Alarm Filter Rules This section describes how to add the alarm filter rules to filter the alarms that match the rules. 2.3.4.2 Modifying Alarm Filter Rules The modification on the alarm screening rule refers to modifying the screen condition, time mode, screening rule, validation date, expiration date, and remark based on the previous alarm screening rule. 2.3.4.3 Deleting Alarm Filter Rules If an alarm filter rule is no longer applicable, delete it.

Related References
2.8.19 Parameters for Setting Alarm Filter Conditions

Adding Alarm Filter Rules


This section describes how to add the alarm filter rules to filter the alarms that match the rules.

Context
l

If both alarm severity redefinition and alarm filter are set for an alarm, the alarm is filtered first and then redefined the severity. Therefore, alarm filter is based on the original attributes (the attributes before severity redefinition) of the alarms. The M2000 discards the alarms that are masked by the alarm mask rules and does not save the alarms to the alarm database.

Procedure
Step 1 Choose Monitor > Settings > Alarm Filter Rule . Step 2 On the Alarm Filter Rule tab, click Add. Choose New Alarm Filter Rule or New Event Filter Rule. Step 3 In the Add Alarm Filter Rule dialog box, set the filter parameters. Step 4 Click OK. ----End

Modifying Alarm Filter Rules


The modification on the alarm screening rule refers to modifying the screen condition, time mode, screening rule, validation date, expiration date, and remark based on the previous alarm screening rule.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-47

2 Network Monitoring

M2000 Operator Guide

Context
l

If both alarm severity redefinition and alarm filter are set for an alarm, the alarm is filtered first and then redefined the severity. Therefore, alarm filter is based on the original attributes (the attributes before severity redefinition) of the alarms. The M2000 discards the alarms that are masked by the alarm mask rules and does not save the alarms to the alarm database.

Procedure
Step 1 ChooseMonitor > Settings > Alarm Filter Rule . Step 2 On the Alarm Filter Rule tab, change the alarm filter rules.
NOTE

The fields displayed in white can be changed. The fields displayed in displayed in are already changed but are not used.

cannot be changed. The fields

You can also select a relevant alarm filter rule, and then click Detail. In the Detail Information dialog box, change the alarm filter rules.

Step 3 Click Apply. ----End

Deleting Alarm Filter Rules


If an alarm filter rule is no longer applicable, delete it.

Procedure
Step 1 Choose Monitor > Settings > Alarm Filter Rule . Step 2 On the Alarm Filter Rule tab, select the alarm filter rule you want to delete. Click Delete. Step 3 In the Confirmation dialog box, click Yes. ----End

2.3.5 Setting Alarm Auto Acknowledgement


For the purpose of maintenance, the M2000 provides the real-time auto acknowledgement for the unacknowledged and cleared fault alarms.

Procedure
Step 1 ChooseMonitor > Settings > Auto Acknowledge Rule . Step 2 In the Auto Acknowledgement Rule dialog box, set the parameters of auto acknowledgement. Step 3 Click OK. After auto acknowledgement is enabled, the M2000 acknowledges the fault alarms that match the preset conditions. ----End
2-48 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Related References
2.8.18 Parameters for Acknowledging Alarms Automatically

2.3.6 Setting Redefinition of Alarm Level


In the M2000, you can redefine the alarm levels according to the actual requirements. You can set the levels of the alarms that are not concerned to lower ones, and set the levels of the alarms that are concerned to higher ones. 2.3.6.1 Adding Alarm Level Redefinition Rules Add the alarm level redefinition rule to redefine the level of an alarm from an alarm source. 2.3.6.2 Modifying Rules for Alarm Severity Redefinition Modify the content of the alarm severity redefinition rule, including whether to enable the rule, alarm source, redefined severity, and memo. 2.3.6.3 Deleting Redefinition Records This section describes how to delete the alarm severity redefinition rules. You can recover the alarm severity redefinition rules redefined by the manufacturers through this operation.

Related References
2.8.23 Parameters for Redefining NMS Alarm Level 2.8.25 Parameters for Alarm Severity Redefinition

Adding Alarm Level Redefinition Rules


Add the alarm level redefinition rule to redefine the level of an alarm from an alarm source.

Context
l

The results of query, browse and statistics are displayed based on the alarm levels that are redefined. Redefinition is to change the alarm level on the M2000 server, rather than to change alarm explanations given by the device manufacturer.

Procedure
Step 1 Choose Monitor > Settings > Level Redefine . Step 2 Click Add. In the Add level Redefine Setting dialog box, set the parameters for the alarm level redefinition. 1. 2. 3. 4. 5. next to Alarm Name. In the Select Alarm Name dialog box, select the alarm Click whose level you want to redefine. Click OK. In the Redefine Level drop-down list, select the level for the alarm after redefinition. Optional: In the Memo text box, set the remarks as required. Select or clear the Enable check box as required. In the Alarm Source tab, click Select. In the Select object window , select the objects that raise alarms. By default, all the objects are selected.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-49

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

When the objects in Alarm Source report the alarms that are set in Alarm Name, the alarm level are redefined. Step 3 Click OK. ----End

Modifying Rules for Alarm Severity Redefinition


Modify the content of the alarm severity redefinition rule, including whether to enable the rule, alarm source, redefined severity, and memo.

Procedure
Step 1 Choose Monitor > Settings > Level Redefine . Step 2 On the Severity Redefine tab, select a rule and then modify the parameters.
NOTE

The fields displayed in white can be changed. The fields displayed in displayed in are already changed but are not used.

cannot be changed. The fields

You can also select a relevant alarm severity redefinition rule, and then click Detail. In the Detail Information dialog box, change the alarm severity redefinition rules.

Step 3 Click Apply. ----End

Deleting Redefinition Records


This section describes how to delete the alarm severity redefinition rules. You can recover the alarm severity redefinition rules redefined by the manufacturers through this operation.

Procedure
Step 1 Choose Monitor > Settings > Level Redefine . Step 2 In the Severity Redefine window, select the alarm severity redefinition rules you want to delete.
NOTE

You can choose more than one record by Shift and Ctrl.

Step 3 Click Delete. Step 4 In the Confirmation dialog box, click YES. ----End

2.3.7 Setting Alarm Correlation Rules


You can set an alarm correlation rule to enable the M2000 to filter unnecessary alarm information. This improves the efficiency of handling alarms.M2000The M2000 provides multiple analysis methods, such as intermittent fault alarm analysis, repeat event analysis, and custom correlation analysis. 2.3.7.1 Principles of Correlation Analysis
2-50 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

In the network, physical or logical correlations exist between devices. A fault may cause repetitive and non-root alarms. In this case, the alarms are not important for reference. You may find it difficult to locate and remove faults. By alarm correction analysis, the M2000 can shield the repetitive or non-root alarms, and you can obtain useful alarm information. After you understand the principle of alarm correlation analysis, you can use the M2000 to set the correlation rules more accurately. 2.3.7.2 Priorities in Correlation Analysis During correlation analysis, the M2000 determines the priority of a correlation rule, and then takes a proper action. 2.3.7.3 Adding Simple Correlation Rules of Alarms To filter the intermittent alarms or repeat events and prevent the system running in unstable status, the M2000 provides simple correlation analysis for alarms. Take intermittent alarms as an example, when the alarms reach the preset limit, the M2000 filters or discards them based on the correlation rule. 2.3.7.4 Adding Advanced Correlation Rules of Alarms Through setting the advanced correlation rules of alarms, you can filter the alarms that match the rules or redefine the alarm levels. Therefore, you can reduce the unnecessary alarms or ignore the non-root alarms so that you can handle the major alarms and solve problems quickly. 2.3.7.5 Modifying Simple Correlation Rules for Alarms This section describes how to modify the existing simple correlation rules for alarms. 2.3.7.6 Modifying Advanced Correlation Rules for Alarms This section describes how to modify the existing advanced correlation rules for alarms. 2.3.7.7 Example of Using Simple Correlation Rules of Alarms This section gives an example of using the simple correlation rules of intermittent alarms to describe how to set a simple correlation rule for alarms. 2.3.7.8 Example of Using Advanced Correlation Rules of a Single Alarm This section describes how to set the advanced correlation rules for a single alarm by giving an example. 2.3.7.9 Example of Using Advanced Correlation Rules of Two Alarms This section describes how to set the advanced correlation rules for two alarms by giving an example.

Principles of Correlation Analysis


In the network, physical or logical correlations exist between devices. A fault may cause repetitive and non-root alarms. In this case, the alarms are not important for reference. You may find it difficult to locate and remove faults. By alarm correction analysis, the M2000 can shield the repetitive or non-root alarms, and you can obtain useful alarm information. After you understand the principle of alarm correlation analysis, you can use the M2000 to set the correlation rules more accurately.

Correlative Alarms
Correlative alarms are alarms that have correlations between one another. One is the root alarm that raises other alarms. A fault may result in multiple alarms. The non-root alarms do not help in the fault location or analysis. To solve this problem, you can set a condition based on the alarm features, such as the
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-51

2 Network Monitoring

M2000 Operator Guide

alarm raised time or physical location to shield the alarms that do not match the condition or reduce the levels of insignificant alarms.

Intermittent Alarms/Repeat Events


If the interval between two clearance times of an alarm is less than the set period of the cleared alarm, the alarm is an intermittent alarm. If the reporting times of an event is more than the set times in the set period, the event is a repeat event. A fault, such as a physical device fault may result in multiple repetitive alarms or events. Such information is redundant. To avoid intermittent alarms or repeat events, you can set a condition. The alarms or events that match the condition are intermittent alarms or repeat events. You can then reduce the levels of such alarms or events. You can also shield them directly.

Simple/Advanced Correlation
In the M2000, the correlation of the intermittent alarms or repeat events is considered as simple correlation alarms, and the correlation of the other alarms is considered as advanced correlation alarms.

Priorities in Correlation Analysis


During correlation analysis, the M2000 determines the priority of a correlation rule, and then takes a proper action.

Example 1:
The priority of an alarm advanced correlation rule is 1000000000. The priority of another alarm advanced correlation rule is 1000000. When an alarm meets both rules, the system performs the first alarm correlation rule first, and then the second correlation rule.

Example 2:
The priority of an alarm advanced correlation rule is 1000000000. The priority of another alarm advanced correlation rule is also 1000000000. When an alarm meets both rules, the system takes the analysis actions based on the sequence in which the two rules are added to the correlation analysis module.

Adding Simple Correlation Rules of Alarms


To filter the intermittent alarms or repeat events and prevent the system running in unstable status, the M2000 provides simple correlation analysis for alarms. Take intermittent alarms as an example, when the alarms reach the preset limit, the M2000 filters or discards them based on the correlation rule.

Context
l

If the clearance interval of the same alarm is less than the preset interval, the alarm is intermittent. The simple correlation rule takes effects only when alarm intervals and intermittence/repeat times match the conditions that you set.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

2-52

M2000 Operator Guide


l

2 Network Monitoring

The M2000 discards or save the alarms that are shielded by the correlation rules to the shield database. You can query the shielded alarms in the shield database.

Procedure
Step 1 Choose Monitor > Settings > Simple Correlation . Step 2 In the Simple Correlation window, click Add. Step 3 In the Add Simple Correlation Rule dialog box, set the parameters for correlation rules. 1. 2. 3. 4. Click Choose. In the Select Alarm Name dialog box, select the alarms on which you want to analyze the correlation, and then click OK. Set Interval, Intermittence/Repeat Times and action. Optional: In the Memo text box, set the remarks. Select Enable.

Step 4 Click OK. ----End

Related References
2.8.39 Parameters for Setting Simple Correlation Rules

Adding Advanced Correlation Rules of Alarms


Through setting the advanced correlation rules of alarms, you can filter the alarms that match the rules or redefine the alarm levels. Therefore, you can reduce the unnecessary alarms or ignore the non-root alarms so that you can handle the major alarms and solve problems quickly.

Context
The M2000 redefine the alarm level or save the alarms that are shielded by the correlation rules to the shield database. You can query the shielded alarms in the shield database.

Procedure
Step 1 Choose Monitor > Settings > Advanced Correlation . Step 2 In the Advanced Correlation window, click New. Step 3 In the Add Advanced Correlation Rule dialog box, set the parameters for correlation rules. 1. 2. 3. Set the correlation conditions: Click Add next to the Correlation Condition group box. Set Alarm Instance A, Alarm Instance B, Property, Condition, and Value. Set the correlation action: Click New next to the Correlation Action group box. Set Alarm Instance, Action, and Value. Set Priority, Memo, and Enable.

Step 4 Click OK. When the correlation rules are enabled and the alarms match the rules, the M2000 executes the relevant correlation actions in sequence. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-53

2 Network Monitoring

M2000 Operator Guide

Related References
2.8.40 Parameters for Setting Advanced Correlation Rules

Modifying Simple Correlation Rules for Alarms


This section describes how to modify the existing simple correlation rules for alarms.

Procedure
Step 1 ChooseMonitor > Settings > Simple Correlation . Step 2 In the Simple Correlation window, you can modify the correlation rules in the following ways: l Click the field of an alarm correlation rule, and then modify it. Then click Apply.
NOTE

The fields displayed in white can be changed. The fields displayed in fields displayed in are already changed but are not used.

cannot be changed. The

Select a relevant alarm correlation rule, and then click Detail. In the Detail Information dialog box, modify the correlation rule. Then click OK.

----End

Modifying Advanced Correlation Rules for Alarms


This section describes how to modify the existing advanced correlation rules for alarms.

Procedure
Step 1 ChooseMonitor > Settings > Advanced Correlation . Step 2 In the Advanced Correlation window, you can modify the correlation rules in the following ways: l Click the field of an alarm correlation rule, and then modify it. Then click Apply.
NOTE

l l

The correlation conditions and actions cannot be modified in this way. The fields displayed in white can be changed. The fields displayed in fields displayed in are already changed but are not used. You can use this method to modify the correlation rules for multiple alarms. cannot be changed. The

Select a relevant alarm correlation rule, and then click Detail. In the Detail Information dialog box, modify the correlation rule. Then click OK.

----End

Example of Using Simple Correlation Rules of Alarms


This section gives an example of using the simple correlation rules of intermittent alarms to describe how to set a simple correlation rule for alarms.
2-54 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Background
The M2000 receive mass fault alarms that are raised and cleared periodically. These alarms are reduced after the intermittent alarm correlation rules are set.

Operation Guide
To set correlation rules for intermittent alarms, do as follows: 1. 2. 3. Choose Monitor > Settings > Simple Correlation . In the Simple Correlation window, click Add. In the Add Simple Correlation Properities dialog box, set the correlation rule parameters. (1) Click Choose. In the Select Alarm Name dialog box, select the alarms that need correlation analysis, and then click OK. (2) Set Interval to 3, which indicates that the interval between the clearance of two intermittent alarms is three seconds. (3) Set Intermittence / Repeat Times to 5. (4) Set Action to discarding. (5) Select Enable. 4. Click OK.

Example of Using Advanced Correlation Rules of a Single Alarm


This section describes how to set the advanced correlation rules for a single alarm by giving an example.

Background
During the period from 5:00 to 23:00 on September 5th, 2005, the NE Z raises mass critical alarms M during upgrade. These critical alarms do not need be concerned. Therefore, the administrator redefines all the critical alarms M raised during upgrade to warning alarms, so that the alarms M are not concerned. In this example, the administrator redefines the critical alarms M that are raised during the period from 5:00 to 23:00 on September 5th, 2005.
NOTE

This correlation analysis is to obtain the root alarms M, and it does not conflict with the correlation analysis of repeat event alarms or intermittent fault alarms. Therefore, the priority value of this correlation analysis can be lower than that (which is 1000000000) of repeat event alarms or intermittent fault alarms. In this example, the priority is set to 1000000. When you customize Correlation Condition, you can perform correlation analysis only when all the conditions are met. Therefore, do not add indeterminate correlation conditions to a custom correlation rule record. In addition, mass custom correlation analysis may increase the system load. Do not add too many conditions of custom correlation rule analysis.

Operation Guide
To set a single custom alarm instance, do as follows: 1. 2.
Issue 06 (2008-12-16)

Choose Monitor > Settings > Advanced Correlation . In the Advanced Correlation window, click Add.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-55

2 Network Monitoring

M2000 Operator Guide

3.

Set the condition for that the alarms M are generated by NE Z. (1) Click Add next to Correlation Condition. (2) Set the new correlation condition records. In the Alarm Instance A column, select Create Alarm Instance. In the displayed Select Alarm Name dialog box, select the alarm name M, and then click OK. In the Property column, select NE. In the Condition column, select Equal. Click Value. In the displayed Select Alarm Name dialog box, click NE Z, click OK.

4.

Set the raised time of the alarms M later than 5:00, on September 5th, 2005. (1) Click Add next to Correlation Condition. (2) Set the new correlation condition records. In the Alarm Instance A column, select the alarm name M. In the Property column, select Occurrence Time. In the Condition column, select Greater than. Click the Value column. In the Select time dialog box, set the time to 05-09-2005 05:00:00, click OK.

5.

Set the raised time of the alarms M earlier than 23:00, on September 5th, 2005. (1) Click Add next to Correlation Condition. (2) Set the new correlation condition records. In the Alarm Instance Acolumn, select the alarm name M. In the Propertycolumn, select Occurrence Time. IN the Condition column, select Less than. Double-click the Value column. In the Select time dialog box, set the time to 05-09-2005 23:00:00, click OK.

6.

Set the actions of redefining the alarms M. (1) Click Add next to Correlation Action. (2) Set the new correlation condition records. In the Alarm Instancecolumn, select the alarm name M. In the Action column, select Level Redefine. In the Value column, select Warring.

7. 8. 9.

Set Priority to 1000000. Select Enable. In the Add Advanced Correlation Rule dialog box, click OK.

Example of Using Advanced Correlation Rules of Two Alarms


This section describes how to set the advanced correlation rules for two alarms by giving an example.

Background
In the actual application, the link of an NE is faulty, and the NE reports the fault alarm M periodically. In addition, due to the faulty link, this NE or other NEs may raise mass link fault alarms N. The fault alarm M is the root alarm of the alarm N. Therefore, in the actual analysis, the administrator can analyze the alarm causes and handling methods by analyzing the alarm M, and you do not need to analyze the alarm N. The administrator can filter all the alarms N that are raised after the alarm M by adding correlation rule records. In this example, the alarm M must be raised before the alarm N. Therefore, the administrator only need to compare the raised times of the two alarms to determine whether the alarm N meets the filter conditions.

2-56

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

2 Network Monitoring

When you customize Correlation Condition, you can perform correlation analysis only when all the conditions are met. Therefore, do not add indeterminate correlation conditions to a custom correlation rule record. In addition, mass custom correlation analysis may increase the system load. Do not add too many conditions of custom correlation rule analysis.

Operation Guide
To set two custom alarm instances, do as follows: 1. 2. 3. Choose Monitor > Settings > Advanced Correlation . In the Advanced Correlation window, click Add. Set the comparison conditions for the alarm M and alarm N. In this instance, the alarm is raised before the alarm N, that is, the raised time of the alarm M is earlier than that of the alarm N. (1) Click Add next to Correlation Condition. (2) Set the new correlation condition records. In the Alarm Instance A column, select Create Alarm Instance. In the displayed Select Alarm Name dialog box, select the alarm name M, and then click OK. In the Alarm Instance B column, select Create Alarm Instance. In the displayed Select Alarm Name dialog box, select the alarm name N, and then click OK. In the Property column, select Occurrence Time. In the Condition column, select Less than. 4. Set the actions for filtering the alarm N. (1) Click Add next to Correlation Action. (2) In the Alarm Instance column, select the alarm name N. In the Action column, select Shielded. 5. 6. 7. Set Priority to 1000000. Select Enable. In the Add Advanced Correlation Rule dialog box, click OK.

2.3.8 Managing Auto-Triggering Script Tasks


The alarm auto-triggering script task realizes partial automation of the routine maintenance work by automatically triggering and executing the shell script file that is set by the user. Through the M2000 client, you can add the auto-triggering tasks, check the task attributes,and check the specific task and the auto-triggering conditions. 2.3.8.1 Creating Auto-Triggering Tasks This task describes how to create an auto-triggering task. Then the M2000 server automatically runs the defined script file to perform routine maintenance when the alarm that meets the requirements of the triggering conditions occurs. In this way, the work efficiency is improved. 2.3.8.2 Viewing the Attributes of Auto-Triggering Tasks This describes how to view the attribute of auto-triggering tasks. On the M2000 client, you can query the basic attributes and triggering conditions of the auto-triggering tasks. 2.3.8.3 Searching Auto-Triggering Tasks The M2000 provides the searching function for auto-triggering tasks. By setting multiple querying conditions, you can quickly locate the auto-triggering task you care about. 2.3.8.4 Searching Auto-Triggering Records
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-57

2 Network Monitoring

M2000 Operator Guide

By searching the auto-triggering records, you may know the auto-triggering tasks that are already automatically executed by the server and their detailed information such as the triggering time and task name.

Creating Auto-Triggering Tasks


This task describes how to create an auto-triggering task. Then the M2000 server automatically runs the defined script file to perform routine maintenance when the alarm that meets the requirements of the triggering conditions occurs. In this way, the work efficiency is improved.

Prerequisite
You have logged in to the M2000 client.

Context

CAUTION
l l

You need to manually send the script files to be triggered to the M2000 server. You can create a maximum of 100 auto-triggering tasks.

Procedure
Step 1 Choose Maintenance > Trigged Script. The Triggering Script window is displayed. Step 2 Click New, or right-click the task list and choose New from the shortcut menu.
TIP

You may also select an existing auto-triggering task, and by modifying the task information, you can create an auto-triggering task.

Step 3 In the displayed New Task dialog box, set the basic attributes of the task. 1. 2. In the Task Name field, enter the name of the task. Set the time range and Period. You may set the time using any of the following three ways:
l l l

Directly enter the time. Click Click the or to adjust the time. . In the displayed dialog box, choose the time.

CAUTION
The script to be executed is triggered by the server only when the alarm occurs in the specified time range, and in Period, the date is set to Tuesday. 3. 4. Choose the task running mode from the Run-time Type drop-down list. In the Script File dialog box, enter the absolute path and the name of the script file on the server.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

2-58

M2000 Operator Guide

2 Network Monitoring

For example, /export/home/trigger.sh.


NOTE

l l

Based on demands, in the Run-time Param field, you can reset some of the parameters in the script file. In the Remark field, you may enter task description related information.

For details about relevant parameters, see 2.8.41 Parameters for the Basic Attributes of AutoTriggering Tasks. Step 4 Click the Trigger Condition tab, and then click Add.
NOTE

A maximum of 250 triggering condition settings is allowed.

Step 5 Set the NE alarm of the auto-running script file triggered by the server. Step 6 Click OK. The added triggering conditions are displayed in the list of the Trigger Condition tab page. Step 7 Click OK. The added auto-triggering tasks are displayed in the task list of the Triggering Script dialog box. If the alarm set in this task occurs later on, the server will automatically run the script file based on the task running conditions that are already set in the task.

CAUTION
If the triggering conditions that are set are incorrect, for example, if the selected NE does not exist on the actual network, a dialog box indicating error is displayed. At the same time, on the Trigger Condition tab page, the Message field displays the message explaining the detailed reasons why the triggering conditions fail to be created. In this case, you need to click Delete to delete the triggering condition and perform Step 4 through Step 6 to set another triggering condition. ----End

Postrequisite
You may choose Query > Query Record in the Triggering Script window. Then, you can check the running results of the auto-triggering task, For example, the specific time for the triggering task.

Related References
2.8.41 Parameters for the Basic Attributes of Auto-Triggering Tasks 2.8.42 Parameters for Auto-Triggering Conditions 2.8.43 Parameters for Adding the Alarm Conditions of the Auto-Triggering Script

Viewing the Attributes of Auto-Triggering Tasks


This describes how to view the attribute of auto-triggering tasks. On the M2000 client, you can query the basic attributes and triggering conditions of the auto-triggering tasks.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-59

2 Network Monitoring

M2000 Operator Guide

Prerequisite
l l

You have logged in to the M2000 client. The auto-triggering task exists.

Procedure
Step 1 Choose Maintenance > Trigged Script. The Triggering Script window is displayed. Step 2 In the task list, choose the task record whose attribute you need to query. You may either click Refresh or right-click the task list and choose <Refresh to obtain the latest information about the task. In usual cases, the client refreshes the displayed information about the task in real time. Step 3 Double-click the task record. Alternatively, right-click the it and choose Attribute from the shortcut menu or click Attribute. The system displays the Attribute dialog box. Step 4 You can check the detailed information about the auto-triggering task.
l

Basic Attribute tab page: displays the basic attribute of the auto-triggering task. For parameter-related description, refer to 2.8.41 Parameters for the Basic Attributes of AutoTriggering Tasks. Trigger Attribute tab page: displays the trigger attribute of the auto-triggering task. For parameter-related description, refer to 2.8.42 Parameters for Auto-Triggering Conditions.
NOTE

Based on demands, you can modify the auto-triggering task related information, click OK. he modified auto-triggering tasks are displayed in the task list of the Triggering Script dialog box.

----End

Related References
2.8.41 Parameters for the Basic Attributes of Auto-Triggering Tasks 2.8.42 Parameters for Auto-Triggering Conditions 2.8.43 Parameters for Adding the Alarm Conditions of the Auto-Triggering Script

Searching Auto-Triggering Tasks


The M2000 provides the searching function for auto-triggering tasks. By setting multiple querying conditions, you can quickly locate the auto-triggering task you care about.

Prerequisite
l l

You have logged in to the M2000 client. The auto-triggering task exists.

Procedure
Step 1 Choose Maintenance > Trigged Script. The Triggering Script window is displayed. Step 2 Choose Query > Query Task, or right-click the task list and choose Query Task from the shortcut menu.
2-60 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

The Query Task dialog box is displayed. Step 3 Select the check boxes before the related parameters, and then set the querying conditions. By selecting multiple check boxes, you can set multiple querying conditions. For parameterrelated description, refer to 2.8.44 Parameters for Searching Auto-Triggering Tasks. Step 4 Click OK. The auto-triggering task that meets the requirements of the querying conditions is displayed in the task list of the Triggering Script dialog box. ----End

Related References
2.8.44 Parameters for Searching Auto-Triggering Tasks

Searching Auto-Triggering Records


By searching the auto-triggering records, you may know the auto-triggering tasks that are already automatically executed by the server and their detailed information such as the triggering time and task name.

Prerequisite
l l

You have logged in to the M2000 client. The auto-triggering task exists.

Procedure
Step 1 Choose Maintenance > Trigged Script. The Triggering Script window is displayed. Step 2 ClickQuery > Query Record. Alternatively, right-click it and choose Query Record from the shortcut menu. The Query Record dialog box is displayed. Step 3 Select the check boxes before the related parameters, and then set the querying conditions. By selecting multiple check boxes, you can set multiple querying conditions. For parameterrelated description, refer to 2.8.45 Parameters for Searching Auto-Triggering Records. Step 4 Click Query. The triggering records are displayed in the Query Result list.
NOTE

You can click Save to save the triggering records to a file.

If the system has never executed auto-triggering tasks, a dialog box is displayed, showing that the querying result is null. ----End

Related References
2.8.45 Parameters for Searching Auto-Triggering Records
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-61

2 Network Monitoring

M2000 Operator Guide

2.4 Setting NE Alarms


The M2000 provides the function of alarm shielding and alarm severity redefinition. You can shield unwanted alarms to prevent NEs from reporting them to the M2000. You can also redefine the severity of alarms to make the severity correctly reflect the actual situation. 2.4.1 Shielding an NE Alarm You can shield the alarms that you are not required. Thus, you can prevent the NE from reporting the alarms that must be shielded. In this case, invalid alarm information is reduced, the system stress is decreased, and the efficiency of the system is improved. 2.4.2 Querying the Shielding of an NE Alarm You can query the shielding of an NE alarm that has been sent to the NE. 2.4.3 Modifying the Shielding of an NE Alarm By using this function, you can modify the alarm shielding that is sent to but does not reach the NE. For the shielding of an NE alarm that does not reach the NE, you need to click Apply to make the setting take effect. For the setting that does not reach the NE, the modification has no effect on the NE. 2.4.4 Redefining the Level of an NE Alarm The M2000 enables you to redefine the severity level of an NE alarm. By using this function, you can downgrade the severity level of an alarm that has minimal impact on the system. You can also upgrade the severity level of a major fault alarm. 2.4.5 Querying the Redefinition of an NE Alarm Level You can query an applied alarm level redefinition record with this function. 2.4.6 Modifying the Setting of NE Alarm Level Redefinition This describes how to modify an alarm level redefinition record. 2.4.7 Defining an NE Alarm A newly defined alarm is identified by NE type and alarm ID. Its alarm name, alarm severity level, and alarm type can be different with that on the NE side. The M2000 supports the function of environment monitoring. You can define a new NE alarm, bind it to a port of a cabinet, frame, or slot of an NE, and then externally mount an environment monitoring device on the port. In this case, when the device detects environment exceptions, a real-time alarm is generated on the NE and reported to the M2000. In this way, it can quickly and automatically obtain the exception conditions and guarantee the normal operation. 2.4.8 Binding a User-Defined Alarm This describes how to define the corresponding relations between the user-defined alarms and the signal input ports. When a signal received through a port meets the alarm triggering conditions, the NE reports an alarm to the M2000, and the alarm is bound with a customized name and ID.

2.4.1 Shielding an NE Alarm


You can shield the alarms that you are not required. Thus, you can prevent the NE from reporting the alarms that must be shielded. In this case, invalid alarm information is reduced, the system stress is decreased, and the efficiency of the system is improved.

2-62

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Prerequisite
l l l

You have logged in to the M2000 client. You are familiar with the meaning of each alarm. You are authorized to perform the related operation.

Context
The following NEs do not support this function: IWF, SG7000, HLR36, PCU35, PCU33, PCU6000, tMSC, iMSC, MSC, BSC, GT800BSC, BTS, and AHR.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Perform the following operations based on the actual requirement. NEs for Shielding NEs managed by the BSC6000 Other NEs Step 3 Perform the following steps: 1. 2. Click the Object Alarm Shielding tab under Alarm Shielding. Click Add. The Add Object Alarm Shielding dialog box is displayed. 3. 4. Select an object whose alarm needs to be shielded in the Select Object tree. Select an alarm to be shielded from the Select Alarm tree. You can also type the keyword in Search by Name to search for the alarm. You can sort the alarms in the Select Alarm tree by selecting Group by Alarm Type, Group by Alarm Level, or Group by Alarm Category. 5. 6. Click OK. In the Messagedialog box, click OK.
l

Then... Perform Step 3. Perform Step 4.

The Message dialog box shows whether the alarm shielding is successful or failed. If the alarm shielding is failed, the reason is provided. The shielding requirements are directly issued to NEs and are not saved in the database of the NM side.

Step 4 Perform the following steps: 1. 2. Click the NE Alarm Shielding tab under Alarm Shielding. Click Add. The Add Alarm Shielding dialog box is displayed. 3. Select an NE from the Select NE tree. You can also type the keyword in Search by Name to search for the NE.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-63

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

4. 5.

Select an alarm from the Select Alarm tree. You can also type the keyword in Search by Name to search for the alarm. Click OK. The alarm shielding record to be added is listed on the Alarm Binding tab page. Each record is marked
NOTE

on the left.

The alarm shielding setting is saved on only the M2000. You must click Apply to apply it on the NE.

6.

Click Apply. The alarm shielding setting is applied on the NE. The symbol disappears. An information box is displayed, indicating whether the operation succeeds or fails.

The Shielded Flag in the Add Alarm Shielding dialog box is not configurable. The default setting is Yes. ----End

Related References
2.8.22 Parameters for Shielding an NE Alarm

2.4.2 Querying the Shielding of an NE Alarm


You can query the shielding of an NE alarm that has been sent to the NE.

Prerequisite
l l l

You have logged in to the M2000 client. You are familiar with the meaning of each alarm. You are authorized to perform the related operation.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Perform the following operations based on the actual requirement. Querying Object NEs managed by the BSC6000 Other NEs Step 3 Perform the following steps: 1. 2.
2-64

Then... Perform Step 3. Perform Step 4.

Click the Object Alarm Shielding tab under Alarm Shielding. Click Query.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

3. 4.

In the displayed Confirm dialog box, click OK. The Query Object Alarm Shielding dialog box is displayed. In the Root tree, select an NE to query the alarm shielding information. You can also search the NE by entering key words in the Search by Name box. You can select Group by NE Types so that the NEs in the Root tree are displayed by NE types.

5.

Click OK. The queried alarm shielding record is displayed in list in the Object Alarm Shielding tab page. If you need to delete one or multiple alarm shielding records, you can select the corresponding record in the list, and then click Delete or right-click the record and select Delete from the shortcut menu. You can also delete the alarm shielding records in batches by using the Ctrl or the Shift key.

Step 4 Perform the following steps: 1. 2. Click the NE Alarm Shielding tab under Alarm Shielding. Click Query. The Query Alarm Shielding dialog box is displayed. 3. 4. 5. 6. 7. , and select the NE with this alarm filter in the displayed topology tree. Or you Click can also enter directly the NE name. Enter the start alarm ID and the end alarm ID to specify the query range. Enter the maximum number of returned records. Select the alarm level in the Alarm Level tree. Click OK. The queried alarm shielding record is displayed as a list on the Alarm Shielding tab page. ----End

Related References
2.8.14 Parameters for Selecting NE for Query 2.8.21 Parameters for Querying the Shielding of an NE Alarm

2.4.3 Modifying the Shielding of an NE Alarm


By using this function, you can modify the alarm shielding that is sent to but does not reach the NE. For the shielding of an NE alarm that does not reach the NE, you need to click Apply to make the setting take effect. For the setting that does not reach the NE, the modification has no effect on the NE.

Prerequisite
l l l l

You have logged in to the M2000 client. Relevant NEs are properly connected to the M2000. You are authorized to perform the related operation. The related NEs operate properly.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-65

Issue 06 (2008-12-16)

2 Network Monitoring
l

M2000 Operator Guide

At least one alarm shielding record exists.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 In the list of the NE Alarm Shielding tab under Alarm Shielding, select an alarm shielding record. Step 3 Click Modify, or right-click the object group and select Modify from the shortcut menu. The Modify Alarm Shielding dialog box is displayed. Step 4 Refer to 2.8.22 Parameters for Shielding an NE Alarm to reset the alarm shielding. You can modify the Shielded Flag only when modifying the applied alarm shielding. The default setting is Yes. Step 5 Click OK. The user-defined alarms to be modified are listed. The alarm record is marked with left. on the

CAUTION
l

After you modify an alarm shielding record, click Apply to submit this new record to the NE. To modify an applied record, ensure that this record exists. For details, see 2.4.2 Querying the Shielding of an NE Alarm.

Step 6 Click Apply. The modified user-defined alarms are applied to the NE. An information box is displayed, indicating whether the operation is successful. ----End

2.4.4 Redefining the Level of an NE Alarm


The M2000 enables you to redefine the severity level of an NE alarm. By using this function, you can downgrade the severity level of an alarm that has minimal impact on the system. You can also upgrade the severity level of a major fault alarm.

Prerequisite
l l l

You have logged in to the M2000 client. You are familiar with the meaning of each alarm severity level. You are authorized to perform the related operation.

Context
The following NEs do not support this function: SG7000, HLR36, PCU35, PCU33, PCU6000, tMSC, iMSC, MSC, BSC, GT800BSC, BTS, IP Clock Server, and AHR.
2-66 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Severity Redefinition tab, and click Add. The Add Severity Redefinition dialog box is displayed. Step 3 Select an NE from the Select NE tree. You can also type the keyword in Search by Name to search for the NE. Step 4 Select an NE from the Select Alarm tree. You can also type the keyword in Search by Name to search for the NE. Step 5 Select an alarm severity level from the Redefined Level drop-down list. Step 6 Click OK. The alarm level redefinition record to be added is listed on the Alarm Binding tab page. Each record is marked
NOTE

on the left.

After that, you must click Apply to add the new record to the NE.

Step 7 Click Apply. symbol disappears. An information The alarm level redefinition is applied on the NE and the box is displayed, indicating whether the operation succeeds or fails. ----End

Related References
2.8.24 Parameters for Redefining/Modifying the Level of an NE Alarm

2.4.5 Querying the Redefinition of an NE Alarm Level


You can query an applied alarm level redefinition record with this function.

Prerequisite
l l

You have logged in to the M2000 client. You are authorized to perform the related operation.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Severity Redefinition tab, and click Query. The Query Severity Redefinition dialog box is displayed. , and select the NE with this alarm level redefinition in the displayed topology tree. Step 3 Click Alternatively, you can also enter directly the NE name. Step 4 Enter the start alarm ID and the end alarm ID to specify the query range.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-67

2 Network Monitoring

M2000 Operator Guide

Step 5 Enter the maximum number of returned records. Step 6 Select the alarm level in the Alarm Level tree. Step 7 Click OK. The queried records are listed in Severity Redefinition. ----End

Related References
2.8.14 Parameters for Selecting NE for Query 2.8.26 Parameters for Querying the Redefinition of an NE Alarm Level

2.4.6 Modifying the Setting of NE Alarm Level Redefinition


This describes how to modify an alarm level redefinition record.

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized to perform the related operation. At least one alarm level redefinition record exists.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 In the list on the Alarm Level Redefinition tab page, select an alarm redefinition record. Step 3 Click Modify. Alternatively, right-click and select Modify from the shortcut menu. The Add Alarm Level Redefinition dialog box is displayed. Step 4 Refer to 2.4.4 Redefining the Level of an NE Alarm to reset the alarm level redefinition. Step 5 Click OK. The record to be modified is listed and marked with on the left.

CAUTION
l

After you modify an alarm level redefinition record, click Apply to submit this new record to the NE. Before modifying an applied record, ensure that this record exists. For details, see 2.4.5 Querying the Redefinition of an NE Alarm Level.

Step 6 Click Apply. The modified alarm redefinition record is applied to the NE. An information box is displayed, indicating whether the operation is successful. ----End
2-68 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Related References
2.8.24 Parameters for Redefining/Modifying the Level of an NE Alarm

2.4.7 Defining an NE Alarm


A newly defined alarm is identified by NE type and alarm ID. Its alarm name, alarm severity level, and alarm type can be different with that on the NE side. The M2000 supports the function of environment monitoring. You can define a new NE alarm, bind it to a port of a cabinet, frame, or slot of an NE, and then externally mount an environment monitoring device on the port. In this case, when the device detects environment exceptions, a real-time alarm is generated on the NE and reported to the M2000. In this way, it can quickly and automatically obtain the exception conditions and guarantee the normal operation.

Context
The NEs that support this function are NodeB, MSC Server, MGW, and BSC6000. 2.4.7.1 Querying a User-Defined Alarm This describes how to query a user-defined alarm. The attributes of user-defined alarms are stored in the M2000 database. You can query the related information in the database. The attributes of a user-defined alarm are NE type, alarm ID, alarm name, alarm severity level, and alarm type. 2.4.7.2 Adding a User-Defined Alarm This describes how to add a user-defined alarm as required. After a user-defined alarm is added, bind the alarm and the corresponding NE to make the alarm take effect. 2.4.7.3 Modifying a User-Defined Alarm This describes how to modify a user-defined alarm.

Related References
2.8.27 Parameters for User-Defined Alarms

Querying a User-Defined Alarm


This describes how to query a user-defined alarm. The attributes of user-defined alarms are stored in the M2000 database. You can query the related information in the database. The attributes of a user-defined alarm are NE type, alarm ID, alarm name, alarm severity level, and alarm type.

Prerequisite
l l

You have logged in to the M2000 client. You are authorized to perform the related operation.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Alarm Definition tab in the User-Defined Alarm dialog box. Step 3 Click Query. The Query User-Defined Alarm dialog box is displayed.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-69

2 Network Monitoring

M2000 Operator Guide

Step 4 Enter the name and ID of the user-defined alarm to be queried. Step 5 Select the NE type and alarm severity level. Step 6 Click OK. The queried user-defined alarms are displayed in the list on the Alarm Definition tab page. ----End

Related References
2.8.14 Parameters for Selecting NE for Query 2.8.28 Parameters for Querying a User-Defined Alarm

Adding a User-Defined Alarm


This describes how to add a user-defined alarm as required. After a user-defined alarm is added, bind the alarm and the corresponding NE to make the alarm take effect.

Prerequisite
l l

You have logged in to the M2000 client. You are authorized to perform the relevant operations on NEs.

Context
The user-defined alarms of NEs can be used to monitor the physical environment of hardware. To make the alarms take effect, you must bind these alarms and specified subracks, slots, and ports. A user-defined alarm must be added on the M2000. Thus, you can bind the alarm and the NEs to be monitored. You can bind a user-defined alarm and NEs in the NE Alarm Setting window. Alternatively, you can bind the user-defined alarm and NEs by running the SET ALMPORT command to send the information such as Cabinet, Subrack, Slot, and Port to NEs. The process for adding a user-defined alarm is the process for defining Alarm Name and Alarm ID of an alarm. If you bind a user-defined alarm and NEs by running an MML command without adding the alarm, the following problems may occur:
l l

The user-defined alarm does not have an Alarm Name. If you repeat the binding operations to bind multiple user-defined alarms and a port by running MML commands, only the last binding operation takes effect.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Setting window is displayed. Step 2 Click the User Defined Alarm > Alarm Definition tab. Step 3 Click Add. The Add User Defined Alarm dialog box is displayed. Step 4 Set the parameters related to a user-defined alarm. 1. 2.
2-70

Select an NE type from the NE Type navigation tree. Set Alarm Name, Alarm ID, and Alarm Level.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 5 Click OK. The user-defined alarm to be added is listed on the Alarm Definition tab page. Each record is marked
NOTE

For a NodeB, the information about the user-defined alarm is not sent to the NodeB. For MSCe and MGW, if you select NEs when adding or modifying a user-defined alarm, the information about the modified user-defined alarm is sent to the selected NEs after you click Apply.

Step 6 Click Apply. The ----End icon disappears. A dialog box is displayed, informing you of operation result.

Postrequisite
For details about how to bind a user-defined alarm and an NE, see 2.4.8.2 Adding the Binding Relation of a User-Defined Alarm.

Related References
2.8.27 Parameters for User-Defined Alarms

Modifying a User-Defined Alarm


This describes how to modify a user-defined alarm.

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized to perform the related operation. At least one user-defined alarm record is available.

Context

CAUTION
The ID and NE type of a user-defined alarm cannot be modified.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Alarm Definition tab in the User-Defined Alarm dialog box. Step 3 Select a user-defined alarm that has been used. Step 4 Click Modify. Alternatively, right-click the object group and choose Modify from the shortcut menu.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-71

2 Network Monitoring

M2000 Operator Guide

The Modify User-Defined Alarm dialog box is displayed. Step 5 Rename the user-defined alarm in the Alarm Name field in the Modify User-Defined Alarm dialog box, if required. Step 6 Select the alarm severity level in the Alarm Level field, if required. Step 7 Click OK. The alarm bindings to be added are listed on the Alarm Definition tab page. Each record is marked
NOTE

After a user-defined alarm is modified, you need to click Apply to make the modification take effect.

Step 8 Click Apply. The modified user-defined alarms are applied to the NE. An information box is displayed, indicating whether the operation succeeds or fails. ----End

Related References
2.8.27 Parameters for User-Defined Alarms

2.4.8 Binding a User-Defined Alarm


This describes how to define the corresponding relations between the user-defined alarms and the signal input ports. When a signal received through a port meets the alarm triggering conditions, the NE reports an alarm to the M2000, and the alarm is bound with a customized name and ID.

Context
The NEs that support this function are NodeB, MSC Server, MGW, and BSC6000. 2.4.8.1 Querying the Binding of a User-Defined Alarm This describes how to query the binding of a user-defined alarm. The binding of a user-defined alarm is stored on the related NE rather than in the M2000 database. You can query an existing binding of a user-defined alarm on an NE. 2.4.8.2 Adding the Binding Relation of a User-Defined Alarm This describes how to add the binding relation of a user-defined alarm as required. 2.4.8.3 Modifying the Binding of a User-Defined Alarm This describes how to modify the binding of a user-defined alarm. 2.4.8.4 Canceling the Binding of a User-Defined Alarm This describes how to cancel the binding of a user-defined alarm, that is, cancel the binding of a user-defined alarm set on the M2000 and not issued to the related NE. This operation does not affect the NE operation. 2.4.8.5 Exporting a User-Defined Alarm Binding Template This describes how to export a user-defined alarm binding template and edit it. After you import the edited alarm binding template, it is added to the list of the Alarm Binding tab page. 2.4.8.6 Importing a User-Defined Alarm Binding Relation
2-72 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

This describes how to import a user-defined alarm binding template to the Alarm Binding tab page. A user-defined alarm binding template can contain the user-defined alarm binding relation of multiple NEs of the same type. The import template enables you to add user-defined alarm binding relations in batches.

Related References
2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm

Querying the Binding of a User-Defined Alarm


This describes how to query the binding of a user-defined alarm. The binding of a user-defined alarm is stored on the related NE rather than in the M2000 database. You can query an existing binding of a user-defined alarm on an NE.

Prerequisite
l l

You have logged in to the M2000 client. You are authorized to perform the related operation.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Alarm Binding tab on the User-Defined Alarm in the NE Alarm Settings window. Step 3 On the Alarm Binding tab page, click Query. The Query Alarm Binding dialog box is displayed. Step 4 In the Query Alarm Binding dialog box, click behind NE Name.

Step 5 In the displayed navigation tree, select the NE that the alarm binding to be queried belongs to. Step 6 Type a cabinet number in Cabinet, subrack number in Subrack, slot number in Slot, and port number in Port. Step 7 Click OK. The queried alarm binding is displayed on the Alarm Binding tab page in the NE Alarm Setting window. ----End

Related References
2.8.14 Parameters for Selecting NE for Query 2.8.29 Parameters for Querying the Binding of a User-Defined Alarm

Adding the Binding Relation of a User-Defined Alarm


This describes how to add the binding relation of a user-defined alarm as required.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-73

2 Network Monitoring

M2000 Operator Guide

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized to perform the relevant operations on NEs. Certain user-defined alarms are already added. For details about how to add a user-defined alarm, see 2.4.7.2 Adding a User-Defined Alarm.

Context
The user-defined alarms of NEs can be used to monitor the physical environment of hardware. To make the alarms take effect, you must bind these alarms and specified subracks, slots, and ports. A user-defined alarm must be added on the M2000. Thus, you can bind the alarm and the NEs to be monitored. You can bind a user-defined alarm and NEs in the NE Alarm Setting window. Alternatively, you can bind the user-defined alarm and NEs by running the SET ALMPORT command to send the information such as Cabinet, Subrack, Slot, and Port to NEs. The process for adding a user-defined alarm is the process for defining Alarm Name and Alarm ID of an alarm. If you bind a user-defined alarm and NEs by running an MML command without adding the alarm, the following problems may occur:
l l

The user-defined alarm does not have an Alarm Name. If you repeat the binding operations to bind multiple user-defined alarms and a port by running MML commands, only the last binding operation takes effect.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Setting window is displayed. Step 2 Click the User Defined Alarm > Alarm Binding tab. Step 3 Click Add. The Add Alarm Binding dialog box is displayed. Step 4 In the Select NE navigation tree in the left pane, click an NE. Alternatively, enter the NE name in the Search by Name field. Select Group by NE Type. Then, the Select NE navigation tree displays the NEs by NE type. Step 5 In the Select Alarm navigation tree in the right pane, click an alarm. Alternatively, enter the alarm name in the Search by Name field. Select Group by Alarm Type, Group by Alarm Level, and Group by Category. Then, the Select Alarm tree displays the alarms by alarm type and alarm severity. Step 6 Set the binding parameters. Step 7 Click OK. The alarm binding relation to be added is listed on the Alarm Binding tab page. Each record is marked .

2-74

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

CAUTION
After adding an alarm binding relation, you must click Apply to make the settings take effect on an NE. Step 8 Click Apply. The user-defined alarm and the NE are bound, and the icon before the related record disappears. A dialog box is displayed, informing you of the operation result. ----End

Related References
2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm

Modifying the Binding of a User-Defined Alarm


This describes how to modify the binding of a user-defined alarm.

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized to perform the related operation. At least one user-defined alarm binding record is available.

Context
After the binding of an MSCe alarm is applied, it cannot be modified.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Alarm Binding tab in the User-Defined Alarm dialog box. Step 3 Select an alarm binding. Step 4 Click Modify. Alternatively, right-click the binding and choose Modify from the shortcut menu. The Modify Alarm Binding dialog box is displayed. Step 5 In the Modify Alarm Binding dialog box, modify the binding parameters. For detailed description of the parameters, refer to 2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm. Step 6 Click OK. The alarm bindings to be added are listed on the Alarm Binding tab page. Each record is marked .
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-75

2 Network Monitoring

M2000 Operator Guide

CAUTION
After adding alarm bindings, you must click Apply to make the settings take effect on the NE. Step 7 Click Apply. The modified user-defined alarms are applied to the NE. An information box is displayed, indicating whether the operation succeeds or fails. ----End

Related References
2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm

Canceling the Binding of a User-Defined Alarm


This describes how to cancel the binding of a user-defined alarm, that is, cancel the binding of a user-defined alarm set on the M2000 and not issued to the related NE. This operation does not affect the NE operation.

Prerequisite
l l l

You have logged in to the M2000 client. You are authorized to perform the related operation. At least one user-defined alarm binding record is available.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . The NE Alarm Settings window is displayed. Step 2 Click the Alarm Binding tab in the User-Defined Alarm dialog box. Step 3 In the list on the Alarm Binding tab page, select one user-defined alarm binding record. Step 4 Click Undo. Alternatively, right-click the record and choose Undo from the shortcut menu. ----End

Exporting a User-Defined Alarm Binding Template


This describes how to export a user-defined alarm binding template and edit it. After you import the edited alarm binding template, it is added to the list of the Alarm Binding tab page.

Prerequisite
You are authorized to perform the associated operations.

Context
The user-defined alarm template varies with the NE type. You can export the template of one NE type at a time.
2-76 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . Step 2 Click the Alarm Binding tab in the User-Defined Alarm dialog box. Step 3 Click Export Template. You can click Export to export by NE type the records on the Alarm Binding tab page. Step 4 Select the NE type in the Export Alarm Binding Template dialog box. Step 5 Set the save path and file name. Step 6 Click OK. Then, the template with the specified name is saved to the specified path. ----End

Postrequisite
You can edit the template based on your requirement by referring to the examples given in the user-defined alarm template file. After editing the template, you can import it to the Alarm Binding tab page. For details on how to import a user-defined alarm binding template, see 2.4.8.6 Importing a User-Defined Alarm Binding Relation.

Related Tasks
2.4.8.6 Importing a User-Defined Alarm Binding Relation

Importing a User-Defined Alarm Binding Relation


This describes how to import a user-defined alarm binding template to the Alarm Binding tab page. A user-defined alarm binding template can contain the user-defined alarm binding relation of multiple NEs of the same type. The import template enables you to add user-defined alarm binding relations in batches.

Prerequisite
l l

You are authorized to perform the associated operations. The user-defined alarm binding template is available on the local M2000 client.

Context
The user-defined alarm binding template varies with the NE type. You can import the template of one NE type at a time.

Procedure
Step 1 Choose Monitor > Settings > NE Alarm Setting . Step 2 Click the Alarm Binding tab in the User-Defined Alarm dialog box. Step 3 Click Import.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-77

2 Network Monitoring

M2000 Operator Guide

You can export an existing user-defined alarm binding or user-defined alarm binding template to a specified directory and then edit it. For details on how to export a user-defined alarm binding template, see 2.4.8.5 Exporting a User-Defined Alarm Binding Template. Step 4 Select the NE type in the Import Alarm Binding Template dialog box. Step 5 Set the path for saving the template file. Step 6 Click OK. The user-defined alarm binding relation is displayed in the list of the Alarm Binding tab. You can click Apply to apply the selected binding to the NE. ----End

Related Tasks
2.4.8.5 Exporting a User-Defined Alarm Binding Template

2.5 Monitoring NE Performance in Real Time


You can monitor in real time the specified object types and instances. In addition, you can display the monitoring results in data tables and figures. You can set filter conditions and display effects for the results. Then you save the results and figures to a file.

Context
NOTE

You can monitor the performance of NEs only after purchasing the license of the monitoring function.

2.5.1 Real-Time Monitoring Performance Counters This part introduces some parameters during the real-time monitoring of NEs. 2.5.2 Starting Real-Time Performance Monitoring This describes how to start the real-time performance monitoring, which consists of creating, viewing, and starting a monitoring task, synchronizing the monitoring data, and setting the monitoring threshold. Currently, the system supports the performance monitoring of HLR, iMSC, MSC Server, BSC32, BSC6000, PCU, RNC, SGSN, GGSN80, and MSC Pool. 2.5.3 Displaying Monitoring Results You can set display parameters of monitoring results. For the convenience of checking the monitoring results, set the filter conditions, thresholds, colors, and backgrounds. 2.5.4 Handling Monitoring Data The handling monitoring data consists of the functions of analyzing trends, scanning data, saving, and printing.

Related References
2.8.5 Interface Description: Performance Monitor

2.5.1 Real-Time Monitoring Performance Counters


This part introduces some parameters during the real-time monitoring of NEs.
2-78 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Real-Time Monitoring Performance Counters


The concepts pertaining to performance monitoring are as follows:
l

Function Set Includes multiple function subsets related to a certain function of the system. Function Subset Includes multiple monitoring counters related to a certain function of the system. Monitoring Counter Performance measurement counters. You can query the performance information on an NE by creating a monitoring task.

The NE performance monitoring counters are as follows:


l l l l l l l

MSC Server performance monitoring counters, as shown in Table 2-5. RNC performance monitoring counters, as shown in Table 2-6. BSC performance monitoring counters, as shown in Table 2-7. BSC6000 performance monitoring counters, as shown in Table 2-8. GGSN80 performance monitoring counters, as shown in Table 2-9. SGSN performance monitoring counter on the MML interface, as shown in Table 2-10. SGSN performance monitoring counter on the FTP MML interface, as shown in Table 2-11. HLR performance monitoring counters, as shown in Table 2-12. PCU performance monitoring counters, as shown in Table 2-13. iMSC performance monitoring counters, as shown in Table 2-14. MSC Pool performance monitoring counters, as shown in Table 2-15. CDMA Pool performance monitoring counters, as shown in Table 2-16.

l l l l l

For the detailed meaning and the calculation method of the performance counters, refer to Performance Counter Information in NE Reference Information of the online help. For details about how to download the NE reference information, refer to 1.14 Downloading NE Mediation Data to the M2000 Client. Table 2-5 MSC server performance monitoring counters Function Set Function Subset Monitoring Counter Mobile originated success rate Mobile originated answer rate MSC basic service monitoring 2G mobile originated call Seizure traffic Connection traffic Answer traffic 3G mobile originated call Mobile originated success rate Mobile originated answer rate
2-79

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset

Monitoring Counter Seizure traffic Connection traffic Answer traffic Mobile terminated success rate Mobile terminated answer rate

2G mobile terminated call

Seizure traffic Connection traffic Answer traffic

3G mobile terminated call

Mobile terminated success rate Mobile terminated answer rate Seizure traffic Connection traffic Answer traffic

Short message service

Initiated short message sending success rate Terminated short message sending success rate Rate of intra MSC handover success

Handover MSC mobile counter monitoring

rate of successful MSC outgoing handover requests rate of successful MSC incoming handover requests

Assign Paging Location update

Rate of assigning success Ratio of paging responses Rate of location update success Originating and incoming times Terminating and outgoing times BHCA value Congestion times Congestion duration Overload times Overload duration Average usage rate

MSC Resource Monitor

CPU usage rate

2-80

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set

Function Subset

Monitoring Counter Peak value usage rate Peak value duration

MSC office direction traffic monitoring

Incoming office traffic

Connected ratio Answered ratio Seizure traffic Connection traffic Answer traffic Trunk available ratio Average Traffic Per Line Seizure ratio Connected ratio Answered ratio

Outgoing office traffic

Seizure traffic Connection traffic Answer traffic Trunk available ratio Average Traffic Per Line

MSC trunk traffic monitoring

Trunk office traffic measurement

Connected ratio Answered ratio Seizure traffic Connection traffic Answer traffic Seizure ratio Connected ratio

Trunk outgoing traffic measurement

Answered ratio Seizure traffic Connection traffic Answer traffic

MSC link monitoring

BICC link monitoring

Number of sending messages

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-81

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset

Monitoring Counter Number of receiving messages Number of sending bytes Number of receiving bytes Congestion times Congestion duration Unavailable times Unavailable duration Link traffic Average link load

H248 link monitoring

Number of sending messages Number of receiving messages Number of sending bytes Number of receiving bytes Congestion times Congestion duration Unavailable times Unavailable duration Link traffic Average link load

M3UA link monitoring

Number of sending messages Number of receiving messages Number of sending bytes Number of receiving bytes Congestion times Congestion duration Unavailable times Unavailable duration Link traffic Average link load

2-82

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set MSC Traffic Monitor

Function Subset MSC Alert Rate

Monitoring Counter Call connected times Seizure times Alert Rate

MSC MTP Signaling Link

MSC MTP SL Load

SL Load

Table 2-6 RNC performance monitoring counters Function Set RNC Monitor Function Subset RNC key counter monitoring Monitoring Counter RRC Connection Setup Success Rate(service) AMR RAB Assignment Success Rate VP RAB Setup Success Rate PS RAB Assignment Success Rate AMR Call Drop Rate VP Call Drop Rate PS Service Drop Rate Soft Handover Success Rate CS Inter-RAT Handover Success Rate(from UTRAN to GSM) PS Inter-RAT Handover Success Rate(from UTRAN to GSM) Inter-Freq Hard Handover Success Rate RNC key counter monitoring RRC Connection Setup Success Rate(service) AMR RAB Assignment Success Rate VP RAB Setup Success Rate PS RAB Assignment Success Rate AMR Call Drop Rate VP Call Drop Rate PS Service Drop Rate CS Inter-RAT Handover Success Rate(from UTRAN to GSM)

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-83

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset

Monitoring Counter PS Inter-RAT Handover Success Rate(from UTRAN to GSM) Inter-Freq Hard Handover Success Rate

Table 2-7 BSC performance monitoring counters Function Set NW Level Performance Monitor Function Subset BSC Performance Monitor Monitoring Counter TCH Call-Drop Rate SDCCH Call-Drop Rate TCH Assignment Failure Rate Ratio of paging responses Call Success Rate HO due to UL Quality HO due to DL Quality Network Availability Call Setup Success Rate Daily Total Traffic Maximum Total Traffic Maximum FR-Traffic Maximum HR-Traffic Handover Success Rate Attempted TCH seizures for call RF Assign Success Rate BSC Cell Performance Monitor TCH Congestion Rate TCH Blocking Rate SDCCH Congestion Rate SDCCH Access Success Rate Handover Success Rate Attempted TCH seizures for call SDCCH RF Loss Rate

2-84

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set

Function Subset

Monitoring Counter TCH RF Loss Rate

Incoming HO Monitor Outgoing HO Monitor Resource Monitor Link Monitor CPU Resource Monitor SS7 Link Monitor

Incoming HO Success Rate Outgoing HO Success Rate CPU usage rate SS7 Signaling Link Receiving and Sending Rate

Table 2-8 BSC6000 performance monitoring counters Function Set BSC6000 real time monitor Function Subset BSC Monitoring Counter Handover Successfully Rate (Real-Time Monitor) Per BSC Traffic Volume on TCH (Real-Time Monitor) Per BSC Establish Call Successful Rate (Real-Time Monitor) Per BSC TCH Call Drop Rate (Contain Handover) (Real-Time Monitor) Per BSC TCH Congestion Rate (Overflow) (Real-Time Monitor) Per BSC CELL TCH Call Drop Rate (Contain Handover) (Real-Time Monitor) Traffic Volume on TCH (Real-Time Monitor) Per BSC Establish Call Successful Rate (Real-Time Monitor) Handover Successfully Rate (Real-Time Monitor) TCH Congestion Rate (Overflow) (Real-Time Monitor) Table 2-9 GGSN80 performance monitoring counters Function Set Session Service realtime monitor
Issue 06 (2008-12-16)

Function Subset Basic session service

Monitoring Counter PDP context act PDP context act success ratio

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-85

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset

Monitoring Counter PDP Context num

Apn session performance

GTPv1 MS activate session request GTPv1 MS act PDP context success ratio GTPv0 MS activate session request GTPv0 MS act PDP context success ratio Active PDP Context

AAA performance realtime monitor

AAA Performance

Authentication request Authentication successful ratio Accounting start request Accounting start successful ratio Accounting stop request Accounting stop successful ratio Real time accounting request Real time accounting ratio

APN AAA Performance

Authentication request Authentication successful ratio Accounting start request Accounting start successful ratio Accounting stop request Accounting stop successful ratio Real time accounting request Real time accounting ratio

Data transfer realtime monitor

Data transfer measurement

Gn Peak Throughput in MB Gi Peak Throughput in MB Gn Uplink in MB Gn Downlink in MB Gi Uplink in MB Gi Downlink in MB

System Resource

System Resource Measurement

Average CPU occupation ratio

2-86

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set realtime monitor

Function Subset

Monitoring Counter Peak CPU occupation ratio

Table 2-10 SGSN performance monitoring counter on the MML interface Function Set 2G realtime monitor Function Subset 2G mobility management Monitoring Counter 2G GPRS attach request times 2G GPRS attach success ratio 2G intra-SGSN RAU request times 2G intra-SGSN RAU success ratio 2G inter-RAU request times 2G inter-RAU success ratio 2G session management 2G resource 2G MS init PDP context act 2G MS init PDP context act success ratio 2G average attached users 2G average act PDP context 2G paging 2G packet paging request times 2G packet paging success ratio 3G realtime monitor 3G mobility management 3G GPRS attach request times 3G GPRS attach success ratio 3G intra-SGSN RAU request times 3G intra-SGSN RAU success ratio 3G inter-RAU request times 3G inter-RAU success ratio 3G session management 3G resource 3G MS init PDP context act 3G MS init PDP context act success ratio 3G average attached users 3G average act PDP context 3G paging 3G packet paging request times 3G packet paging success ratio

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-87

2 Network Monitoring

M2000 Operator Guide

Function Set Common realtime monitor

Function Subset CPU resource

Monitoring Counter CPU overload times CPU overload duration CPU congestion times CPU congestion duration Average CPU occupation ratio

Link realtime monitor

MTP link

MTP link send load MTP link receive load MTP link congestion MTP link durations of congestion MTP link durations of unavailable

Data transfer realtime monitor

Data transfer measurement

GTP kbytes sent to GGSN GTP kbytes received from GGSN Downlink data kbytes sent to SNDCP Uplink data kbytes received from SNDCP Downlink data kbytes sent to RNC Uplink data kbytes received from RNC

Table 2-11 SGSN performance monitoring counter on the FTP MML interface Function Set Gb mode realtime monitor Function Subset Gb mode mobility management Monitoring Counter Gb mode GPRS attach request times Gb mode GPRS attach success ratio Gb mode intra-SGSN RAU request times Gb mode intra-SGSN RAU success ratio Gb mode inter-SGSN RAU request times Gb mode inter-RAU success ratio Gb mode session management Gb mode resource Gb mode MS init PDP context act Gb mode MS init PDP context act success ratio Gb mode average attached users Gb mode average act PDP context

2-88

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set

Function Subset Gb mode paging

Monitoring Counter Gb mode packet paging request times Gb mode packet paging success ratio

Iu mode realtime monitor

Iu mode mobility management

Iu mode GPRS attach request times Iu mode GPRS attach success ratio Iu mode intra-SGSN RAU request times Iu mode intra-SGSN RAU success ratio Iu mode inter-SGSN RAU request times Iu mode inter-RAU success ratio

Iu mode session management Iu mode resource Iu mode paging

Iu mode MS init PDP context act Iu mode MS init PDP context act success ratio Iu mode average attached users Iu mode average act PDP context Iu mode packet paging request times Iu mode packet paging success ratio

Common realtime monitor

CPU resource

CPU overload times CPU overload duration CPU congestion times CPU congestion duration Average CPU occupation ratio

Link realtime monitor

MTP3 link

MTP3 link send load MTP3 link receive load MTP3 link congestion MTP3 link durations of congestion MTP3 link durations of unavailable

Data transfer realtime monitor

Data transfer measurement

GTP kbytes sent to GGSN GTP kbytes received from GGSN Downlink data kbytes sent to SNDCP Uplink data kbytes received from SNDCP Downlink data kbytes sent to RNC

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-89

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset

Monitoring Counter Uplink data kbytes received from RNC

Table 2-12 HLR performance monitoring counters Function Set HLR Link Monitor HLR HDU Monitor Function Subset HLR MTP SL Measurement HLR CPU Measurement Monitoring Counter SL Load CPU usage rate

Table 2-13 PCU performance monitoring counters Function Set NW Level Performance Monitor Function Subset BSC Performance Monitor Monitoring Counter Uplink TBF establishment failure rate Downlink TBF establishment failure rate

Table 2-14 iMSC performance monitoring counters Function Set iMSC Basic Service Monitor Function Subset iMSC Traffic Measurement Monitoring Counter Number of Call Attempts Number of Connected Calls Alert rate iMSC Resource Monitor iMSC VLR Subscribers Number iMSC Mobilerelated Indicators Monitor iMSC Office Traffic Monitor iMSC CPU Load Measurement iMSC VLR Subscribers Number iMSC Traffic Channel Assignment CPU Occupation Ratio

VLR Subscribers Number

Number of Traffic Channel Assignment Successes Number of Traffic Channel Assignment Requests Rate of assigning success

iMSC Office Traffic Measurement

Bidirectional Trunk Incoming Call Seized Traffic Bidirectional Trunk Outgoing Call Seized Traffic

2-90

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Function Set

Function Subset

Monitoring Counter Seizure traffic

iMSC Link Monitor

iMSC MTP Signaling Link

Number of Sent Load Number of Received Load Number of All Load

iMSC Trunk Traffic Monitor

iMSC Trunk Traffic Measurement

Bidirectional Trunk Incoming Call Answered Traffic Bidirectional Trunk Outgoing Call Answered Traffic

Table 2-15 MSC Pool performance monitoring counters Function Set Bearer Traffic Function Subset Mobile office direction incoming office traffic Mobile Office Direction Outgoing Office Traffic Global Components MSC Basic Services Call Processing MSC Basic Functions Subscriber SMS Success Rate Ratio of paging responses Rate of location update success Monitoring Counter Seizure traffic Connected ratio Seizure traffic Connected ratio VLR Subscriber of Total SMMO SUCCESS RATE SMMT SUCCESS RATE Ratio of paging responses Success Rate of Location Update

Table 2-16 CDMA Pool performance monitoring counters Function Set Bearer Traffic Function Subset Mobile office direction incoming office traffic Mobile Office Direction Monitoring Counter Seizure traffic Connected ratio Seizure traffic

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-91

2 Network Monitoring

M2000 Operator Guide

Function Set

Function Subset Outgoing Office Traffic

Monitoring Counter Connected ratio LOCAL SUBSCRIBERS SMMO SUCCESS RATE SMMT SUCCESS RATE Ratio of paging responses

Global Components MSC Basic Services Call Processing MSC Basic Functions

Subscriber SMS Success Rate MTC Success Rate Paging Rate Success Rate of Location Update

Rate of location update success

2.5.2 Starting Real-Time Performance Monitoring


This describes how to start the real-time performance monitoring, which consists of creating, viewing, and starting a monitoring task, synchronizing the monitoring data, and setting the monitoring threshold. Currently, the system supports the performance monitoring of HLR, iMSC, MSC Server, BSC32, BSC6000, PCU, RNC, SGSN, GGSN80, and MSC Pool. 2.5.2.1 Viewing Monitoring Task Information This describes how to view monitoring task information. 2.5.2.2 Creating a Monitoring Task This describes how to create a monitoring task. The M2000 provides the monitoring function of performance counters in real time. You can set the monitoring parameters to monitor the changes in NE performance counters. 2.5.2.3 Starting a Monitoring Task This describes how to start a monitoring task to open the interface of the monitoring task and check the changes in the monitoring counters. 2.5.2.4 Synchronizing Monitoring Data After you execute a monitoring task, some monitoring data may be missing caused by some reasons, such as interrupted connection. You can collect back the missing data through this function. 2.5.2.5 Setting Real-Time Monitoring Thresholds This describes how to set the real-time monitoring thresholds. The thresholds can be added, modified, and deleted. 2.5.2.6 Setting Rules for Monitoring Thresholds You can set rules to filter all the threshold offsets that may trigger threshold alarms within the set period of time. Set the time to filter monitoring thresholds. Filtering rules include the date and time. 2.5.2.7 Introduction to Default Monitoring Tasks This describes the default M2000 monitoring tasks, including system tasks and Tip tasks.
2-92 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.5.2.8 Monitoring Multiple Counters on the Same Screen You can monitor comparison diagrams for multiple counters or of objects, and counter trend diagrams by setting the objects and object counters to be monitored. This task enables you to browse data analysis diagrams for multiple counters at the same time.

Viewing Monitoring Task Information


This describes how to view monitoring task information.

Procedure
Step 1 Choose Monitor > Performance Monitor, the Performance Monitor window is displayed. Step 2 Select the Monitor Task tab on the left of the window. If the monitored task is unavailable on the navigation tree, you can right-click System Task or User-Defined Task and choose Refresh to refresh the navigation tree. Step 3 Right-click the task in the navigation tree choose select View Task. The View Task dialog box is displayed. In the dialog box, you can view the detailed information of the task. ----End

Creating a Monitoring Task


This describes how to create a monitoring task. The M2000 provides the monitoring function of performance counters in real time. You can set the monitoring parameters to monitor the changes in NE performance counters.

Prerequisite
You have logged in to the M2000 client.

Context
l l

A monitoring task consists of system task, Tip task, and user-defined task. The naming rule for the monitoring task tab page is NE name-Monitoring type. For example, RNC32-RNC.

Procedure
Step 1 Choose Monitor > Performance Monitor. The Performance Monitor dialog box is displayed. Step 2 You can choose an NE from the NE View tab page or choose an object group from the Object Set tab page to create a monitoring task.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-93

2 Network Monitoring

M2000 Operator Guide

Creating Method To... NE view 1. Click the NE view tab on the left part of the interface. 2. Select the NE in the navigation tree. You can press Ctrl or Shift to select multiple NEs or cells of the same NE type. 3. Perform Step 3. Object set 1. Click the ObjectGroup tab on the left part of the interface. 2. Select the object group in the navigation tree. For details, refer to 1.16 Managing User-Defined Object Groups. 3. Perform Step 3. Step 3 Open the Monitor Parameter Setting dialog box. You can perform either of the following operations to open the Monitor Parameter Setting dialog box.
l l

Press and hold the left mouse button to drag the selected NE to the right part of the interface. Right-click multiple objects and choose Start Monitor > User-defined.

If you need to use the default settings, choose Start Monitor > Default. Step 4 Set the monitoring parameters. Click Save as Default. The system automatically saves the current setting as the default one. The setting takes effect when you set the parameters for the same object next time. Step 5 Click OK. A tab page of this monitoring task is created on the right part of the interface to display the detailed information about the monitoring parameters. You can view the monitoring information through the Table Data or Monitor Chart. Step 6 Optional: Check any abnormal information that leads to the failure to create a performance monitoring task. When a performance monitoring task fails to be created, an icon task name on the task tab page. 1. 2. 3. is displayed before the

Right-click the task tab, and then choose Abnormal Information. In the displayed Abnormal Information dialog box, check the information about the NEs that leads to the failure to create a performance monitoring task and the detailed reason. Click Close.

----End

Starting a Monitoring Task


This describes how to start a monitoring task to open the interface of the monitoring task and check the changes in the monitoring counters.

Prerequisite
l

You have logged in to the M2000 client.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

2-94

M2000 Operator Guide


l

2 Network Monitoring

The monitoring task has been successfully created.

Context
l

You can simultaneously start a maximum of eight monitoring tasks on one client. If eight monitoring tasks that have been started exist, new task fails to be started. For each monitoring task, a maximum of 2000 monitoring result records can be displayed on the GUI. All the created tasks are displayed in the navigation tree.

Procedure
Step 1 Choose Monitor > Performance Monitor, the Performance Monitor window is displayed. Step 2 Select the Monitor Task tab on the left of the window. Step 3 Right-click it and choose Start Monitor.
l

By default, the Table Data tab page displays the historical data, that is, the result data of the monitoring task within four days, and for the BSC6000 monitoring task, the result data within two hours is displayed. If you do not require the historical monitoring data to be displayed, you can right-click the blank area of the tab page and clear the Show History Data from the shortcut menu. If you need to display the monitoring chart, right-click the blank area of the Table Data tab page and choose Display Monitoring Chart from the shortcut menu. In the displayed Set Monitoring Information dialog box, you can set Type of Monitoring Chart, Monitoring Object, and Monitoring Counter, then click OK. The system supports the compare display of multiple counters of the same object, or the compare display of the same counter of multiple objects.

If the monitoring interface is closed, the result is not reported to the client. The monitoring task, however, still runs on the server to ensure that the latest data is reported.

----End

Synchronizing Monitoring Data


After you execute a monitoring task, some monitoring data may be missing caused by some reasons, such as interrupted connection. You can collect back the missing data through this function.

Prerequisite
A monitoring task is started.

Context
If the time segment is longer, the data synchronization task lasts longer.

Procedure
Step 1 Right-click and select Show Monitor Chart in the Table Data tab. Step 2 In Monitor Information Setting, select the icon, monitoring object and monitoring counter.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-95

2 Network Monitoring

M2000 Operator Guide

Step 3 Click OK to view the Monitor Chart tab. Step 4 Right-click the compare chart and select Synchronize. The Select a Time Segment dialog box is displayed. Step 5 Set a time segment for synchronizing the monitoring data. Step 6 Click OK. The displayed dialog box shows whether the synchronization command is successfully delivered. Step 7 Click OK to close the dialog box. ----End

Setting Real-Time Monitoring Thresholds


This describes how to set the real-time monitoring thresholds. The thresholds can be added, modified, and deleted.

Procedure
Step 1 Choose Performance > Monitor Threshold Management . The Monitor Threshold Management window is displayed. Step 2 Select a monitoring task in the navigation tree. The Threshold List displays all thresholds set for the monitoring task. Step 3 Add, modify, or delete monitoring thresholds. Operation Add monitoring thresholds. Procedure 1. In the navigation tree in the Threshold Info, select an object to monitor. 2. Set monitoring threshold parameters for the object. 3. Click Add. The added monitoring thresholds are displayed in the Threshold List. The system refreshes the Threshold List area on all the other clients. Modify monitoring thresholds. 1. Select a set monitoring threshold. 2. In the Threshold Info, reset monitoring threshold parameters. 3. Click Modify. The modified monitoring thresholds are displayed in the Threshold List. The system refreshes the Threshold List area on all the other clients.

2-96

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Operation Delete monitoring thresholds.

Procedure 1. Select a set monitoring threshold. Press Shift or Ctrl to select multiple monitoring thresholds at a time. 2. Click Delete. 3. In the displayed Confirm dialog box, click Yes. After a monitoring threshold is deleted, the system automatically refreshes the Threshold List area on all the other clients.

----End

Related References
2.8.50 Parameters for Setting Real-Time Monitoring Thresholds

Setting Rules for Monitoring Thresholds


You can set rules to filter all the threshold offsets that may trigger threshold alarms within the set period of time. Set the time to filter monitoring thresholds. Filtering rules include the date and time.

Context
The set filtering rules apply only to the selected monitoring counters.

Procedure
Step 1 Select Performance > Monitor Threshold Management to view Monitor Threshold Management. Step 2 Select a monitoring task in the navigation tree. The Threshold List displays all thresholds set for the monitoring task. Step 3 Select a set monitoring threshold. Step 4 Click Filter Rules. The Set Rules for Monitoring Thresholds dialog box is displayed. Step 5 Set the date and time. Step 6 Click Set. The displayed dialog box shows the operation results. Step 7 Click OK to close the prompt box. ----End

Related References
2.8.51 Parameters for Setting Rules for Monitoring Thresholds

Introduction to Default Monitoring Tasks


This describes the default M2000 monitoring tasks, including system tasks and Tip tasks.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-97

2 Network Monitoring

M2000 Operator Guide

System Task
A system task is a task configured by the system when you install the M2000. You cannot modify or change the system task. Table 2-17 shows the detailed information about a system task. Table 2-17 System Task Task Name ALL-NET CPU SEIZURE RATIO ALL-NET BICC LINK ALL-NET H248 LINK ALL-NET M3UA LINK Description Performs the performance monitoring of the CPU usage ratio on the entire network. Performs the performance monitoring of the BICC link on the entire network. Performs the performance monitoring of the H248 link on the entire network. Performs the performance monitoring of the M3UA link on the entire network.

Tip Task
A Tip task is a monitoring task customized in Topology Prompt Customizing. It can monitor the specified NE, link, and area.
NOTE

After you customize a Tip task, you can:


l l

Place the cursor on the NE, link, or domain of the created Tip task on the topology view. Then, the monitoring results of the most recent measurement period are displayed. Place the cursor on the NE, link, or domain on the created Tip task again. Then, the monitoring results are refreshed.

Monitoring Multiple Counters on the Same Screen


You can monitor comparison diagrams for multiple counters or of objects, and counter trend diagrams by setting the objects and object counters to be monitored. This task enables you to browse data analysis diagrams for multiple counters at the same time.

Prerequisite
You have logged in to the M2000 client.

Procedure
Step 1 Choose Monitor > Performance Monitor. The Performance Monitor dialog box is displayed. Step 2 Click the NE view tab on the left part of the interface. Step 3 In the navigation tree, select one or more objects to be monitored. Then, right-click the node and choose Add task to Monitor Panel from the displayed shortcut menu. The Monitor Parameter Setting dialog box is displayed. You can press and hold the Ctrl key to select multiple object nodes of the same type.
2-98 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 4 Set Monitor Object Layer, Detail Data Object Layer, Monitor Type, and Monitor Counter. Step 5 Click OK. The Dashboard Monitor tab page is displayed.
l

In this window, you can monitor the diagrams of multiple counter comparison or of object comparison. In addition, you can view on a real-time basis the performance data reported by NEs on the list under each diagram. You can click Set to set Monitor chart total, Total per page, and Cycle Period(second). After the Cycle is activated, the monitored tasks are displayed in turn based on the preset Cycle Period(second). The number of monitored tasks displayed on each screen is determined by Total per page. You can click Previous or Next to manually switch over between different monitoring pages.

l l

Step 6 Optional: Right-click the monitor window and choose Trend Analysis to set parameters for trend analysis diagrams. For details about parameter settings in the trend analysis, refer to 2.8.46 Parameters for Analyzing the Trend of a Monitoring Counter. You can open a maximum of five trend analysis tab pages at the same time in the monitor window. ----End

2.5.3 Displaying Monitoring Results


You can set display parameters of monitoring results. For the convenience of checking the monitoring results, set the filter conditions, thresholds, colors, and backgrounds.

Context
The monitoring of entities can be displayed through charts and data tables. Charts include monitoring charts and tendency charts. Monitoring charts fall into the following three categories:
l l l

Counter compare charts: show changes of multiple counters of one monitored object. Object compare charts: show changes of one counter of multiple monitored objects. Detail charts: show changes of various counters and objects in multiple separate charts.

2.5.3.1 Setting Filtering Conditions for a Monitoring Table You can set filtering conditions for a monitoring table. Then only the monitoring data that meets the filtering conditions is displayed or hidden. 2.5.3.2 Setting Thresholds for Displaying Counters in a Monitoring Table This task is performed to set thresholds for the monitored counters to show the monitored objects whose counter values exceed the set threshold. 2.5.3.3 Zoom In/Out a Monitoring Chart You can zoom in or out a monitoring chart for better observation of the monitoring data. The detail chart does not support this function. 2.5.3.4 Setting Properties for a Monitoring Chart You can set chart attributes to obtain a satisfied object monitoring chart. 2.5.3.5 Setting Thresholds for Displaying Counters in a Monitoring Chart This task is performed to set the thresholds for the detail chart to show the monitored objects whose counter values exceed the predefined thresholds.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-99

2 Network Monitoring

M2000 Operator Guide

2.5.3.6 Setting a Background Picture for a Monitoring Chart You can set a background picture for a chart to enhance the visual effect of the chart. 2.5.3.7 Setting a Background Color for a Monitoring Chart You can set a background color for a chart to enhance the visual effect of the chart. 2.5.3.8 Setting a Color for a Curve of the Monitoring Chart You can set a color for a curve of the monitoring chart to enhance the visual effect of the chart. 2.5.3.9 Showing Scales in a Monitoring Chart The tick table is used to show the data of a time point in the active monitoring chart. Only the compare chart and tendency chart support this function.

Setting Filtering Conditions for a Monitoring Table


You can set filtering conditions for a monitoring table. Then only the monitoring data that meets the filtering conditions is displayed or hidden.

Context
l

The logical relationship between filtering conditions for object monitoring and filtering conditions for counter monitoring is "AND". You can set zero, one, or more filtering conditions. The relationship between multiple counter filtering conditions can be "OR" or "AND".

Procedure
Step 1 In Performance Monitor, select Table Data. Step 2 In Table Data, right-click and selectFilter Setting. The Filter Setting dialog box is displayed. Step 3 Set filtering parameters. Step 4 Click OK. Set filtering conditions for the counter monitoring in the tables directly. Add or delete counter filtering conditions by clicking the + or -. ----End

Related References
2.8.48 Parameters for Setting Filtering Conditions for a Monitoring Table

Setting Thresholds for Displaying Counters in a Monitoring Table


This task is performed to set thresholds for the monitored counters to show the monitored objects whose counter values exceed the set threshold.

Context
This task sets the data display in the table when the value of a counter is greater than the upper threshold or smaller than the lower threshold.
2-100 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 In Performance Monitor, select Table Data. Step 2 In Table Data, right-click and select Threshold Setting. The Threshold Setting dialog box is displayed. Step 3 Select a monitored counter, and set the display format of the upper and lower limit. Step 4 Click OK. Click Reset Default. You can cancel the settings through the restoring defaults function. The data in the table is displayed in the default format. ----End

Related References
2.8.53 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Table

Zoom In/Out a Monitoring Chart


You can zoom in or out a monitoring chart for better observation of the monitoring data. The detail chart does not support this function.

Procedure
Step 1 In Performance Monitor, select Monitor Chart or Trend Chart. Step 2 Perform the following operations to zoom in or out the monitor chart or the tendency chart:
l l l

Click Click Click

to zoom in the chart. to zoom out the chart. to restore the original size of the chart.

----End

Setting Properties for a Monitoring Chart


You can set chart attributes to obtain a satisfied object monitoring chart.

Context
l

The curve in the counter compare chart indicates the names of the monitored counters. The curve in the object compare chart consists of names of the monitored objects. When you put the mouse on a sampling point, the system displays the time and value of the data for this point. When counters in multiple units are displayed in one compare chart, single x coordinate and multiple y coordinates are used.

Procedure
Step 1 In Performance Monitor, select Monitor Chart or Trend Chart.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-101

2 Network Monitoring

M2000 Operator Guide

Step 2 Right-click and select Properties. The Property Setting dialog box is displayed. Step 3 Set the properties. Step 4 Click OK. ----End

Related References
2.8.49 Parameters for Setting Properties for a Monitoring Chart

Setting Thresholds for Displaying Counters in a Monitoring Chart


This task is performed to set the thresholds for the detail chart to show the monitored objects whose counter values exceed the predefined thresholds.

Procedure
Step 1 In Performance Monitor, select Monitor Chart. Step 2 Right-click the detail chart and select Threshold Setting. The Detail Chart Threshold Setting dialog box is displayed. Step 3 Select a counter and set thresholds for the counter. Step 4 Click OK. Two threshold lines are drawn in the detail chart according to the upper and lower thresholds. When the value of a monitored counter is greater than the upper threshold or smaller than the lower threshold, the column is regarded as a grained column. ----End

Related References
2.8.52 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Chart

Setting a Background Picture for a Monitoring Chart


You can set a background picture for a chart to enhance the visual effect of the chart.

Context
l l

The format of a background picture can only be GIF, JPG, or PNG. The background picture is displayed, by default, in the same size as that of the compare chart area. The background picture cannot be removed. You can set the background color or set a new background picture to cover the applied background picture.

Procedure
Step 1 In Performance Monitor, select Monitor Chart or Trend Chart. Step 2 Right-click the chart and select Background > picture . The Open dialog box is displayed.
2-102 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 3 Select a background picture. Step 4 Click Open to apply the selected background picture. ----End

Setting a Background Color for a Monitoring Chart


You can set a background color for a chart to enhance the visual effect of the chart.

Procedure
Step 1 In Performance Monitor, selectMonitor Chart or Trend Chart. Step 2 Right-click the chart and choose Background > Color . The Background Setting dialog box is displayed. Step 3 Set the background color. Step 4 ClickOK to make the set background color effective. Click Reset to restore the default background color. ----End

Related References
2.8.47 Parameters for Setting a Background Color for a Monitoring Chart

Setting a Color for a Curve of the Monitoring Chart


You can set a color for a curve of the monitoring chart to enhance the visual effect of the chart.

Procedure
Step 1 In Performance Monitor, selectMonitor Chart or Trend Chart. Step 2 Right-click the chart and choose Line color settings. The Line Color Settings dialog box is displayed. Step 3 Set the color. Step 4 ClickOK. ----End

Showing Scales in a Monitoring Chart


The tick table is used to show the data of a time point in the active monitoring chart. Only the compare chart and tendency chart support this function.

Procedure
Step 1 InPerformance Monitor, selectMonitor Chart or Trend Chart. Step 2 Right-click the chart and select Tick Table. The tick table is displayed in the monitoring chart.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-103

2 Network Monitoring

M2000 Operator Guide

If the displayed monitoring chart already includes the tick table, perform this operation to hide the tick table. ----End

2.5.4 Handling Monitoring Data


The handling monitoring data consists of the functions of analyzing trends, scanning data, saving, and printing. 2.5.4.1 Analyzing the Trend of a Monitoring Counter To analyze the counter trend, you must compare the current data of a monitored counter with the history data of the counter of the same period. 2.5.4.2 Scanning Values of Correlated Monitoring Counters Scan data to view the data about a correlated counter for counter correlation analysis. For example, the put-through rate of a monitored object is detected low for a time point. To analyze causes of the low put-through rate, you should know why the put-through rate is low, what are the counters related to the put-through rate, and what are the values of the related counters. 2.5.4.3 Saving a Monitoring Chart You can save the monitoring chart as a figure. You can also save exported data as a file. 2.5.4.4 Saving a Monitoring Table You can save the current monitoring data by exporting the data to a file. 2.5.4.5 Printing a Monitoring Chart You can print the currently active chart.

Analyzing the Trend of a Monitoring Counter


To analyze the counter trend, you must compare the current data of a monitored counter with the history data of the counter of the same period.

Procedure
Step 1 Choose Monitor > Performance Monitor, the Performance Monitor window is displayed. Step 2 Select the Monitor Task tab on the left of the window. Step 3 Starting a monitoring task. For details, refer to 2.5.2.3 Starting a Monitoring Task. Step 4 Right-click and select Show Monitor Chart in the Table Data tab. The Monitor Information Setting dialog box is displayed. Step 5 Select the icon, monitoring object, and monitoring counter. The system supports the compare display of multiple counters of the same object, or the compare display of the same counter of multiple objects. Step 6 Click OK. The Monitor Chart tab page is displayed. The compare chart and detail chart of the started monitoring task are displayed. Step 7 In the compare or detail chart, right-click and select Trend Analysis to view the Trend Chart Parameter Setting dialog box.
2-104 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 8 Set parameters for the trend chart. Step 9 Click OK. In the Monitor Task tab, click the Trend Chart tab to see the trend chart. Click the Table Data tab. Right-click and select Show Trend Chart to see the trend chart. You can also see the trend chart through the Trend Chart tab. In the Trend Chart tab, right-click and select Exceptional Value Background for exceptional values. The exceptional values are displayed in background color. In other words, when the value for a time point is greater than the upper value or smaller than the lower value, the counter value is highlighted in a background color. In the Trend Chart tab, right-click and select Modify Diff Values to reset the upper and lower values. The trend chart is refreshed automatically after you modify the upper and lower values. ----End

Related References
2.8.46 Parameters for Analyzing the Trend of a Monitoring Counter

Scanning Values of Correlated Monitoring Counters


Scan data to view the data about a correlated counter for counter correlation analysis. For example, the put-through rate of a monitored object is detected low for a time point. To analyze causes of the low put-through rate, you should know why the put-through rate is low, what are the counters related to the put-through rate, and what are the values of the related counters.

Context
Two types of counters currently support this function, that is , the connected rate and the answer rate.

Procedure
Step 1 Choose Monitor > Performance Monitor. The Performance Monitor window is displayed. Step 2 Click the Monitor Task tab on the left of the window. Step 3 Start a monitoring task. Step 4 Select a monitoring record in Table Data. Step 5 Right-click and select Show Monitor Chart to view the Monitor Information Setting. Step 6 Select the icon, monitoring object, and monitoring counter. Step 7 Click OK. The Monitor Chart tab is displayed. The compare chart and detail chart of the started monitoring task are displayed. Step 8 Perform the following operations to view the data analysis dialog box:
l l

Right-click on the compare chart. Select the counters to be scanned. Select a counter column in the detail counter chart. Right-click the counter and select Data Scanning.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-105

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

The list displays related counter records in the Analysis Table dialog box. Select a counter record in the Analysis Table tab. Right-click and select Analysis Chart. Data is displayed in pie or column charts in the Analysis Chart tab.
l

The pie chart displays the counter data in a prompt box. The pie chart displays a maximum of 20 counters. When the number of counters exceeds 20, the pie chart displays the first 20 counters sorted by counter value in the descending order. In the Analysis Chart tab, select Analysis Counter to set that the counter data is displayed in the chart. In the Analysis Chart tab, click the Color cell behind the Analysis Counter check box to set the color of the counter to be displayed in the chart. After you switch to another object, the relevant tables and charts are updated automatically.

----End

Saving a Monitoring Chart


You can save the monitoring chart as a figure. You can also save exported data as a file.

Procedure
Step 1 In Performance Monitor, select Monitor Chart or Trend Chart. Step 2 Save the monitoring chart as a figure or a file. Saving Mode Operation

Save as a figure. 1. Right-click the chart and select Save as. The Save dialog box is displayed. 2. Save the chart as a photo. You can save charts only in .JPG format. 3. Click OK. Save as a file. 1. Right-click the chart and select Export Data. The Save dialog box is displayed. 2. Save the chart to a file. You can save the data exported from the chart to a file in .TXT, .XLS, .CSV, or HTML format. 3. Click OK. ----End

Saving a Monitoring Table


You can save the current monitoring data by exporting the data to a file.

Procedure
Step 1 In Performance Monitor, select Table Data. Step 2 Right-click and select Export Data. The Save dialog box is displayed.
2-106 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 3 Save the monitoring data. You can save the data in the current data table into a file of either the HTML, TXT, CSV, or XLS format. Step 4 Click OK. ----End

Printing a Monitoring Chart


You can print the currently active chart.

Procedure
Step 1 In Performance Monitor, selectMonitor Chart or Trend Chart. Step 2 Right-click the chart and select Print. Step 3 Print the chart. ----End

2.6 Integrated Network Monitoring


The M2000 provides integrated network monitoring of the RNC, NodeB, and cells. This function includes managing object groups, monitoring network services, and managing real-time monitoring. Among these three functions, real-time monitoring is the most important. 2.6.1 Basic Knowledge The RAN network monitor enables the M2000 to monitor the RNC, the NodeB, and the cell in a centralized manner. This function monitors the real-time alarms, configuration status, and typical KPIs of the monitored objects. 2.6.2 Managing Monitored Object Groups You add, delete, modify, and rename the object groups. 2.6.3 Monitoring Object Groups You can collect all the MOs that concern you most and form an object group. The object group helps you perform the RAN network monitoring and query of the information, such as configuration status, alarm, and exceeded KPI statistics of the MOs. 2.6.4 Checking Information of Monitored Objects You can view the information of monitoring objects, such as basic configuration, interfaces, and distribution. 2.6.5 Checking the Status of Monitored Objects This task is performed to check alarms and KPI counters of the ENC and the cell object group. 2.6.6 Summarizing Alarms of Monitored Objects The M2000 enables you to collect statistics on RNC and NodeB alarms. By using this function, you can summarize the current fault alarms of the RNC and NodeB.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-107

2 Network Monitoring

M2000 Operator Guide

2.6.1 Basic Knowledge


The RAN network monitor enables the M2000 to monitor the RNC, the NodeB, and the cell in a centralized manner. This function monitors the real-time alarms, configuration status, and typical KPIs of the monitored objects. 2.6.1.1 Monitored Group You can group objects of the same type such as RNC, NodeB, and cell. An object group can be monitored in real time by the M2000 only after being activated. 2.6.1.2 WRAN Configured Object Model Currently, the objects supporting the function of RAN network monitoring are the RNC, NodeB, and cell. The three objects form a stringent logical structure. 2.6.1.3 Configuration Status of Monitored Objects By monitoring the configuration status of the three WRAN objects, that is, RNC, NodeB, and cell, you can view the status information of the monitored object group. This helps you find out and handle abnormal status. 2.6.1.4 RNC Monitoring Counters You can view the monitoring counters and superstandard classic counters of an RNC monitoring object. When creating an object group, you need set the upper and lower thresholds of monitoring counters. The superstandard classic counters indicate the counter values exceeding set upper and lower thresholds. 2.6.1.5 Cell Monitoring Counters You can view the monitoring counters and superstandard classic counters of a cell monitoring object. When creating an object group, you need set the upper and lower thresholds of monitoring counters. The superstandard classic counters indicate the counter values exceeding set upper and lower thresholds.

Monitored Group
You can group objects of the same type such as RNC, NodeB, and cell. An object group can be monitored in real time by the M2000 only after being activated. By using a monitored group, you can easily check the service information and monitor the monitored group in real time.

Related Tasks
2.6.2 Managing Monitored Object Groups

Related References
2.8.6 Interface Description: Management of Monitored Object Groups

WRAN Configured Object Model


Currently, the objects supporting the function of RAN network monitoring are the RNC, NodeB, and cell. The three objects form a stringent logical structure. The RAN network only monitors RNCs, NodeBs, and cells. Figure 2-6 shows the logical relationship between monitored objects.
2-108 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-6 Model of WRAN configured objects

To better monitor these three kinds of objects, you can group the objects of the same type together.
NOTE

Services depend on the monitored objects. You can view objects to check the monitored services, or locate objects by monitored services.

Configuration Status of Monitored Objects


By monitoring the configuration status of the three WRAN objects, that is, RNC, NodeB, and cell, you can view the status information of the monitored object group. This helps you find out and handle abnormal status.
l

The RNC configuration status is on or off. Whether the RNC is disconnected from the server is the key of M2000 monitoring. The NodeB configuration status is on or off. Whether the NodeB is disconnected from the server is the key of M2000 monitoring. The configuration status of a cell can be blocked, deactivated, and disabled. When a cell is in the inactive state, the cell cannot provide services. When a cell is in the blocked state, the users accessing to the cell are not affected. When a cell is in the disabled state, users cannot access the cell.

Related Tasks
2.6.3.4 Checking Detailed Information of Configuration Status
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-109

2 Network Monitoring

M2000 Operator Guide

Related References
2.8.65 Parameters for Configuration Status

RNC Monitoring Counters


You can view the monitoring counters and superstandard classic counters of an RNC monitoring object. When creating an object group, you need set the upper and lower thresholds of monitoring counters. The superstandard classic counters indicate the counter values exceeding set upper and lower thresholds. Table 2-18 describes the RNC monitoring counters. You can view the superstandard classic counters of the RNC in the monitoring list. Table 2-18 RNC Monitoring Counters CounterName RRC Connection Setup Success Rate (service) Definition The number of successful RRC connections/ the number of RRC connection set up requests received by the RNC x 100%
NOTE The number of RRC setup requests refers to the number of requests for initiating services.

AMR RAB Assignment Success Rate

The number of 'AMR RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of AMR RAB assignment requests received by the RNC from the CN x 100% The number of 'VP RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of VP RAB assignment requests received by the RNC from the CN x 100% The number of 'PS RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of PS RAB assignment requests received by the RNC from the CN x 100% The number of AMR service releases initiated by the RNC/the number of AMR service setups x 100% The number of VP service releases initiated by the RNC/the number of VP service setups x 100%

Video Call RAB Assignment Success Rate

PS RAB Assignment Success Rate

AMR Call Drop Rate

VP Call Drop Rate

2-110

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

CounterName PS Service Drop Rate

Definition The number of PS service releases initiated by the RNC/the number of PS service setups x 100% The number of Active Set Update Complete messages received by the RNC/the number of Active Set Update messages sent by the RNC The number of successful inter-system handovers in CS domain)/(the number of inter-system handovers attempt in CS domain
l

Soft Handover Success Rate

CS Inter-RAT Handover Success Rate(from UTRAN to GSM)

The number of inter-system handover attempts in CS domain is the number RELOCATION REQUIRED messages sent by the RNC to the CN. The number of successful inter-system handovers in CS domain is the number of IU RELEASE COMMAND messages received by the RNC. The value of the reason in the IU RELEASE COMMAND message must be Successful Relocation.

PS Inter-RAT Handover Success Rate(from UTRAN to GSM)

The number of successful inter-system handovers in PS domain)/(the number of inter-system handovers attempt in PS domain
l

The number of inter-system handover attempts in PS domain is the number of CELL CHANGE ORDER FROM UTRAN messages sent by the RNC to the UE. The number of the successful inter-system handovers in PS domain is the number of the received IU RELEASE COMMAND messages. The value of the reason in the IU RELEASE COMMAND message must be Normal Release.

Inter-Freq Hard Handover Success Rate

The number of physical link reconfiguration messages received by the RNC/the number of physical link reconfiguration messages sent by the RNC

Related Tasks
2.6.5.1 Checking Values of RNC Monitoring Counters

Cell Monitoring Counters


You can view the monitoring counters and superstandard classic counters of a cell monitoring object. When creating an object group, you need set the upper and lower thresholds of monitoring
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-111

2 Network Monitoring

M2000 Operator Guide

counters. The superstandard classic counters indicate the counter values exceeding set upper and lower thresholds. Table 2-19 describes the monitoring counters of a cell monitoring object. You can view the superstandard classic counters of a cell object group in the monitoring list. Table 2-19 Cell Monitoring Counters CounterName RRC Connection Setup Success Rate (service) Definition The number of successful RRC connections/ the number of RRC connection set up requests received by the RNC x 100%
NOTE The number of RRC setup requests refers to the number of requests for initiating services.

AMR RAB Assignment Success Rate

The number of 'AMR RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of AMR RAB assignment requests received by the RNC from the CN x 100% The number of 'VP RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of VP RAB assignment requests received by the RNC from the CN x 100% The number of 'PS RB setup complete' messages received by the RNC from the UE and the RAB assignment responses sent by the RNC to the CN/the number of PS RAB assignment requests received by the RNC from the CN x 100% The number of AMR service releases initiated by the RNC/the number of AMR service setups x 100% The number of VP service releases initiated by the RNC/the number of VP service setups x 100% The number of PS service releases initiated by the RNC/the number of PS service setups x 100%

Video Call RAB Assignment Success Rate

PS RAB Assignment Success Rate

AMR Call Drop Rate

VP Call Drop Rate

PS Service Drop Rate

2-112

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

CounterName CS Inter-RAT Handover Success Rate(from UTRAN to GSM)

Definition The number of successful inter-system handovers in CS domain)/(the number of inter-system handovers attempt in CS domain
l

The number of inter-system handover attempts in CS domain is the number RELOCATION REQUIRED messages sent by the RNC to the CN. The number of successful inter-system handovers in CS domain is the number of IU RELEASE COMMAND messages received by the RNC. The value of the reason in the IU RELEASE COMMAND message must be Successful Relocation.

PS Inter-RAT Handover Success Rate(from UTRAN to GSM)

The number of successful inter-system handovers in PS domain)/(the number of inter-system handovers attempt in PS domain
l

The number of inter-system handover attempts in PS domain is the number of CELL CHANGE ORDER FROM UTRAN messages sent by the RNC to the UE. The number of the successful inter-system handovers in PS domain is the number of the received IU RELEASE COMMAND messages. The value of the reason in the IU RELEASE COMMAND message must be Normal Release.

Inter-Freq Hard Handover Success Rate

The number of physical link reconfiguration messages received by the RNC/the number of physical link reconfiguration messages sent by the RNC

Related Tasks
2.6.5.5 Checking the Values of Cell Monitoring Counters

2.6.2 Managing Monitored Object Groups


You add, delete, modify, and rename the object groups. 2.6.2.1 Adding Monitored Object Groups You can form an object group for one or more MOs of the same type and specify the monitoring services for the group. 2.6.2.2 Checking Monitoring Parameters of Object Groups You can view the monitoring services and objects of the created object group. 2.6.2.3 Modifying Monitoring Parameters of Object Groups
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-113

2 Network Monitoring

M2000 Operator Guide

For a created object group, you can modify the name, monitoring objects, and monitoring services. 2.6.2.4 Modifying Names of Object Groups You can modify the names of the created object groups. 2.6.2.5 Copying Monitored Object Groups You can copy an object group to create another one with the same monitoring objects and services. 2.6.2.6 Suspending Monitored Object Groups This describes how to suspend monitored groups. You can suspend a monitored group that need not be monitored temporarily. The service status of a suspended object group is not monitored by the M2000. 2.6.2.7 Activating Monitored Object Groups This describes how to activate monitored object groups. You can activate a suspended object group so that the M2000 can monitor its service status. 2.6.2.8 Deleting Monitored Object Groups You can delete the unwanted monitored object groups to save the resources. 2.6.2.9 Checking Exceptions of Monitored Object Groups Stopping the configuration or performance service or deleting the object may cause that the system fails to monitor the monitored object groups. The M2000 can analyze the exceptions and you can view the causes on the client.

Related Concepts
2.6.1.1 Monitored Group

Related References
2.8.6 Interface Description: Management of Monitored Object Groups

Adding Monitored Object Groups


You can form an object group for one or more MOs of the same type and specify the monitoring services for the group.

Prerequisite
You are authorized to monitor an object group.

Context
The objects in an object group should satisfy the following conditions:
l l

You can view an object. The object type can only be RNC, NodeB or cell. Different objects support different monitoring services. An object cannot belong to the object group that you have defined. In other words, two duplicate monitored objects can only exist in the object groups of different users.

2-114

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Click Add. The Object Group Type dialog box is displayed. Step 3 Enter the name of the object group and choose the type. Step 4 Click Next. The Service Type dialog box is displayed. Step 5 Select the services to be monitored, such as alarm, configuration status, performance KPI, and cell status. Step 6 Click Next. The Object List dialog box is displayed. Select the monitoring objects of the object group. Step 7 Click OK. ----End

Checking Monitoring Parameters of Object Groups


You can view the monitoring services and objects of the created object group.

Prerequisite
l l

You have operation authorities of a object group. At least one monitoring object group is available.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Select an object group.
l l

You can view the monitoring services of the object group in Service Type. You can view all the monitoring objects in Monitored Objects.

----End

Modifying Monitoring Parameters of Object Groups


For a created object group, you can modify the name, monitoring objects, and monitoring services.

Prerequisite
l l

You have operation authorities of a object group. At least one monitoring object group is available.

Context
Users including the admin can modify only the object group created by themselves.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-115

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Select an object group. Click Modify or right-click it and choose Modify on the shortcut menu. The Object Group Type dialog box is displayed. Step 3 Modify the name of the object group. Step 4 Click Next. The Service Type dialog box is displayed. Step 5 Select the type of the service to be modified. Step 6 Click Next. The Object List dialog box is displayed. Step 7 Select the monitoring objects of the object group. Step 8 Click OK. ----End

Modifying Names of Object Groups


You can modify the names of the created object groups.

Prerequisite
l l

You have operation authorities of a object group. At least one monitoring object group is available.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Select an object group. Click Rename or right-click it and choose Rename on the shortcut menu. The Rename Object Group dialog box is displayed. Step 3 Modify the name of the object group. Step 4 Click OK. ----End

Copying Monitored Object Groups


You can copy an object group to create another one with the same monitoring objects and services.

Prerequisite
l l

You have operation authorities of a object group. At least one monitoring object group is available.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

2-116

M2000 Operator Guide

2 Network Monitoring

Context
You can copy the object group created by yourself or by other users. You can copy an object group successfully only when you have operation authorities of all objects in the object group.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Select an object group. Click Copy or right-click it and choose Copy on the shortcut menu. The Copy Object Group dialog box is displayed. Step 3 Name the object group. Step 4 Click OK. ----End

Suspending Monitored Object Groups


This describes how to suspend monitored groups. You can suspend a monitored group that need not be monitored temporarily. The service status of a suspended object group is not monitored by the M2000.

Prerequisite
l l

You have the right to operate the related object groups. At least one monitored object group exists.

Context
l l

A common user can suspend only the self-created object group. The user admin can suspend all the object groups in a system.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Group Management window is displayed. Step 2 Select one or more object groups and click Suspend. Alternatively, right-click the objects and choose Suspend from the shortcut menu. The Confirm dialog box is displayed. Step 3 Click Yes. ----End

Activating Monitored Object Groups


This describes how to activate monitored object groups. You can activate a suspended object group so that the M2000 can monitor its service status.

Prerequisite
l

You have the right to operate the related object groups.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-117

Issue 06 (2008-12-16)

2 Network Monitoring
l

M2000 Operator Guide

At least one monitored object group exists.

Context
NOTE

l l l

A common user can suspend only the self-created object group. The admin user can activate the object groups created by other users. The same user can activate a maximum of six object groups.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Group Management window is displayed. Step 2 Select one or more object groups and click Activate. Alternatively, right-click one or more object groups and choose Activate from the shortcut menu. ----End

Deleting Monitored Object Groups


You can delete the unwanted monitored object groups to save the resources.

Prerequisite
l l

You have operation authorities of a object group. At least one monitoring object group is available.

Context
l l

Normal users can delete only the object groups that are created by themselves. The user admin can delete all the object groups.

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 Select an object group. Click Delete or right-click it and choose Delete on the shortcut menu. The Confirm dialog box is displayed. Step 3 Click Yes. ----End

Checking Exceptions of Monitored Object Groups


Stopping the configuration or performance service or deleting the object may cause that the system fails to monitor the monitored object groups. The M2000 can analyze the exceptions and you can view the causes on the client.

Prerequisite
Exceptional object groups exist.
2-118 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 Choose Monitor > Object Groups Management . The Object Groups Management dialog box is displayed. Step 2 In the object list, select a monitoring object. Step 3 Click Exception Cause or right-click it and choose Exception Cause on the shortcut menu. The Exception Cause dialog box is displayed.
TIP

In the RAN Network Monitor window, you can also click current object group.

to query the abnormal information of the

Step 4 Click OK. ----End

2.6.3 Monitoring Object Groups


You can collect all the MOs that concern you most and form an object group. The object group helps you perform the RAN network monitoring and query of the information, such as configuration status, alarm, and exceeded KPI statistics of the MOs.

Context
NOTE

You can monitor object groups only after purchasing the license of the RAN network monitoring function.

2.6.3.1 Browsing Monitoring Panel You can view the monitoring services of the object group on the integrated monitoring panel. The service information monitored by the RNC and a cell consists of the unacknowledged alarm information, uncleared alarm information, configuration status information, and the information of superstandard classic performance indicators. The service information monitored by the NodeB consists of the unacknowledged alarm information, uncleared alarm information, and configuration status information. 2.6.3.2 Searching for Objects You can query monitoring objects through the quick search method. This method enables you to quickly locate a monitoring object. 2.6.3.3 Checking Detailed Alarm Information You can view the detailed alarm information of the monitored object group. 2.6.3.4 Checking Detailed Information of Configuration Status You can view the information such as the on-off status of the objects in RNC and NodeB monitored object group, and object status and configuration of the objects in cell monitored object group. 2.6.3.5 Checking Detailed Information of Exceptional Counters You can view the detailed information on the exceptional counters of RNC and cell object groups. 2.6.3.6 Checking the Charts of Monitoring Counters You can view the charts of monitoring counters. 2.6.3.7 Blocking/Unblocking Cells
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-119

2 Network Monitoring

M2000 Operator Guide

blocking and unblocking are two states of a cell. A blocked cell can be unblocked while an unblocked cell can be blocked.

Browsing Monitoring Panel


You can view the monitoring services of the object group on the integrated monitoring panel. The service information monitored by the RNC and a cell consists of the unacknowledged alarm information, uncleared alarm information, configuration status information, and the information of superstandard classic performance indicators. The service information monitored by the NodeB consists of the unacknowledged alarm information, uncleared alarm information, and configuration status information.

Prerequisite
l l

You are authorized to perform the RAN network monitoring function. The activated monitoring object group is available.

Context
The object group supporting the RAN network monitoring function consists of the RNC, NodeB, and cell. The monitoring panel displays only the activated object groups.

Procedure
Choose Monitor > RAN Network Monitor. The RAN Network Monitor is displayed. You can view the service information of the activated object group in the browse area. ----End

Related References
2.8.8 Interface Description: Monitoring Panel

Searching for Objects


You can query monitoring objects through the quick search method. This method enables you to quickly locate a monitoring object.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The monitoring object to be queried is already created.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Right-click a blank space of the monitoring panel and select Search from the displayed shortcut menu. Step 3 In the Search dialog box, enter the related information of an object to be searched.
2-120 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

The information to be entered includes the object name, object type, search scope, and search style.
TIP

You can press Ctrl+F to activate the dialog box.

Step 4 Click Search. The Search Result panel displays the result.
TIP

By double clicking a piece of result, you can find that it is associated with a specific monitoring object.

----End

Related References
2.8.69 Parameters for Searching for Objects

Checking Detailed Alarm Information


You can view the detailed alarm information of the monitored object group.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an object group. Step 3 Double-click the icon on the monitoring panel. You can view the detailed configuration information of the object group in the list at the bottom. For the descriptions of the parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/NodeB. ----End

Checking Detailed Information of Configuration Status


You can view the information such as the on-off status of the objects in RNC and NodeB monitored object group, and object status and configuration of the objects in cell monitored object group.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated monitored object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a monitored object group.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-121

2 Network Monitoring

M2000 Operator Guide

Step 3 Click the status icon on the monitoring panel. You can view the detailed configuration information of the object group in the detailed information area. ----End

Related Concepts
2.6.1.3 Configuration Status of Monitored Objects

Related References
2.8.65 Parameters for Configuration Status

Checking Detailed Information of Exceptional Counters


You can view the detailed information on the exceptional counters of RNC and cell object groups.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated RNC or cell object group is available, which has one or more exceptional performance counters.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC or Cell monitored object group. Step 3 From the object tree at the bottom left, select a monitored object. Step 4 Click KPI Counter. Then you can view the detailed information of the exceptional counter in the displayed list. For details about descriptions of parameters, refer to 2.8.55 Parameters for Checking Values of RNC Monitoring Counters. ----End

Checking the Charts of Monitoring Counters


You can view the charts of monitoring counters.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated RNC object group is available, which has one or more performance monitoring items.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed.
2-122 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 Click the monitoring icon. Step 4 In the list under the monitoring panel, right-click a performance monitoring counter and select KPI Curve from the shortcut menu. Then the chart of performance counters is displayed. ----End

Blocking/Unblocking Cells
blocking and unblocking are two states of a cell. A blocked cell can be unblocked while an unblocked cell can be blocked.

Prerequisite
l l

The current user is authorized to perform RAN network monitoring. The activated cell object group is available. The number of blocked or unblocked cells cannot be null.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a cell monitoring object group. Step 3 Click the configuration status pane. The icons of locking and unlocking are illustrated at the right side of the pane. Step 4 In the sell list, select a cell object. Step 5 Right-click and select Unblock or block. ----End

2.6.4 Checking Information of Monitored Objects


You can view the information of monitoring objects, such as basic configuration, interfaces, and distribution.

Context
NOTE

You can check the information of the monitored objects only after purchasing the license of the RAN network monitoring function.

2.6.4.1 Checking the Information on Basis RNC Configuration This task describes how to check the basic configuration information, such as object name, NE type, and IP address, on the monitored object. 2.6.4.2 Checking the Distribution of NodeB and Cells on the RNC You can view the distribution of NodeB and cells on the RNC, such as subrack No. of NodeB, serial number, and number of cells. 2.6.4.3 Checking the Information on the Iu/Iur of the RNC
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-123

2 Network Monitoring

M2000 Operator Guide

You can view the basic configuration information on the Iu/Iur of the RNC. 2.6.4.4 Checking the Information on Specified Links of the Iu/Iur Interface You can view the alarm information on a specified link of the Iu/Iur interface of RNC. 2.6.4.5 Checking the Information on the Iub Interface of the RNC You can view the information such as the link and port on the Iub interface of the RNC. 2.6.4.6 Checking the Information on Specified Links of the Iub Interface You can view the alarm information on a specified link of the Iub interface of RNC. 2.6.4.7 Checking the Information on Basic NodeB Configuration You can view the basic configuration information of the NodeB, such as object name, NE type, and IP address. 2.6.4.8 Checking the Information on Basic Cell Configuration You can view the information on basic cell configuration, such as cell name, cell ID, and PSCH power. 2.6.4.9 Checking the Information on CCH Configuration This task is performed to check the basic information on the public channel configuration of cells, such as cell name, cell ID, and maximum transmit power. 2.6.4.10 Checking the Information on Neighbors The task is performed to check the information on the neighboring relation between cells.

Checking the Information on Basis RNC Configuration


This task describes how to check the basic configuration information, such as object name, NE type, and IP address, on the monitored object.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one RNC monitored object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object . Step 4 View the basic configuration information on the Attribute tab page. For descriptions of the parameters for basic RNC configuration, refer to 2.8.63 Parameters for Checking the Information on Basic NodeB Configuration. ----End

Related References
2.8.56 Parameters for Checking the Information on Basic RNC Configuration

2-124

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Checking the Distribution of NodeB and Cells on the RNC


You can view the distribution of NodeB and cells on the RNC, such as subrack No. of NodeB, serial number, and number of cells.

Prerequisite
l l

You are authorized to perform the RAN network monitoring. At least one RNC monitored object group is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object. Step 4 Click Distributing NodeBs and Cells to view the related information. For descriptions of the distribution of NodeBs and Cells, refer to 2.8.62 Parameters for Checking the Distribution of NodeB and Cells on the RNC. ----End

Related References
2.8.62 Parameters for Checking the Distribution of NodeB and Cells on the RNC

Checking the Information on the Iu/Iur of the RNC


You can view the basic configuration information on the Iu/Iur of the RNC.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one RNC monitoring object group is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object group. Step 4 Click Iu/Iur Interface. Select a signaling point from Destination Signaling Point. Step 5 Click Attribute and view the basic configuration information on Iu/Iur. For details of Iu/Iur attribute parameters, refer to 2.8.57 Parameters for Checking the Information on the Iu/Iur of the RNC. ----End

Related References
2.8.57 Parameters for Checking the Information on the Iu/Iur of the RNC
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-125

2 Network Monitoring

M2000 Operator Guide

Checking the Information on Specified Links of the Iu/Iur Interface


You can view the alarm information on a specified link of the Iu/Iur interface of RNC.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one RNC monitoring object group is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object group. Step 4 Click Iu/Iur Interface, and select a signaling point from Destination Signaling Point. Step 5 View the link information. For descriptions of parameters, refer to 2.8.58 Parameters for Checking the Information on Specified Links of the Iu/Iur Interface. ----End

Related References
2.8.58 Parameters for Checking the Information on Specified Links of the Iu/Iur Interface

Checking the Information on the Iub Interface of the RNC


You can view the information such as the link and port on the Iub interface of the RNC.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one RNC monitoring object group is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object group. Step 4 Click the Iub Interface tab to view the basic configuration information. ----End

Related References
2.8.59 Parameters for Checking the Information on the Iub Interface of the RNC
2-126 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Checking the Information on Specified Links of the Iub Interface


You can view the alarm information on a specified link of the Iub interface of RNC.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one RNC monitoring object group is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitored object group. Step 3 From the object tree at the bottom left, select an RNC monitored object group. Step 4 Click Iub Interface to view the information on the RNC object group. For descriptions of Iub Interface parameters, refer to 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface. ----End

Related References
2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface

Checking the Information on Basic NodeB Configuration


You can view the basic configuration information of the NodeB, such as object name, NE type, and IP address.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated NodeB monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a NodeB monitored object group. Step 3 From the object tree at the bottom left, select a NodeB monitored object group. Step 4 Click the Attribute tab to view the information on basic NodeB configuration. For descriptions of the parameters for the NodeB, refer to 2.8.63 Parameters for Checking the Information on Basic NodeB Configuration. ----End

Related References
2.8.63 Parameters for Checking the Information on Basic NodeB Configuration
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-127

2 Network Monitoring

M2000 Operator Guide

Checking the Information on Basic Cell Configuration


You can view the information on basic cell configuration, such as cell name, cell ID, and PSCH power.

Prerequisite
l l

You are authorized to perform the RAN network monitoring. At least one cell monitored object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a cell monitored object group. Step 3 From the object tree at the bottom left, select a cell monitored object. Step 4 Click the Attribute tab to view the basic configuration information. For descriptions of parameters, refer to 2.8.64 Parameters for Checking the Information on Basic Cell Configuration. ----End

Related References
2.8.64 Parameters for Checking the Information on Basic Cell Configuration

Checking the Information on CCH Configuration


This task is performed to check the basic information on the public channel configuration of cells, such as cell name, cell ID, and maximum transmit power.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one active cell object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Select an active cell object group on the monitoring panel. Step 3 Select an active cell object in the object tree to the lower left. Step 4 Click the Public Channel Configuration tab to view the basic configuration information of the common channel of the cell object. For descriptions of parameters, refer to 2.8.66 Parameters for Checking the Information on CCH Configuration. ----End

Related References
2.8.66 Parameters for Checking the Information on CCH Configuration
2-128 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Checking the Information on Neighbors


The task is performed to check the information on the neighboring relation between cells.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one active cell object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Select an active cell object group on the monitoring panel. Step 3 Select an active cell object in the object tree to the lower left. Step 4 Click Neighboring Relation to view the neighboring relation of the cell object. For details of parameters about the neighboring relation between cells, refer to 2.8.67 Parameters for Checking the Information on Neighbors. ----End

Related References
2.8.67 Parameters for Checking the Information on Neighbors

2.6.5 Checking the Status of Monitored Objects


This task is performed to check alarms and KPI counters of the ENC and the cell object group.

Context
NOTE

You can check the status of the monitored objects only after purchasing the license of the RAN network monitoring function.

2.6.5.1 Checking Values of RNC Monitoring Counters This task is performed to view the values of RNC monitoring counters. 2.6.5.2 Checking the E1/T1 Status of the RNC This task is performed to check the E1T1 status of the RNC object group. 2.6.5.3 Checking the Current Alarm Information on Specified Links of the Iu/Iur Interface This task is performed to check the current alarm information on specified links of the Iu/Iur interface. 2.6.5.4 Checking the Current Alarm Information on Specified Links of the Iub Interface This task is performed to check the current alarm information on specified links of the Iub interface. 2.6.5.5 Checking the Values of Cell Monitoring Counters You can view the monitoring the values of cell monitoring counters. 2.6.5.6 Checking the Current Alarms of the Cell You can view the current alarms of the cell.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-129

2 Network Monitoring

M2000 Operator Guide

Checking Values of RNC Monitoring Counters


This task is performed to view the values of RNC monitoring counters.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one active RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC object group . Step 3 From the object tree at the bottom left, select an RNC object . Step 4 Click KPI Counter to check the KPI of the RNC object group. For details of KPI Counter parameters, refer to 2.8.55 Parameters for Checking Values of RNC Monitoring Counters. ----End

Related References
2.8.55 Parameters for Checking Values of RNC Monitoring Counters 2.6.1.4 RNC Monitoring Counters

Checking the E1/T1 Status of the RNC


This task is performed to check the E1T1 status of the RNC object group.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one active RNC object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Select an active RNC object group on the monitoring panel. Step 3 Select an active RNC object in the object tree to the lower left. Step 4 Click E1T1 Status to check the E1/T1 status of the RNC object group. For descriptions of parameters, refer to 2.8.61 Parameters for Checking the E1/T1 Status of the RNC. ----End

Related References
2.8.61 Parameters for Checking the E1/T1 Status of the RNC
2-130 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Checking the Current Alarm Information on Specified Links of the Iu/Iur Interface
This task is performed to check the current alarm information on specified links of the Iu/Iur interface.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one active RNC object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Select an active RNC object group on the monitoring panel. Step 3 Select an active RNC object in the object tree to the lower left. Step 4 Click Iu/Iur Interface and select a link. Step 5 Click Current Alarm to check the alarm information on the current link. For details of alarm parameters about the current links of the Iu/Iur interface, refer to 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface. ----End

Checking the Current Alarm Information on Specified Links of the Iub Interface
This task is performed to check the current alarm information on specified links of the Iub interface.

Prerequisite
l l

You are authorized to perform the RAN network monitoring. At least one active RNC object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 Select an active RNC object group on the monitoring panel. Step 3 Select an active RNC object in the object tree to the lower left. Step 4 Click Iub Interface and select a link. Step 5 Click Current Alarm to check the alarm information on the current link. For details of alarm parameters about the current links of the Iub interface, refer to 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface. ----End

Checking the Values of Cell Monitoring Counters


You can view the monitoring the values of cell monitoring counters.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-131

2 Network Monitoring

M2000 Operator Guide

Prerequisite
l l

You are authorized to perform the RAN network monitoring. At least one cell monitored object is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a cell monitored object group. Step 3 From the object tree at the bottom left, select a cell monitoring object. Step 4 Click KPI Counter to view the detailed information of KPI counters. For descriptions of the parameters, refer to 2.8.68 Parameters for Checking the Values of Cell Monitoring Counters. ----End

Related References
2.8.68 Parameters for Checking the Values of Cell Monitoring Counters 2.6.1.5 Cell Monitoring Counters

Checking the Current Alarms of the Cell


You can view the current alarms of the cell.

Prerequisite
l l

You are authorized to perform the RAN network monitoring. At least one cell monitored object is available.

Procedure
Step 1 Click Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a cell monitored object group. Step 3 From the object tree at the bottom left, select a cell monitored object. Step 4 Click Current Alarm to view the alarm statistics of the cell. For descriptions of parameters, refer to 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface. ----End

2.6.6 Summarizing Alarms of Monitored Objects


The M2000 enables you to collect statistics on RNC and NodeB alarms. By using this function, you can summarize the current fault alarms of the RNC and NodeB.
2-132 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Context
NOTE

You can summarize the alarms of monitored groups only after purchasing the license of the RAN network monitoring function.

2.6.6.1 Summarizing RNC Alarms by Alarm Severity You can measure all the current alarms of the RNC according to alarm levels. 2.6.6.2 Summarizing RNC Alarms by Alarm ID You can measure all the current alarms of the RNC according to alarm IDs. 2.6.6.3 Summarizing RNC Alarms by NodeB A part of RNC alarms come from the NodeBs managed by the RNC in the monitoring object group. By measuring the TopN alarms of the NodeBs under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of NodeBs according to generated alarms. The NodeB with most alarms is classified as Top1. 2.6.6.4 Summarizing RNC Alarms by Cell A part of RNC alarms come from the cells managed by the RNC in the monitoring object group. By measuring the TopN alarms of the cells under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of cells according to generated alarms. The cell with most alarms is classified as Top1. 2.6.6.5 Summarizing RNC Alarms by SAAL Link A part of RNC alarms come from the SAAL links managed by the RNC in the monitoring object group. By measuring the TopN alarms of the SAAL links under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of SAAL links according to generated alarms. The SAAL link with most alarms is classified as Top1. 2.6.6.6 Summarizing RNC Alarms by E1/T1 Link A part of RNC alarms come from the E1/T1 links managed by the RNC in the monitoring object group. By measuring the TopN alarms of the E1/T1 links under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of E1/T1 links according to generated alarms. The E1/T1 link with most alarms is classified as Top1. 2.6.6.7 Summarizing NodeB Alarms by Alarm Severity You can measure all the current alarms of the NodeB according to alarm levels. 2.6.6.8 Summarizing NodeB Alarms by Alarm ID You can measure all the current alarms of the NodeB according to alarm IDs.

Summarizing RNC Alarms by Alarm Severity


You can measure all the current alarms of the RNC according to alarm levels.

Prerequisite
l l

You are authorized to perform RAN network monitoring. At least one activated RNC monitoring object group are available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitoring object group.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-133

2 Network Monitoring

M2000 Operator Guide

Step 3 Select an RNC object from the object tree to the lower left. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by Level. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the current alarms of the RNC NE Time: is the actual time of the RNC and is used to measure the current alarms

Step 7 Set start time for the statistical calculation. By default, all the alarms in the database are measured. Step 8 Click Statistic. On the lower panel, you can view the alarms calculated according to alarm levels. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing RNC Alarms by Alarm ID


You can measure all the current alarms of the RNC according to alarm IDs.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitoring object group. Step 3 Select an RNC object from the object tree to the lower left. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by ID. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure RNC alarms NE Time: is the actual time of the RNC and is used to measure RNC alarms

Step 7 Set start time for statistical calculation.


2-134 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

If you do not set start time, use the default system setting. Step 8 Click Statistic. On the lower panel, you can view the alarms calculated according to alarm IDs. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing RNC Alarms by NodeB


A part of RNC alarms come from the NodeBs managed by the RNC in the monitoring object group. By measuring the TopN alarms of the NodeBs under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of NodeBs according to generated alarms. The NodeB with most alarms is classified as Top1.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitoring object group. Step 3 Select an RNC object from the object tree to the lower left. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by TopN of NodeB. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the first n alarms of the RNC NE Time: is the actual time of the RNC and is used to measure the first n alarms

Step 8 Set start time for statistical calculation. If you do not set start time, use the default setting. Step 9 Click Statistics. On the lower panel, you can view the alarms calculated according to according to the first n alarms of the NodeB. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-135

2 Network Monitoring

M2000 Operator Guide

Summarizing RNC Alarms by Cell


A part of RNC alarms come from the cells managed by the RNC in the monitoring object group. By measuring the TopN alarms of the cells under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of cells according to generated alarms. The cell with most alarms is classified as Top1.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitoring object group. Step 3 Select an RNC object from the object tree to the lower left. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by TopN of Cell. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the first n alarms of the RNC NE Time: is the actual time of the RNC and is used to measure the first n alarms of the RNC

Step 8 Set start time for statistical calculation. If you do not set start time, use the default setting. Step 9 Click Statistic. On the lower panel, you can view the alarms calculated according to the first n alarms of a cell. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing RNC Alarms by SAAL Link


A part of RNC alarms come from the SAAL links managed by the RNC in the monitoring object group. By measuring the TopN alarms of the SAAL links under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of SAAL links according to generated alarms. The SAAL link with most alarms is classified as Top1.
2-136 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an RNC monitoring object group. Step 3 From the object tree in the left lower part, select an RNC object. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by TopN of SAAL. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the first n alarms of the RNC NE Time: is the actual time of the RNC and is used to measure the first n alarms of the RNC

Step 8 Set start time for the statistical calculation. If you do not set start time, use the default setting. Step 9 Click Statistics. On the lower panel, you can view the alarms calculated according to the first n alarms of the SAAL link. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing RNC Alarms by E1/T1 Link


A part of RNC alarms come from the E1/T1 links managed by the RNC in the monitoring object group. By measuring the TopN alarms of the E1/T1 links under the RNC, you can collect the statistics of RNC alarms. TopN indicates the ordering of E1/T1 links according to generated alarms. The E1/T1 link with most alarms is classified as Top1.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated RNC monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-137

2 Network Monitoring

M2000 Operator Guide

Step 2 On the monitoring panel, select an RNC monitoring object group. Step 3 From the object tree in the left lower part, select an RNC object. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by TopN of E1T1. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the first n alarms of an E1/T1 link NE Time: is the actual time of the RNC and is used to measure the first n alarms of the RNC

Step 8 Set start time for the statistical calculation. If you do not set start time, use the default setting. Step 9 Click Statistic. On the lower panel, you can view the alarms calculated according to the first n alarms of an E1/ T1 link. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing NodeB Alarms by Alarm Severity


You can measure all the current alarms of the NodeB according to alarm levels.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated NodeB monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select a NodeB monitoring object group. Step 3 From the object tree in the left lower part, select a NodeB object. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by Level. For descriptions of parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/ NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics.
2-138 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Two time types are available. You can set one as required.
l l

Server Time: is used to measure the current alarms of the NodeB NE Time: is the actual time of the NodeB and is used to measure the current alarms

Step 8 Set start time for the statistical calculation. By default, only all the alarms in the database are measured. Step 9 Click Statistic. On the lower panel, you can view the alarms calculated according to alarm levels. ----End

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

Summarizing NodeB Alarms by Alarm ID


You can measure all the current alarms of the NodeB according to alarm IDs.

Prerequisite
l l

You are authorized to perform RAN network monitoring. The activated NodeB monitoring object group is available.

Procedure
Step 1 Choose Monitor > RAN Network Monitor. The RAN Network Monitor window is displayed. Step 2 On the monitoring panel, select an NodeB monitoring object group. Step 3 From the object tree in the left lower part, select an NodeB object. Step 4 Click Alarm Statistics. Step 5 In Statistic Style, select Statistic by ID. For detailed description of the parameters, refer to 2.8.54 Parameters for Summarizing Alarms of RNC/NodeB. Step 6 In TopN, set a number. Step 7 Set a time type for statistics. Two time types are available. You can set one as required.
l l

Server Time: is used to measure the first n alarms of the NodeB. NE Time: is the actual time of the NodeB and is used to measure the first n alarms of the NodeB.

Step 8 Set start time for the statistical calculation. Step 9 Click Statistic. On the lower panel, you can view the alarms calculated according to alarm IDs. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-139

2 Network Monitoring

M2000 Operator Guide

Related References
2.8.54 Parameters for Summarizing Alarms of RNC/NodeB

2.7 NM System Monitoring


The M2000 network element management system is the uniform management platform of the Huawei mobile network. It uniformly manages the mobile network elements manufactured by Huawei. On the M2000 client, you can monitor the operational status of the NM system, such as the status information about the memory, CPU, hard disks, database, processes, and services. In addition, you can set the alarm threshold of the server. 2.7.1 Setting Monitoring Parameters You can set thresholds for the performance monitoring, hard disk monitoring, database monitoring, and service monitoring. When the threshold is reached, the M2000 raises an alarm. 2.7.2 Monitoring the M2000 Performance Status You can monitor the status of the M2000 server performance to view the information on the operating system, memory usage, and CPU usage, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000. 2.7.3 Monitoring the M2000 Hard Disk Status You can monitor the status of the M2000 server hard disk to view the information such as the total space and usage of the hard disk, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000. 2.7.4 Monitoring the M2000 Database Status You can monitor the status of the M2000 server database to view the information such as the database name, server name, and database status, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000. 2.7.5 Monitoring the M2000 Service Status You can monitor the status of the M2000 server services to view the information such as the service name and service status, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000. 2.7.6 Monitoring the M2000 Process Status You can monitor the status of the M2000 server processes to view the information such as the process name, process ID, and number of threads, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.

2.7.1 Setting Monitoring Parameters


You can set thresholds for the performance monitoring, hard disk monitoring, database monitoring, and service monitoring. When the threshold is reached, the M2000 raises an alarm. 2.7.1.1 Relation Between Threshold and Alarm You can set alarm thresholds for the M2000. When the CPU usage, memory usage, hard disk usage, or database usage of the M2000 exceeds the preset alarm threshold, a relevant alarm is raised, and the corresponding icon of the alarm is displayed in red. After the alarm is sent, if the CPU usage, memory usage, hard disk usage, or database usage is less than the preset threshold, a corresponding cleared alarm is sent, and the corresponding icon of the alarm is displayed in green. 2.7.1.2 Setting the Parameters for the M2000 Performance Monitoring
2-140 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

You can set the parameters for the M2000 performance monitoring to specify the threshold of the CPU usage, memory usage, and refresh period of the performance monitoring. When the CPU usage and memory usage reach the thresholds, the M2000 raises corresponding alarms, and the corresponding icon on the Performance Monitor tab is displayed in red. 2.7.1.3 Setting the Parameters for the M2000 Hard Disk Monitoring You can set the parameters for the M2000 hard disk monitoring to specify the threshold of the hard disk usage and the refresh period of the hard disk monitoring. When the M2000 hard disk usage reaches the threshold, the M2000 raises an alarm, and the corresponding icon on the Hard Disk Monitor tab is displayed in red. 2.7.1.4 Setting the Parameters for the M2000 Database Monitoring You can set the parameters for the M2000 database monitoring to specify the threshold of the database usage and the refresh period of the database monitoring. When the M2000 database usage reaches the threshold, the M2000 raises an alarm, and the corresponding icon on the Database Monitor tab is displayed in red. 2.7.1.5 Setting the Parameters for the M2000 Service Monitoring By setting services, you can monitor parameters, specify the displayed prompts of the service monitoring, and refresh the interval. After the displayed monitoring information is set and when the service is changed, the corresponding prompts are displayed. At the same time, the service is updated according to the specified interval. You can set the parameters for the M2000 service monitoring to specify the service refresh interval. When the service refresh interval reaches the threshold, the M2000 refreshes the monitored services.

Related References
2.8.70 Parameters for Setting Thresholds of the M2000 Server

Relation Between Threshold and Alarm


You can set alarm thresholds for the M2000. When the CPU usage, memory usage, hard disk usage, or database usage of the M2000 exceeds the preset alarm threshold, a relevant alarm is raised, and the corresponding icon of the alarm is displayed in red. After the alarm is sent, if the CPU usage, memory usage, hard disk usage, or database usage is less than the preset threshold, a corresponding cleared alarm is sent, and the corresponding icon of the alarm is displayed in green.

Setting the Parameters for the M2000 Performance Monitoring


You can set the parameters for the M2000 performance monitoring to specify the threshold of the CPU usage, memory usage, and refresh period of the performance monitoring. When the CPU usage and memory usage reach the thresholds, the M2000 raises corresponding alarms, and the corresponding icon on the Performance Monitor tab is displayed in red.

Procedure
Step 1 Choose Monitor > System Monitor > Configuration . Step 2 In the System Monitor Settings window, click the Performance Monitor tab to set the property values. Step 3 Click OK. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-141

2 Network Monitoring

M2000 Operator Guide

Related References
2.8.70 Parameters for Setting Thresholds of the M2000 Server

Setting the Parameters for the M2000 Hard Disk Monitoring


You can set the parameters for the M2000 hard disk monitoring to specify the threshold of the hard disk usage and the refresh period of the hard disk monitoring. When the M2000 hard disk usage reaches the threshold, the M2000 raises an alarm, and the corresponding icon on the Hard Disk Monitor tab is displayed in red.

Procedure
Step 1 Choose Monitor > System Monitor > Configuration . Step 2 In the System Monitor Settings window, click the Hard Disk Monitor tab to set the property values. Step 3 Click OK. ----End

Related References
2.8.70 Parameters for Setting Thresholds of the M2000 Server

Setting the Parameters for the M2000 Database Monitoring


You can set the parameters for the M2000 database monitoring to specify the threshold of the database usage and the refresh period of the database monitoring. When the M2000 database usage reaches the threshold, the M2000 raises an alarm, and the corresponding icon on the Database Monitor tab is displayed in red.

Procedure
Step 1 Choose Monitor > System Monitor > Configuration . Step 2 In the System Monitor Settings window, click the Database Monitor tab to set the property values. Step 3 Click OK. ----End

Related References
2.8.70 Parameters for Setting Thresholds of the M2000 Server

Setting the Parameters for the M2000 Service Monitoring


By setting services, you can monitor parameters, specify the displayed prompts of the service monitoring, and refresh the interval. After the displayed monitoring information is set and when the service is changed, the corresponding prompts are displayed. At the same time, the service is updated according to the specified interval. You can set the parameters for the M2000 service monitoring to specify the service refresh interval. When the service refresh interval reaches the threshold, the M2000 refreshes the monitored services.
2-142 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Procedure
Step 1 Choose Monitor > System Monitor > Configuration . Step 2 In the System Monitor Settings window, click the Service Monitor tab to set the property values. Step 3 Click OK. ----End

2.7.2 Monitoring the M2000 Performance Status


You can monitor the status of the M2000 server performance to view the information on the operating system, memory usage, and CPU usage, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.

Context
l

If you set a threshold of the performance and an item reaches the threshold, the icon of the item is displayed in red. Right-click in the System Monitor Browser window and choose Refresh to refresh the window.

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the Performance Monitor tab to view the server performance. Step 3 Optional: Click Save As. The monitoring data is saved in the local disk. ----End

Related References
2.8.71 Parameters for Monitoring Performance of the M2000 Server

2.7.3 Monitoring the M2000 Hard Disk Status


You can monitor the status of the M2000 server hard disk to view the information such as the total space and usage of the hard disk, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.

Context
l

If you set a threshold of the hard disk and an item reaches the threshold, the icon of the item is displayed in red. Right-click in the System Monitor Browser window and choose Refresh to refresh the window.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-143

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the Hard Disk Monitor tab to view the status of the server hard disk. Step 3 Optional: Click Save As. The monitoring data is saved in the local disk. ----End

Related References
2.8.72 Parameters for Monitoring Hard Disk of the M2000 Server

2.7.4 Monitoring the M2000 Database Status


You can monitor the status of the M2000 server database to view the information such as the database name, server name, and database status, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.

Context
l

If you set a threshold of the database and then an item reaches the threshold, the icon of the item is displayed in red. Right-click in the System Monitor Browser window and choose Refresh to refresh the window. When the database space is insufficient, you can expand the space. The M2000, however, only supports the extension of the Sybase database at present.

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the Database Monitor tab to view the status of the server database.
NOTE

The M2000 server runs in Solaris or SuSE Linux. Solaris uses Sybase, and SuSE Linux uses DB2. The status of the databases that you monitor varies with the database type.

Step 3 Optional: Click Save As. The monitoring data is saved in the local disk. ----End

Related References
2.8.73 Parameters for Monitoring Database of the M2000 Server

2.7.5 Monitoring the M2000 Service Status


You can monitor the status of the M2000 server services to view the information such as the service name and service status, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.
2-144 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Context
l l

If a service is abnormal, its icon is displayed in red. Right-click in the System Monitor Browser window and choose Refresh to refresh the window.

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the Service Monitor tab to view the services on the server. Step 3 Optional: Click Save As. The monitoring data is saved in the local disk. ----End

Related References
2.8.74 Parameters for Monitoring Services of the M2000 Server

2.7.6 Monitoring the M2000 Process Status


You can monitor the status of the M2000 server processes to view the information such as the process name, process ID, and number of threads, to know the running status of the M2000; thus you can find and handle exceptions, and ensure the efficient running of the M2000.

Context
l l

Only the running processes are displayed in the monitoring content. Right-click in the System Monitor Browser window and choose Refresh to refresh the window.

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the Process Monitor tab to view the server processes. Step 3 Optional: Click Save As. The monitoring data is saved in the local disk. ----End

Related References
2.8.75 Parameters for Monitoring Process of the M2000 Server

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-145

2 Network Monitoring

M2000 Operator Guide

2.8 Reference for Network Monitoring Interfaces


This describes the parameters used on the network monitoring interface, such as alarm monitoring, performance monitoring, RAN network monitoring, and NM system monitoring. 2.8.1 Interface Description: Local Terminal Settings This part describes the Local Terminal Settings interface, which helps you understand the function of each part of the interface. 2.8.2 Interface Description: Fault Service Settings This describes the Alarm Service Setting interface, which helps you understand the function of each part of the interface. 2.8.3 Interface Description: NE Alarm Settings This describes the NE Alarm Settings dialog box, which helps you understand the function of each part. 2.8.4 Interface Description: Alarm Browse, Query and Statistics This part describes the alarm browse, query and statistics interface, which helps you understand the function of each part. 2.8.5 Interface Description: Performance Monitor This describes the Performance Monitor interface. 2.8.6 Interface Description: Management of Monitored Object Groups The object group manager is divided into three parts: object group list, detailed information, and functional key. 2.8.7 Interface Description: RAN Network Monitoring The RAN network monitor interface is divided into RAN network monitoring area and detailed service information. 2.8.8 Interface Description: Monitoring Panel The monitoring panel represents a group of monitored objects. The monitored services of an object group depend on the type of the monitored object and the related settings. 2.8.9 Interface Description: System Monitor Browser This describes how to check the operational status of the system. The status consists of the disk status of the server, the database status, the progress status, and the service status. 2.8.10 Parameters for Setting Columns in an Alarm Interface You can adjust the information of alarms and show some columns as required. In addition, you can decide the columns to be shown and adjust the sequence of the shown columns. 2.8.11 Parameters for Monitoring Alarms in Real Time This section describes the parameters for monitoring alarms in real time. You can refer to this section when you set these parameters. 2.8.12 Parameters for Setting Alarm Query/Browse This describes the parameters for filtering alarms. You can refer to these parameters when you set alarm query and alarm browse. 2.8.13 Parameters for Setting Alarm Statistics This section describes the parameters for collecting alarm statistics. You can refer to these parameters when you set alarm statistics.
2-146 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.14 Parameters for Selecting NE for Query This part describes the parameters shown in the Select NE dialog box in the NE Alarm Settings window. You can perform the settings by referring to this part. 2.8.15 Parameters for Selecting Alarm Objects This section describes the parameters in the Select object dialog box. You can refer to this section when you select alarm objects. 2.8.16 Parameters for Selecting Alarm Name This section describes the parameters for selecting alarm names. You can refer to this section when you select alarm names. 2.8.17 Parameters for the Alarm Explanation and Maintenance Experience This section describes the parameters in the Explain and Experience window. You can refer to these parameters when you set the alarm explanation and maintenance experience. 2.8.18 Parameters for Acknowledging Alarms Automatically This section describes the parameters of automatically acknowledge alarms. You can refer to these parameters when you set the automatically acknowledge alarms. 2.8.19 Parameters for Setting Alarm Filter Conditions This section describes the parameters of the alarm filter rule. You can refer to these parameters when you set the alarm filter rule. 2.8.20 Parameters for Viewing Alarm Details This section describes the parameters of the query result displayed in the Detail Information dialog box. 2.8.21 Parameters for Querying the Shielding of an NE Alarm This part describes the parameters related to the Query Alarm Shielded and Querying Object Alarm Shielding dialog boxes. It provides a reference for future query. 2.8.22 Parameters for Shielding an NE Alarm This part describes the parameters related to the Add Alarm Shielding and Add Object Alarm Shielding dialog boxes. You can refer to this part when setting the parameters related with alarm shielding. 2.8.23 Parameters for Redefining NMS Alarm Level This section describes the parameters in the Add Level Redefine Rule dialog box. You can refer to these parameters when you add alarm level redefinition rules. 2.8.24 Parameters for Redefining/Modifying the Level of an NE Alarm This part describes the parameters available on the Add Severity Redefinition and Modify Severity Redefinition dialog boxes. When redefining or modifying NE alarm severities, you can refer to the parameter description in this part. 2.8.25 Parameters for Alarm Severity Redefinition This section describes the parameters of the query result displayed in the Severity Redefine window. 2.8.26 Parameters for Querying the Redefinition of an NE Alarm Level This part describes the parameters shown in Query Severity Redefinition dialog box, thus providing a reference for future query. 2.8.27 Parameters for User-Defined Alarms This describes the parameters for user-defined alarms. When adding or modifying user-defined alarms, you can perform the related settings by referring to the parameter descriptions. 2.8.28 Parameters for Querying a User-Defined Alarm
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-147

2 Network Monitoring

M2000 Operator Guide

This describes the parameters in the Query User-Defined Alarm dialog box. It provides a reference for future query. 2.8.29 Parameters for Querying the Binding of a User-Defined Alarm This describes the parameters in the Query Alarm Binding dialog box. It provides a reference for future query. 2.8.30 Parameters for Adding/Modifying the Binding of a User-Defined Alarm This describes the parameters binding a user-defined alarm. When adding or modifying the binding of a user-defined alarm, you can perform the related settings by referring to the parameter descriptions. 2.8.31 Parameters for Setting the Alarm Box This section describes the parameters in the Alarm Box Manager dialog box. You can refer to these parameters when you set the alarm box. 2.8.32 Parameters for Setting Alarm Remote Notification Rules This section describes the parameters for setting the remote notification rules. You can refer to this section when you set alarm remote notification rules. 2.8.33 Parameters for Setting Notification by Email This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the remote notification by Email. 2.8.34 Parameters for Advanced Settings of Notification by Email This section describes the parameters in the Communication Settings dialog box. You can refer to these parameters when you set advanced parameters of alarm notification by Email. 2.8.35 Parameters for Setting Notification by Modem This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the remote notification by modem. 2.8.36 Parameters for Advanced Settings of Notification by Modem This section describes the parameters in the Notify Device Communication Settings dialog box. You can refer to these parameters when you set the advanced parameters of notification by modem. 2.8.37 Parameters for Setting Notification by SMS Gateway This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the alarm notification by SMS gateway. 2.8.38 Parameters for Advanced Settings of Notification by SMS Gateway This section describes the parameters in the Notify Device Communication Settings dialog box. You can refer to these parameters when you set the advance parameters for notification by SMS gateway. 2.8.39 Parameters for Setting Simple Correlation Rules This section describes the parameters in the Add Simple Correlation Rule dialog box. You can refer to these parameters when you set or modify the simple correlation rules of alarms. 2.8.40 Parameters for Setting Advanced Correlation Rules This section describes the parameters in the Add Advanced Correlation Rule dialog box. You can refer to these parameters when you set or modify the advanced correlation rules of alarms. 2.8.41 Parameters for the Basic Attributes of Auto-Triggering Tasks This describes the related parameters on the Basic Attribute tab page in the Attribute dialog box. You can refer to these parameters when you set auto-triggering basic attributes.
2-148 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.42 Parameters for Auto-Triggering Conditions When you set the auto-triggering conditions, you may refer to the Trigger Condition tab page in the Attribute dialog box for the related parameter description. 2.8.43 Parameters for Adding the Alarm Conditions of the Auto-Triggering Script The Select NE Alarms dialog box lists the information about the parameters. You may refer to the information in this part when you add the alarm conditions of the auto-triggering script. 2.8.44 Parameters for Searching Auto-Triggering Tasks When you query the auto-triggering tasks, you may refer to the Query Task dialog box for the related parameter description. 2.8.45 Parameters for Searching Auto-Triggering Records This describes the related parameters in the Query Record dialog box. You can refer to these parameters when you search for auto-triggering tasks. 2.8.46 Parameters for Analyzing the Trend of a Monitoring Counter This part lists the trend chart parameter settings. 2.8.47 Parameters for Setting a Background Color for a Monitoring Chart This topic describes parameters for setting the background color for monitor charts. 2.8.48 Parameters for Setting Filtering Conditions for a Monitoring Table This part introduces parameters of Table DataFilter Setting. 2.8.49 Parameters for Setting Properties for a Monitoring Chart This part introduces parameters about Property Setting of the monitor chart. 2.8.50 Parameters for Setting Real-Time Monitoring Thresholds This describes the parameters in the Monitor Threshold Management dialog box. 2.8.51 Parameters for Setting Rules for Monitoring Thresholds This part introduces parameters of Set Rules for Monitoring Thresholds. 2.8.52 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Chart This part introduces parameters for setting the thresholds for the monitor chart. 2.8.53 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Table This part introduces parameters of Table Threshold SettingShow style setting. 2.8.54 Parameters for Summarizing Alarms of RNC/NodeB You can select a method for alarm statistics. Alarms on the RNC support statistics by levels, by IDs, and by TopN. TopN indicates the sequence based on the quantity of alarms. The NodeB with most alarms is classified as Top1. Alarms on NodeBs support statistics by levels and IDs. 2.8.55 Parameters for Checking Values of RNC Monitoring Counters This part describes the parameters of KPI counters in the active RNC object group. 2.8.56 Parameters for Checking the Information on Basic RNC Configuration This part describes the basic attributes of the RNC object group and the meanings of basic configuration parameters in the object group. 2.8.57 Parameters for Checking the Information on the Iu/Iur of the RNC This part describes the parameters about the information on the Iu/Iur interface in the RNC. 2.8.58 Parameters for Checking the Information on Specified Links of the Iu/Iur Interface This part describes the parameters about the information on specified links of the Iu/Iur interface in the RNC. 2.8.59 Parameters for Checking the Information on the Iub Interface of the RNC
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-149

2 Network Monitoring

M2000 Operator Guide

This part describes the parameters about the information on the Iub interface in the RNC object group. 2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface This part describes the basic parameters about the information on specified links of the Iub interface in the RNC object group. 2.8.61 Parameters for Checking the E1/T1 Status of the RNC This part describes the parameters about the E1T1 status of the RNC. 2.8.62 Parameters for Checking the Distribution of NodeB and Cells on the RNC This part describes the parameters about the distribution of NodeB and cells on the RNC. 2.8.63 Parameters for Checking the Information on Basic NodeB Configuration This part describes the parameters about the information on basic configuration of the NodeB object group. 2.8.64 Parameters for Checking the Information on Basic Cell Configuration This describes the parameters for checking the information on basic cell configuration. 2.8.65 Parameters for Configuration Status This part describes the parameters related with the configuration status of the RNC, NodeB and cell. 2.8.66 Parameters for Checking the Information on CCH Configuration This part describes the parameters related to the basic configuration of the common channel in a cell. 2.8.67 Parameters for Checking the Information on Neighbors This describes the parameters for checking the information on neighbors.Three types of neighboring cells are available: Intra-frequency neighboring cell, inter-frequency neighboring cell, and GSM neighboring cell. 2.8.68 Parameters for Checking the Values of Cell Monitoring Counters This part describes the parameters related to cell monitoring counters. 2.8.69 Parameters for Searching for Objects In case that many monitored objects exist, you can search the related monitored objects by using the fuzzy search method. Then you can locate the object quickly. 2.8.70 Parameters for Setting Thresholds of the M2000 Server This section describes the parameters of system monitor settings. You can refer to these parameters when you set the server thresholds. 2.8.71 Parameters for Monitoring Performance of the M2000 Server This section describes the parameters of the query result displayed in the Performance Monitor tab. 2.8.72 Parameters for Monitoring Hard Disk of the M2000 Server This section describes the parameters of the query result displayed in the Hard Disk Monitor tab. 2.8.73 Parameters for Monitoring Database of the M2000 Server This section describes the parameters of the query result displayed in the Database Monitor tab. 2.8.74 Parameters for Monitoring Services of the M2000 Server This section describes the parameters of the query result displayed in the Service Monitor tab. 2.8.75 Parameters for Monitoring Process of the M2000 Server
2-150 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

This section describes the parameters of the query result displayed in the Process Monitor tab.

2.8.1 Interface Description: Local Terminal Settings


This part describes the Local Terminal Settings interface, which helps you understand the function of each part of the interface.

Highlighting Alarms
You can specify the time after which an alarm is regarded as a long-period alarm if it is not handled. A long-period alarm is highlighted on the interface, as shown in Figure 2-7. Figure 2-7 Highlighting Alarms

Customizing the Sound and Colors


You can customize the sound and colors for different levels of alarms, as shown in Figure 2-8 and Figure 2-9. Figure 2-8 Color settings

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-151

2 Network Monitoring

M2000 Operator Guide

Figure 2-9 Sound settings

Alarm Board
You can customize the settings of the alarm board, as shown in Figure 2-10. Figure 2-10 Alarm Board

Alarm Box
You can specify the filtering conditions of the alarm box. Thus, only those wanted alarms are sent to the alarm box and displayed through sounds or visions. Figure 2-11 shows the alarm box settings.

2-152

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-11 Alarm Box

2.8.2 Interface Description: Fault Service Settings


This describes the Alarm Service Setting interface, which helps you understand the function of each part of the interface.

Remote Notification interface


Through the Remote Notification interface, you can specify the methods of remote notification. When an alarm is generated, the M2000 can deliver it to operators though E-mails or short messages. Figure 2-12 shows the interface.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-153

2 Network Monitoring

M2000 Operator Guide

Figure 2-12 Remote Notification interface

Correlation Analysis
l

After you set the alarm correlation rules, the M2000 abandons or shields the alarms that satisfy the conditions. Figure 2-13 shows the interface. After you set advanced alarm correlation rules, the system can shield the alarms that satisfy the conditions or re-define the alarm severity. In this case, you can focus on the main alarms to quickly locate and solve the problems. Figure 2-14 shows the interface.

2-154

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-13 Simple correlation rule

Figure 2-14 Advanced alarm correlation rule

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-155

2 Network Monitoring

M2000 Operator Guide

Alarm Filtering interface


Through the Alarm Filtering interface, you can specify the settings for filtering those unwanted alarms. Figure 2-15 shows the interface. Figure 2-15 Alarm Filtering interface

Automatic Acknowledgement
The automatic acknowledgement interface provides the function of delaying and immediate auto acknowledging of unacknowledged fault alarms and event alarms. After you activate the auto acknowledge function, the system automatically acknowledge an event or fault alarm that meets the conditions. Figure 2-16 shows the interface.

2-156

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-16 Automatic Acknowledgement

Knowledge and Explanation


The knowledge and explanation interface consists of query conditions, Explain, and Experience. After you select the alarm, click the alarm in Explain, then you can view the detailed information and suggested solution. You can also record your experiences in Experience to serve as reference when you encounter the same problem next time. Figure 2-17 shows the interface.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-157

2 Network Monitoring

M2000 Operator Guide

Figure 2-17 Knowledge and Explanation

Alarm Level Redefinition


Through the alarm level redefinition interface, you can redefine the alarm severity, for example, degrade the severity level of relatively unimportant alarms or upgrade the severity of relatively important alarms. You can click Detail to view the information about the alarm level redefinition. Figure 2-18 shows the interface. Figure 2-18 Alarm Level Redefinition

2-158

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.3 Interface Description: NE Alarm Settings


This describes the NE Alarm Settings dialog box, which helps you understand the function of each part. The NE Alarm Settings interface consists of the User-Defined Alarm tab, the Alarm Shielding tab, and the Severity Redefinition tab, as shown in Figure 2-19. After setting the conditions, you can view the alarm information in list in the related tab. Table 2-20 describes the function of each tab. Figure 2-19 NE Alarm Settings dialog box

Table 2-20 Description of the tabs i the NE Alarm Settings dialog box Tab User-Defined Alarm Description The User-Defined Alarm tab consists of Alarm Definition and Alarm Binding. You can self-define a new alarm and bind it to a port of a cabinet, subrack, or slot of an NE. You can also selfdefine the binding relationship. For details, refer toManaging User-Defined Tasks. In the Alarm Shielding tab, you can set shielding attribute for unwanted or wanted alarms to shield or release the shielding. Then you can forbid NEs reporting shielded alarms or allow NEs reporting alarms not shielded. In the Severity Redefinition tab, you can change the severity of alarms based on the actual effect on the system. For example, you can degrade the severity level of relatively unimportant alarms or upgrade the severity of relatively important alarms.

Alarm shielding

Severity Redefinition

2.8.4 Interface Description: Alarm Browse, Query and Statistics


This part describes the alarm browse, query and statistics interface, which helps you understand the function of each part.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-159

2 Network Monitoring

M2000 Operator Guide

Alarm Query
The alarm query interface consists of the event alarm query tab, the history fault alarm tab, the current fault alarm query, the shielded fault alarm query, the shielded event alarm query, the browse current fault alarms by status tab, and the browse event alarms by status tab. After setting the conditions, you can view the detailed information in the window. Figure 2-20 shows the interface. Figure 2-20 Alarm Query

Alarm statistics interface


Figure 2-21 shows the alarm statistics interface. After you set the conditions, the alarm statistics interface shows the detailed statistical information in tables and pie charts. Figure 2-21 Alarm statistics interface

2-160

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.5 Interface Description: Performance Monitor


This describes the Performance Monitor interface. Figure 2-22, Figure 2-23, and Figure 2-24 show the Performance Monitor interface. Figure 2-22 Performance Monitor interface-1

(1) Navigation tree: shows the NEs, object sets, and monitoring tasks in a tree. (2) Table data: shows the result of performance monitoring in a table.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-161

2 Network Monitoring

M2000 Operator Guide

Figure 2-23 Performance Monitor interface-2

(3) Counter result display area: displays the counter result of the selected time by counter or object. (4) Object name display area: displays the short names and full names of the objects. Short names are automatically assigned by the system, for example, SO1. Full names are the actual names of the objects, for example, RNC_64. (5) Monitoring chart: select multiple counters of an object or the same counter of multiple objects to compare the monitoring result. The compare result is shown in a line chart. (6) Counter results: displays the counter results in the compare chart separately in a bar chart. (7) Zooming button: to zoom in, zoom out, or restore the compare chart.

2-162

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Figure 2-24 Performance Monitor interface-3

(8) Trend figure: displays the performance monitoring results in a trend chart.

Related Tasks
2.5 Monitoring NE Performance in Real Time

2.8.6 Interface Description: Management of Monitored Object Groups


The object group manager is divided into three parts: object group list, detailed information, and functional key. Figure 2-25 shows the object group manager interface. Figure 2-25 Object Group Manager interface

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-163

2 Network Monitoring

M2000 Operator Guide

(1) Object group list: lists all the object groups and their related information, such as creator, name, type, and status. (2) Detailed information: lists the detailed information of the object groups. The information are about function type and monitoring object.

Function Type shows the monitored services of object groups. Monitoring Object lists all of the monitored objects of the object group.

(3) Function key: includes Add, Modify, and Delete.

Related Concepts
2.6.1.1 Monitored Group

Related Tasks
2.6.2 Managing Monitored Object Groups

2.8.7 Interface Description: RAN Network Monitoring


The RAN network monitor interface is divided into RAN network monitoring area and detailed service information. Figure 2-26 shows the network monitoring interface. Figure 2-26 RAN network monitoring

(1) RAN network monitoring area: shows all of the object groups that are activated. One panel represents an object group. For details about the implication of panel legend, refer to the description column on the right part of this window. (2) Detailed service information: shows the information of services. These services are depend on object type. The monitored services vary with types of the objects.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

2-164

M2000 Operator Guide

2 Network Monitoring

2.8.8 Interface Description: Monitoring Panel


The monitoring panel represents a group of monitored objects. The monitored services of an object group depend on the type of the monitored object and the related settings. Figure 2-27 shows a monitoring panel. Table 2-21 describes the panel elements. Figure 2-27 Monitoring panel

Table 2-21 Description of the monitoring panel Status Unack Description Indicates unacknowledged alarms. Alarm levels are as follows:
l l l l

: critical alarm : major alarm : minor alarm : warning

Unclr State PM

Indicates uncleared alarms. Indicates the status of NE connections. Indicates the performance status of superstandard KPI.

Related Tasks
2.6.3.1 Browsing Monitoring Panel

2.8.9 Interface Description: System Monitor Browser


This describes how to check the operational status of the system. The status consists of the disk status of the server, the database status, the progress status, and the service status. Figure 2-28 shows the System Monitor Browse interface. Table 2-22 describes each tab page.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-165

2 Network Monitoring

M2000 Operator Guide

Figure 2-28 System Monitor Browser interface

Table 2-22 Functions of tabs on the system monitor browser interface Tab Performance Monitor Description You can check the basic information about current login server, such as Server Name, Server Status, OS, Free Physical Memory(KB), Total Physical Memory(KB), Free Swap Memory(KB), Total Swap Memory (KB), CPU Usage Rate(%) and Memory Usage(%). You can check the information about the hard disk of current login server, such as Server Name, Server Status, OS, Partition(Mounted Path), Total Size(KB), Used Size(KB), Free Size(KB), Used Rate(%), and Status. You can check the information about the database of current login server, such as DataBase Name, Server Name, OS, Total Data Space(KB), Used Space(KB), Free Space(KB), Used Rate(%), Total Log Space(KB), Free Log Space(KB), and Status. You can check the information about running services of current login server, such as Agent Name, Service, Service Description, Status, Auto Restart Count, Service Start Time, and Server Name. You can check the information about service proxy of current login server, such as Agent Name, Process ID, Handle Number, CPU Usage Rate (%), Memory Usage(KB), DB Connection Number, and Thread Number. You can check the information about all NEs, such as NE Name, NE Type, Alarm Status, and Connection Status.

Hard Disk Monitoring Database Monitor

Service Monitor Process Monitor

NE Monitor

2-166

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.10 Parameters for Setting Columns in an Alarm Interface


You can adjust the information of alarms and show some columns as required. In addition, you can decide the columns to be shown and adjust the sequence of the shown columns.

Parameters for Setting Columns in an Alarm Interface


Parameter Serial Number Identifier Description The network serial number of an alarm. It is the keyword of an alarm record and uniquely identifies an alarm. Shows the alarm information using an icon:
l l l l l

Intermittent alarm

. .

High-frequency intermittent alarm Repeat event alarm .

High-frequency repeat event alarm Alarm with a comment .

Link Name Link Type

The name of a link in the network. The type of a link in the network. Each link type corresponds to a unique link. The following link types are available:
l l l l l l

BICCSCTPLINK DataLink H248Link M3UALink MTP3BLink MTP3Link

NE Type Equipment Alarm Serial Number Name

The type of an NE in the network. Each NE type corresponds to a unique NE. The serial number of an alarm device. In the same device, a unique alarm can be defined according to the serial number. The name of an alarm in the network, through which it is possible to quickly locate the basic information of the alarm. For example, if it is a database threshold alarm, users can know that the alarm is generated from the database by its name. The category available in the network, including fault alarms and event alarms. Both fault alarms and event alarms are used to notify users of exceptional situations. Fault alarms indicate that you need to take measures to handle the fault.

Category

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-167

2 Network Monitoring

M2000 Operator Guide

Parameter Type

Description The type of an alarm in the network, such as power system, trunk system, and OMC.The name of an alarm in the network, through which it is possible to quickly locate the basic information of the alarm. For example, if it is a database threshold alarm, users can know that the alarm is generated from the database by its name. The clearance category of an alarm, including automatic clearance and manual clearance. The clearance type of an alarm, such as, normal clearance, manual clearance, and configuration clearance. The source of an alarm. Shows whether an alarm is cleared.
l

Clearance Category Clearance Type Alarm Source Clearance

If the alarm is cleared, the name of the operator that cleared the alarm is displayed. If the alarm is not cleared, is displayed.

Acknowledgemen t

Shows whether an alarm is acknowledged.


l

If the alarm is acknowledged, the name of the operator that acknowledged the alarm is displayed. If the alarm is not cleared, is displayed.

Object Instance Type Operation Impact Flag Additional Information Level

The name of the object that generates an alarm. If the object is available on the topology view, the related object name is displayed. Otherwise, the NE name is displayed. Shows whether the alarm has impact on the services. The value can be Yes,No, or Unknown. The additional information about an alarm, for example, the alarm causes. Alarm levels. Four levels are available:
l

Critical The device or resource is absolutely faulty. An immediate solution is a must.

Major The quality of the device or resource is greatly degraded. Immediate solution is required.

Minor The quality of the device or resource is slightly degraded. Appropriate solution or further observation is needed to avoid a worse situation.

Warning The quality of the device or resource has potential trouble. Different measures are needed depending on the warning.

Alarm ID

The ID corresponding to an alarm.

2-168

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Occurrence Time (NT) Clearance Time (NT) Acknowledgemen t Time(ST) Location Information

Description The time when an alarm occurs. The time when a fault alarm is cleared. The time when an event alarm or a fault alarm is acknowledged. The information is used to quickly locate the reason why an alarm is generated, and analyze the way of handling alarms. When an alarm is reported, the system automatically fills in the location information which operators have configured for each NE. If operators do not configure the location information for an NE, the system replaces it with the information configured in Explanation and Knowledge Database.

Related Tasks
2.2.1 Setting Columns in an Alarm Interface

2.8.11 Parameters for Monitoring Alarms in Real Time


This section describes the parameters for monitoring alarms in real time. You can refer to this section when you set these parameters.

Base Settings
Name Acknowledgem ent Description Description: Acknowledgement status of the alarms that you want to monitor. Settings Value: The acknowledgement status includes: Acknowledged Unacknowledged Setting method: You can choose more than one items. If do not choose, all items are considered selected by default. Clearance Description: Clearance status of the alarms that you want to monitor. Value: The clearance status includes: Cleared Uncleared Setting method: You can choose more than one items. If do not choose, all items are considered selected by default.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-169

2 Network Monitoring

M2000 Operator Guide

Alarm Source Object Types


Name By object Description Description: Select an alarm source according to the NE type. Settings Setting method: Click .

Related Tasks
2.2.6 Setting Alarm Real-Time Monitoring

2.8.12 Parameters for Setting Alarm Query/Browse


This describes the parameters for filtering alarms. You can refer to these parameters when you set alarm query and alarm browse.

Base Setting
Name Name Description Description: Indicates the name of the alarm to be queried or browsed. Severity Description: Indicates the severity of the alarm to be queried or browsed. Setting Setting method: Select Name, and then click the parameter. Value: Alarm severity is as follows: Critical Major Minor Warning Setting method: Select one or multiple check boxes. By default, all the check boxes are selected. Acknowledgem ent Description: Indicates the acknowledgement status of the alarm to be queried or browsed. Value: Acknowledgement status are as follows: Acknowledged Unacknowledged Setting method: Select one or multiple check boxes. By default, all the check boxes are selected. to set

2-170

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Clearance

Description Description: Indicates the clearance status of the alarm to be queried or browsed.

Setting Value: Clearance status are as follows: Cleared Uncleared Setting method: Select one or multiple check boxes. By default, all the check boxes are selected.

Type

Description: Indicates the type of the alarm to be queried or browsed.

Value: Alarm types are as follows: Power System Environment System Signaling System Trunk System Hardware System Software System Running System Communication System QoS Processing Error Internal Setting method: Select one or multiple check boxes. By default, all the check boxes are selected. Click Click to select all the items. to clear all the items.

Start Time

Description: Indicates a start time. You can query or browse the alarms generated later than this time.

Setting method: Select Start Time, and then specify the time range of alarm generation between the start time and end time. Enter the time in dd/MM/yyyy HH:mm:ss format, or click the time panel. to choose a time from

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-171

2 Network Monitoring

M2000 Operator Guide

Name End Time

Description Description: Indicates an end time. You can query or browse the alarms generated earlier than this time.

Setting Setting method: Select End Time, and then specify the time range of alarm generation between the start time and end time. Enter the time in dd/MM/yyyy HH:mm:ss format, or click the time panel. to choose a time from

Latest

Description: Indicates the latest time. You can query or brows the alarms that are generated in the latest hours, days, weeks, or months.

Setting method: Select Latest, and then set the hour, day, week, and month.

Advanced

Description: Indicates the advanced parameters of the alarms to be queried or browsed.

Setting method: Click the button.

Import

Description: Imports the parameters template for alarm query, browse or statistics and uses the parameters configuration in this template as alarm filter conditions.

Setting method: Click Import. In the Import dialog box, select a template and then click Import.

Reset

Description: Restores the parameters for alarm query or browse to the default settings.

Setting method: Click the button.

Advanced
Tab Maintenanc e Region Name Description Description: You can select the maintenance region as required. Setting Setting method: Check box

2-172

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Tab Browse Setting

Name -

Description Description: You can select the mode for browsing alarms as required.

Setting Value:
l l l

Browse all alarms Browse debug alarms Browse normal alarms

Debug alarms refer to the alarms generated by commissioning NEs. Setting method: Check box Default Location information contains: Description: You can set the content of the alarm location information. Description: You can set the network serial number contained in the alarm information. Description: You can set whether to filter alarms based on alarm identifiers or not. Setting method: Text box

Alarm serial Number (separated by ;):

Setting method: Text box

Identifier

Value: Event alarm identifiers are as follows: Alarm Memo Repeat Event High Frequency Repeat Event Fault alarm identifiers are as follows: Alarm Memo Flash Fault High Frequency Flash Fault Setting method: Check box

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-173

2 Network Monitoring

M2000 Operator Guide

Tab

Name Time Mode

Description Description: You can query or browse alarms based on the local server time or the local NE time.
NOTE If you select Latest in the filtering conditions, the M2000 queries or browses alarms based on the local server time no matter which time mode is selected.

Setting Value: Time modes are as follows: Server time NE time Setting method: Option button

Alarm Source Object Types


Name By Object Description Description: You can select an alarm source according to the NE. By Type Description: You can select an alarm source according to the NE type. Setting Setting method: Click Setting method: If you select NE Type, all types of NEs in the network are selected by default. If you select an NE type under NE Type, all NEs of this type are selected. A specific NE cannot be selected if you use this arrangement mode. By Topo Description: You can select an alarm source according to the topology objects. Setting method: Select the alarm source from the Topology Root navigation tree. If you select Topology Root, all types of NEs in the network are selected by default. .

Related Tasks
2.2.5 Monitoring Alarms Through the Topology View 2.2.7 Querying Alarms 2.2.7.1 Querying Current Fault Alarms 2.2.7.3 Querying Event Alarms 2.2.7.2 Querying History Fault Alarms 2.2.7.4 Querying the Masked Fault Alarms 2.2.7.5 Querying the Masked Event Alarms

2-174

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.13 Parameters for Setting Alarm Statistics


This section describes the parameters for collecting alarm statistics. You can refer to these parameters when you set alarm statistics.

Statistical Items
Name Alarm Log Description Description: Set the type of the alarms on which you want to collect statistics. Operation Value: Parameters for fault alarms: current fault alarm and history fault alarm. Parameter for event alarms: event alarm. Setting method: Click Statistic Row Description: Set the row heading of the statistical result table. for selection.

Setting method: You can select up to three statistical items. The statistical results are sorted according to the statistical items. Setting method: Value: The parameters include NE, NE type, link, link type, alarm name, alarm level, alarm type, alarm log, alarm status, by day, and by hour. Setting method: Drop-down list

Statistic Column

Description: Set the column heading of the statistical result table. Description: Set the row heading and column heading of the statistical result table.

Statistic Item

Preview

Description: Preview the style of the statistical result table.

Value: Setting method: Click the button. Setting method: Click the button.

Reset

Description: Set the statistical item to the default value.

Import

Description: Import the parameter template for alarm statistics.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-175

2 Network Monitoring

M2000 Operator Guide

Basic Settings
Name Name Description Description: Name of the alarm on which you want to collect statistics. Level Description: Level of the alarm on which you want to collect statistics. Operation Setting method: Select Name, and then click the parameter. Value: Alarm levels include: Critical Major Minor Warning Setting method: You can choose more than one items. If no item is chosen, all items are considered selected by default. Acknowledgem ent Description: Acknowledgement status of the alarm on which you want to collect statistics. Value: Acknowledgement status includes: Acknowledged Unacknowledged Setting method: You can choose more than one items. If no item is chosen, all items are considered selected by default. Clearance Description: Clearance status of the alarm on which you want to collect statistics. Value: Clearance status includes: Cleared Uncleared Setting method: You can choose more than one items. If no item is chosen, all items are considered selected by default. to set

2-176

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Type

Description Description: Type of the alarm on which you want to collect statistics.

Operation Value: Alarm types include: Power System Environment System Signaling System Trunk System Hardware System Software System Running System Communication System QoS Processing Error Internal Setting method: You can choose more than one items. If no item is chosen, all items are considered selected by default.

Start Time

Description: Statistic the alarms raised later than this time.

Setting method: Select Start Time, and then specify the time range of alarm occurrence between the start time and end time. Enter the time in the format of YYYY-MMDD hh:mm:ss, or click from the time panel. to choose a time

End Time

Description: Statistic the alarms raised earlier than this time.

Setting method: Select End Time, and then specify the time range of alarm occurrence between the start time and end time. Enter the time in the format of YYYY-MMDD hh:mm:ss, or click from the time panel. to choose a time

Advanced

Description: Advanced parameters for alarm statistics.

Setting method: Click the button.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-177

2 Network Monitoring

M2000 Operator Guide

Name Import

Description Description: Import the parameters template for alarm query, browse or statistics and use the parameters configuration in this template as alarm filter conditions.

Operation Setting method: Click Import. In the Import dialog box, select a template and then click Import.

Reset

Description: Restore the parameters for alarm statistics to the default settings.

Setting method: Click the button.

Advanced Settings
The Ne District tab in the Advanced dialog box displays the NEs based on districts. You can select the NEs on which you want to collect statistics. The Ne District information is added to the statistical result. The NEs on which the statistics is collected is the intersection of the NEs set on the Ne District and Alarm Source tab pages. You can set the query mode on the Browse Setting tab page of Advanced dialog box. You can select Browse all alarms, Browse debug alarms. or Browse normal alarms. The following is the description of the parameters on the Default tab page of the Advanced dialog box. Name Location information contains Identifier Description Description: Content of the alarm location information. Description: Whether to filter alarms based on alarm identifiers. Operation Setting method: Text box Value: Alarm identifiers include: Alarm Memo Flash Fault High Frequency Flash Fault Setting method: Check box Time Mode Description: Statistic alarms based on the local server time or the local NE time. Value: Time modes include: Server time NE time Setting method: Radio button
2-178 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Alarm Source Object Types


Name By Object Description Description: Select an alarm source according to the NE. By type Description: Select an alarm source according to the NE type. Operation Setting method: Click Setting method: If you select NE Type, all types of NEs in the network are selected by default. If you select an NE type under NE Type, all NEs of this type are selected. You cannot select a specific NE if using this arrangement mode. By topo Description: Select an alarm source according to the topology objects. Setting method: Select the alarm source from the Topology Root tree. If you select Topology Root, all types of NEs in the network are selected by default. .

Related Tasks
2.2.8 Collecting Alarm Statistics

2.8.14 Parameters for Selecting NE for Query


This part describes the parameters shown in the Select NE dialog box in the NE Alarm Settings window. You can perform the settings by referring to this part.

Parameter Description
Parameter Search by Name Group by NE Type Description Searching NEs by the NE name. It supports fuzzy search. You can enter keyword of the NE name to search the NE. If you select the option, the NEs in the Select NE navigation tree are displayed by NE type.

Related Tasks
2.2.7 Querying Alarms 2.4.2 Querying the Shielding of an NE Alarm 2.4.5 Querying the Redefinition of an NE Alarm Level 2.4.7.1 Querying a User-Defined Alarm 2.4.8.1 Querying the Binding of a User-Defined Alarm

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-179

2 Network Monitoring

M2000 Operator Guide

2.8.15 Parameters for Selecting Alarm Objects


This section describes the parameters in the Select object dialog box. You can refer to this section when you select alarm objects.

Parameters
Name Search by name Description Description: Search for an alarm object by the keyword of the alarm object name. Fuzzy search is supported. Description: Whether to expand the navigation tree of alarm object names automatically. Description: Group alarms based on all the existing NE types, such as OMC. Description: Alarm objects that you can select. Settings Setting method: Text box.

Auto expand

Setting method: Check box.

Group by type

Setting method: Check box. Setting method:


l

Available objects

In the Available objects navigation tree, select an object. Click to add the object.

Click objects.

to add all the

Click to delete all the selected objects.

Selected objects

Description: Alarm objects that are selected.

Setting method:
l

In the Selected objects navigation tree, select an object. Click to delete the object.

Click objects.

to add all the

Click to delete all the selected objects.

Related Tasks
2.2.2 Manually Synchronizing NE Alarms 2.2.7.1 Querying Current Fault Alarms 2.2.7.3 Querying Event Alarms

2-180

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.16 Parameters for Selecting Alarm Name


This section describes the parameters for selecting alarm names. You can refer to this section when you select alarm names.

Alarm Names
Name Available Alarm Description Description: Alarm names that you can select. Settings Setting method:
l

In the Available Alarm navigation tree, select an alarm. Click the alarm. to add

l l

Click Click alarms.

to add all the alarms. to delete all the selected

Selected Alarm

Description: Alarm names that are selected.

Setting method:
l

In the Selected Alarm navigation tree, select an alarm. Click the alarm. to delete

l l

Click Click alarms.

to add all the alarms. to delete all the selected

Search by name

Description: Search for alarms by alarm name. Fuzzy search is supported. Letters are case insensitive. Description: Whether to expand the navigation tree of alarm names automatically.

Setting method: Text box.

Auto expand

Setting method: Check box.

Group by NE type

Description: Group alarms based on all existing NE types in the network. Description: Group alarms by alarm type, such as power system, environmental system, or signaling system.

Setting method: Check box.

Group by alarm type

Setting method: Check box.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-181

2 Network Monitoring

M2000 Operator Guide

Name Group by alarm level

Description Description: Group alarms by alarm level. Alarm levels include critical, major, minor, and warning.

Settings Setting method: Check box.

Group by categories

Description: Group alarms by alarm categories. Alarm categories include event alarm and fault alarm.

Setting method: Check box.

Related Tasks
2.2.8.1 Collecting Statistics on Fault Alarms 2.2.7.1 Querying Current Fault Alarms 2.3.3.1 Setting the Remote Notification Rules for Alarms

2.8.17 Parameters for the Alarm Explanation and Maintenance Experience


This section describes the parameters in the Explain and Experience window. You can refer to these parameters when you set the alarm explanation and maintenance experience.

Parameters
Name Search by name Description Description: Search for an alarm by the keyword of the alarm name. Auto expand Description: Whether to expand the navigation tree of alarm names automatically. Group by NE type Description: Group alarms based on all the existing NE types, such as OMC. Description: Group alarms based by alarm type, such as, Environmental System, Hardware System, Communication System. Settings Setting method: Text box. Setting method: Check box. Setting method: Check box. Setting method: Check box.

Group by alarm type

2-182

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Group by alarm level

Description Description: Group alarms by alarm level, such as critical, major, minor, and warning. Description: Group alarms by alarm category, such as event and fault. Description: Name of an alarm in the network.

Settings Setting method: Check box.

Group by category

Setting method: Check box. Setting method: Setting method: Button. Setting method: Button. Setting method: -

Alarm name

Export

Description: Export the experience database and save it as a file.

Import

Description: Import the file to the experience database.

Explanation

Description: Display the alarm explanation information and the suggestions for clearing the alarm.

Experience

Description: Display the maintenance experience of an alarm.

Setting method: Setting method: Button.

Modify

Description: Record the fault maintenance experience in the experience database.

Related Tasks
2.2.11.7 Recording Alarm Handling Experience

2.8.18 Parameters for Acknowledging Alarms Automatically


This section describes the parameters of automatically acknowledge alarms. You can refer to these parameters when you set the automatically acknowledge alarms.

Parameters
Name Since alarm cleared Critical Major
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Description Description:

Settings Setting method: Check box.

Issue 06 (2008-12-16)

2-183

2 Network Monitoring

M2000 Operator Guide

Name Minor Warning

Description Set the alarms that need be acknowledged immediately according to the levels. The alarms of a level are acknowledged immediately after they are cleared.

Settings

Related Tasks
2.3.5 Setting Alarm Auto Acknowledgement

2.8.19 Parameters for Setting Alarm Filter Conditions


This section describes the parameters of the alarm filter rule. You can refer to these parameters when you set the alarm filter rule.

Parameters for alarm filter rules


Name Filter Condition Description Description: Conditions for alarm filter. Description: Time mode used by the alarm filter rule. Server time: The start and end time the alarm filter rule takes effect are the server time. NE time: The start and end time the alarm filter rule takes effect are the NE time. Settings Setting method: Click next to Filter Condition. In the displayed Filter Condition dialog box, set the parameter. Setting method: -

Time mode

2-184

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Start time

Description Description: Time when the alarm filter rule starts to function.

Settings Setting method: next to Start time. In the displayed Date/Time Click Selection dialog box, set the parameter.

End time

Description: Time when the alarm filter rule stops to function.

Setting method: next to End time. In the displayed Date/Time Click Selection dialog box, set the parameter.

Memo

Description: Remarks of the alarm filter rule.

Setting method: Text box.

Enable

Description: Whether the alarm filter rule functions.

Setting method: Check box.

Parameters for alarm filter conditions


Name Name Description Description: Name of the filtered alarm. Level Description: Level of the filtered alarm. Type Description: Type of the filtered alarm. Alarm Source Description: Source of the filtered alarm. Settings Setting method: Select Name. Click next to Name. In the displayed Select Alarm Name dialog box, set the parameter. Setting method: Select the check box next to a proper alarm level. Setting method: Select the check box next to a proper alarm type. Setting method: You can set the parameter by object or type:
l

By object: Click Select, and then set the parameter in the By Object dialog box. By type: In the By Type navigation tree, select a proper NE type.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-185

2 Network Monitoring

M2000 Operator Guide

Alarm Source Object Types


Name By object Description Description: Select an alarm source according to the NE. By type Description: Select an alarm source according to the NE type. Settings Setting method: Click , and then set the parameter in the By Object dialog box. Setting method: If you select NE Type all types of NEs in the network are selected by default. If you select an NE type under NE Type, all NEs of this type are selected. You cannot selected a specific NE if using this arrangement mode.

Related Tasks
2.3.4 Setting Alarm Filter Rules

2.8.20 Parameters for Viewing Alarm Details


This section describes the parameters of the query result displayed in the Detail Information dialog box.

Parameters
Name Name Description Description: Name of an alarm in the network. The basic information of the alarm can be quickly located by alarm name. For example, if it is a database threshold alarm, you can know that the alarm is raised from the database based on its name. Location Information Description: You can use the information to quickly locate the causes of an alarm, and analyze the methods of handling the alarm. When an alarm is reported, the system automatically fills the location information you have configured for each NE. If you do not configure the location information on an NE, the system replaces the location information with the information configured in the explanation and experience database. Severity Description: Alarm severities, including critical, major, minor, and warning. Alarm Source Description: Device that raises the alarm.

2-186

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Occurrence Time

Description Description: Time when an alarm is raised.

Clearance Time

Description: Time when a fault alarm is cleared.

Clearance

Description: Clearance status of a fault alarm or event alarm, such as Unclear.

Acknowledgement

Description: Acknowledgement status of a fault alarm or event alarm, such as Unacknowledged.

Acknowledgement Time Serial Number

Description: Time when an event alarm or a fault alarm is acknowledged. Description: Network serial number of an alarm. It is the key word of an alarm record, by which a unique alarm can be defined.

Equipment Alarm Serial Number

Description: Serial number of an alarm device. In the same device, a unique alarm can be defined according to the serial number. Description: Identifies the status of alarm memo. If there is a memo of the alarm, the status is displayed as Have memo. Otherwise, the field is blank.

Identifier

Link Name

Description: Name of a link in the network.

Link Type

Description: Type of a link in the network. Each link type corresponds to a unique link.

NE Type

Description: Type of an NE in the network. Each NE type corresponds to a unique NE.

Category

Description: Categories of alarms in the network, including fault alarms and event alarms.

Type

Description: Source of an alarm in the network, such as Power System, Trunk System, or Internal.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-187

2 Network Monitoring

M2000 Operator Guide

Name Clearance Category

Description Description: Whether the alarm is automatically cleared or manually cleared. The value can be ADAC or ADMC, indicating auto clearance or manual clearance.

Clearance Type

Description: Type of alarm clearance. The value can be Normal clearance, Manual clearance, Reset clearance, Configuration clearance, or Correlation clearance.
NOTE
l ADAC indicates that after the fault is removed, the M2000 reports the

corresponding cleared alarm.


l ADMC indicates that after the fault is removed, the M2000 does not report

the corresponding cleared alarm, and you need to clear the alarm manually.

Object Instance Type

Description: Type of the managed object that raises an alarm, such as the board, file directory, or port.

Operation Impact Flag

Description: Whether the service is affected. The value can be Yes, NO or Unknown. Description: Additional information on an alarm. Description: Handling experience on an alarm. Click Modify to record the alarm handling experience.

Additional Information Alarm Experience

Alarm Memo

Description: Memo on an alarm.


l l

Click Add to add a new memo. Click Modify to modify the existing memo.

MO Object

The managed object that raises an alarm, such as the board name.

Related Tasks
2.2.11.3 Viewing Alarm Details

2.8.21 Parameters for Querying the Shielding of an NE Alarm


This part describes the parameters related to the Query Alarm Shielded and Querying Object Alarm Shielding dialog boxes. It provides a reference for future query.

2-188

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Querying the Descriptions on Alarm Shielding Parameters of the NEs Managed by the BSC6000
Parameter Search by Name Value Range None Description Search the parameters according to the names of the alarms. The query supports case-insensitive search. Group by NE Type None If you select this item, in the Root tree, the NEs are displayed in groups based on NE types.

Querying the Descriptions on Alarm Mask Parameters of Other NEs


Parameter NE Name Value Range None Description Name of an NE. Click and select the NE in the displayed dialog box. The start alarm ID for the alarm filter.

Start Alarm ID

For NodeB NEs, the value ranges from 1 to 32000 and from 65334 to 65534. For non-NodeB NEs, the value ranges from 1 to 32000. For NodeB NEs, the value ranges from 1 to 32000 and from 65334 to 65534. For non-NodeB NEs, the value ranges from 1 to 32000.

End Alarm ID

The end alarm ID for the alarm filter.

Maximum Record Count Level

Numeric type. Ranges from 1 to 1000. The default value is 1000.


l l l l

The maximum count of the returned records. You can choose more than one items. If you do not select any alarm level, all alarms will be queried.

Critical Major Minor Warning

Related Tasks
2.4.2 Querying the Shielding of an NE Alarm

2.8.22 Parameters for Shielding an NE Alarm


This part describes the parameters related to the Add Alarm Shielding and Add Object Alarm Shielding dialog boxes. You can refer to this part when setting the parameters related with alarm shielding.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-189

2 Network Monitoring

M2000 Operator Guide

Alarm shielding parameters of the NEs managed by the BSC6000


Parameter Search by Name Value Range None Description Search the parameters according to the names of the alarms. Case insensitive search rather than wildcard search is supported. Group by Alarm Type None If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on NE types. The alarm types include power system, environment system, and signaling system. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm levels. Alarm severity levels are: Critical, Major, Minor, and Warning. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm types. The alarms can be classified into two types: fault alarm and event alarm.

Group by Alarm Level

None

Group by Alarm Category

None

Alarm shielding parameters of the NEs


Parameter Shielded flag Search by Name Value Range Enumeration, Value range: YES and No. None Description Indicates whether to enable the function of alarm shielding. Search by the name of an NE or alarm. The name is case insensitive. Wildcard search is not supported. Case insensitive search rather than wildcard search is supported. If you select this item, in the Select NE navigation tree, the NEs are displayed in groups based on NE types. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on NE types. The alarm types include power system, environment system, and signaling system.

Group by NE Type

None

Group by Alarm Type

None

2-190

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Group by Alarm Level

Value Range None

Description If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm levels. Alarm severity levels are: Critical, Major, Minor, and Warning. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm types. The alarms can be classified into two types: fault alarm and event alarm.

Group by Alarm Category

None

Related Tasks
2.4.1 Shielding an NE Alarm

2.8.23 Parameters for Redefining NMS Alarm Level


This section describes the parameters in the Add Level Redefine Rule dialog box. You can refer to these parameters when you add alarm level redefinition rules.

Parameters
Name Alarm Names Description Description: Name of the alarm whose level you want to redefine. Settings Setting method: Click next to the text box. In the Select Alarm Name dialog box, set the parameter. Setting method: Text box. Setting method: Drop down list box.

Default Level

Description: Level of the alarm before redefinition.

Redefine Level

Description: Level of the alarm after redefinition. The redefined level cannot be the same as the original level.

Memo

Description: Remarks of the alarm redefinition rule.

Setting method: Text box. Setting method: Check box.

Enable

Description: Whether the alarm redefinition rule functions.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-191

2 Network Monitoring

M2000 Operator Guide

Name Alarm Source

Description Description: Source of an alarm, that is, the device that raises the alarm. After you select the alarm source, the M2000 redefines the level of the alarms that are raised by only the alarm source.

Settings Setting method: On the Alarm Source tab, click . In the Select object dialog box, select the alarm source.

Related Tasks
2.3.6 Setting Redefinition of Alarm Level

2.8.24 Parameters for Redefining/Modifying the Level of an NE Alarm


This part describes the parameters available on the Add Severity Redefinition and Modify Severity Redefinition dialog boxes. When redefining or modifying NE alarm severities, you can refer to the parameter description in this part.

Parameter Description
Parameter Search by Name Description In Search by Name, enter the alarm name you want to query. Fuzzy search is supported. Browse Mode You can browse alarms by group. Browse mode combinations are supported. The modes include Group by NE Type, Group by Alarm Type, Group by Alarm Level, and Group by Category. Redefined Level You can choose a new alarm level from the drop-down list under this field. Original alarm severities are not included in the drop-down list.

Related Tasks
2.4.4 Redefining the Level of an NE Alarm 2.4.6 Modifying the Setting of NE Alarm Level Redefinition

2.8.25 Parameters for Alarm Severity Redefinition


This section describes the parameters of the query result displayed in the Severity Redefine window.

2-192

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameters
Name ID Description Description: Name of the redefined alarm. Enable Description: Whether to enable the alarm redefinition rules. Alarm Names Description: Name of the redefined alarm. Alarm Source Description: Source of an alarm, that is, the device that raises the alarm. Default Severity Description: Severity of the alarm before redefinition. Redefine Severity Description: Alarm Severity after redefinition. Category Description: Alarm category. Memo Description: Remarks of the alarm redefinition rule.

Related Tasks
2.3.6 Setting Redefinition of Alarm Level

2.8.26 Parameters for Querying the Redefinition of an NE Alarm Level


This part describes the parameters shown in Query Severity Redefinition dialog box, thus providing a reference for future query.

Parameters
Parameter NE Name Value Range None. Description Name of an NE. Click and select the NE in the displayed dialog box. The start alarm ID for the alarm level redefinition. The end alarm ID for the alarm level redefinition.

Start Alarm ID

Numeral. Value range: 1 to 32000.

End Alarm ID

Numeral. Value range: 1 to 32000.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-193

2 Network Monitoring

M2000 Operator Guide

Parameter Maximum Record Count

Value Range Numeral. Value range: 1 to 100. Default value: 1000.

Description The maximum count of the returned records.

Alarm Level

l l l l

Critical Major Minor Warning

You can select more than one alarm levels. If you do not select any alarm, alarms of all these levels are queried.

Related Tasks
2.4.5 Querying the Redefinition of an NE Alarm Level

2.8.27 Parameters for User-Defined Alarms


This describes the parameters for user-defined alarms. When adding or modifying user-defined alarms, you can perform the related settings by referring to the parameter descriptions.

Parameter Description
Parameter NE Type Value Range NE type and NE Description For the NodeB, you can select only an NE type. For the MSCe and MGW, you can select either an NE type or an NE. Name of a user-defined alarm This parameter can be null. ID of a user-defined alarm

Alarm Name Alarm ID

String type
l

The value range of the NodeB: 65334-65534 The value range of the MSCe: Odd numbers in the range of 65334-65533 The value range of the MGW: 65334-65533 The value range of the MSC Server: 65335-65533 The value range of the DBS3800: 65334-65534 The value range of the OMC: 65400-65449 Only the iSStar can send user-defined alarms to the OMC.

2-194

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Level

Value Range The following four severity levels are listed in the dropdown list:
l l l l

Description You can select only one severity level.

Critical Major Minor Warning The parameter is set by default and the setting cannot be modified.

Types

Environment system or the OMC.


l

If NE Type is set to an NE type other than OMC, this option is Environment System. If NE Type is set to OMC, this option is OMC.

Related Tasks
2.4.7 Defining an NE Alarm 2.4.7.2 Adding a User-Defined Alarm 2.4.7.3 Modifying a User-Defined Alarm

2.8.28 Parameters for Querying a User-Defined Alarm


This describes the parameters in the Query User-Defined Alarm dialog box. It provides a reference for future query.

Parameter Description
Parameter Alarm Name Alarm ID Value Range String type
l

Description Name of a user-defined alarm This parameter can be null. ID of a user-defined alarm This parameter can be null.

The value range of the NodeB: 65334-65534 The value range of the MSCe: Odd numbers in the range of 65334-65533 The value range of the MGW: 65334-65533

NE Type
Issue 06 (2008-12-16)

NE type and NE

Select a related NE type.


2-195

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 Network Monitoring

M2000 Operator Guide

Parameter Level

Value Range
l l l l

Description You can choose more than one items. If you do not select any alarm level, all alarms will be queried.

Critical Major Minor Warning

Related Tasks
2.4.7.1 Querying a User-Defined Alarm

2.8.29 Parameters for Querying the Binding of a User-Defined Alarm


This describes the parameters in the Query Alarm Binding dialog box. It provides a reference for future query.

Parameter Description
Parameter NE Name Value Range None Description Name of an NE. Click and select the NE in the displayed dialog box. This parameter is applicable to only MSC Server and MSCe. Type of the query. Three types, All, by Alarm ID, and by Position are available. The meanings are as follows:
l

Query Type

None

All: to query binding information of all alarms. by Alarm ID: to query binding information according to alarm ID. by Position: to query binding information according to subrack No. and port No. of the alarm to be bound.

Alarm ID

Numeric type. Ranges from 65335 to 65533.

ID of an alarm This parameter is applicable only when Query Type is by Alarm ID.

2-196

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Cabinet

Value Range Enumerated Type


l

Description Refers to the number of the cabinet to which the NE alarm is to be bound.

For NodeB, the value range is 0-1. For MSCe, the value range is 0-4. For DBS3800, the value range is 0-1. For MSC Server, the value range is 0-1.

Subrack

Numeric type. Ranges from 0 to 255. Numeric type. Ranges from 0 to 255. Numeric type.
l

Applicable to only NodeB, and DBS3800. Refers to the number of the subrack to which the NE alarm is to be bound. Applicable only to the NodeB and DBS3800. Refers to the number of the slot to which the NE alarm is to be bound. Refers to the number of the port to which the NE alarm is to be bound.

Slot

Port

For NodeB, the value range is 0-255. For MSCe, the value range is 0-5. For DBS3800, the value range is 0-255. For MSC Server, the value range is 0-5.

Related Tasks
2.4.8.1 Querying the Binding of a User-Defined Alarm

2.8.30 Parameters for Adding/Modifying the Binding of a UserDefined Alarm


This describes the parameters binding a user-defined alarm. When adding or modifying the binding of a user-defined alarm, you can perform the related settings by referring to the parameter descriptions.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-197

2 Network Monitoring

M2000 Operator Guide

Parameter Description
Parameter Search by Name Value Range None Description Search by the name of an NE or alarm. The name is case insensitive. Wildcard search is not supported. Case insensitive search rather than wildcard search is supported. If you select this item, in the Select NE navigation tree, the NEs are displayed in groups based on NE types. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on NE types. The alarm types include power system, environment system, and signaling system. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm levels. Alarm severity levels are: Critical, Major, Minor, and Warning. If you select this item, in the Select Alarm navigation tree, the NEs are displayed in groups based on alarm types. The alarms can be classified into two types: fault alarm and event alarm. Refers to the number of the cabinet to which the NE alarm is to be bound.

Group by NE Type Group by Alarm Type

None

None

Group by Alarm Level

None

Group by Alarm Category

None

Cabinet

Enumerated Type
l

For NodeB, the value range is 0-1. For MSCe, the value range is 0-4. For DBS3800, the value range is 0-1. For MSC Server, the value range is 0-4.

Subrack

Numeric type. Ranges from 0 to 255. Numeric type. Ranges from 0 to 255.

Applicable only to the NodeB. Refers to the number of the subrack to which the NE alarm is to be bound. Applicable only to the NodeB. Refers to the number of the slot to which the NE alarm is to be bound.

Slot

2-198

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Port

Value Range Numeric type.


l

Description Refers to the number of the port to which the NE alarm is to be bound.

For NodeB, the value range is 0-255. For MSCe, the value range is 0-5. For DBS3800, the value range is 0-255. For MSC Server, the value range is 0-5.

Port Type

Select the value from the drop-down list. Select the value from the drop-down list. Numeric type. The value range depends on the NE.

Type of the signal received by the port which is to be bound to the NE alarm, such as Bool and Value. This parameter is applicable only when Port Type is Bool. Two types are available, that is,High and Low. This parameter is applicable only when Port Type is Value. It indicates the upper limit for generating alarms. An alarm is reported to the M2000 when signals received by the port reaches this value. This parameter is applicable only when Port Type is Value. An alarm is restored on the M2000 when signals received by the port are smaller than this value. The default setting is Open. After you delete an alarm binding, Port Switch is Close. Open indicates that user-defined alarm binding is takes effect. Close indicates that alarms are not bound.

Alarm Voltage

Upper Threshold

Lower Threshold

Numeric type. The value range depends on the NE. Default value, such as Open and Close.

Port Switch

Related Tasks
2.4.8 Binding a User-Defined Alarm 2.4.8.2 Adding the Binding Relation of a User-Defined Alarm 2.4.8.3 Modifying the Binding of a User-Defined Alarm

2.8.31 Parameters for Setting the Alarm Box


This section describes the parameters in the Alarm Box Manager dialog box. You can refer to these parameters when you set the alarm box.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-199

2 Network Monitoring

M2000 Operator Guide

Parameters
Name Control Sound and Light by Severity Description Description: Set the severity of the alarms to be monitored by the alarm box. When an alarm at the specified severity is generated, the indictor corresponding to this severity generates an audible and visual alarm.
NOTE The alarm box has four alarm indicators corresponding to four alarm severities.

Settings Value: Alarm severities include:


l l l l

Critical Major Minor Warning

Value: Select option button and then select one or multiple options in the check box. Value: Select option button.

Control Sound and Light by Template

Description: Set the alarm box to generate audible and visual alarms according to the alarm template. Description: Select an alarm template. When an alarm complying with the alarm template is generated, the alarm box generates an audible and visual alarm.

Template

Value: Value range: All objects and current fault alarms templates. Default value: All objects, which refers to all current fault alarms. Setting method: Select option button and then . In the Select dialog click box, select the fault template.
NOTE If no fault template is created, click New Fault Template to create a template.

Mute current alarm sound

Description: Stops the current alarm sound.

Setting method: Click the button. Setting method: Check box.

Enable

Description: Start the alarm box.

2-200

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Serial Port

Description Description: Serial port through which the M2000 client is connected the alarm box.

Settings Value: Value range: COM1 and COM2. Default value: COM1. Setting method: Select Enable, and then select a serial port from the drop-down list.

Related Tasks
2.3.2.4 Setting the Alarm Box

2.8.32 Parameters for Setting Alarm Remote Notification Rules


This section describes the parameters for setting the remote notification rules. You can refer to this section when you set alarm remote notification rules.

Base Settings
Name Name Description Description: Name of the remote notification alarm. Level Description: Level of the remote notification alarm. Settings Setting method: Select Name, and then click Description: Alarm levels include: Critical Major Minor Warning Setting method: You can choose more than one items. If do not choose, all items are considered selected by default. .

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-201

2 Network Monitoring

M2000 Operator Guide

Name Type

Description Description: Type of the remote notification alarm.

Settings Description: Alarm Types include: Power System Environmental System Signaling System Trunk System Hardware System Software System Running System Communication System QoS Processing Error Internal Setting method: You can choose more than one items. If do not choose, all items are considered selected by default.

Alarm Names
Name Available Alarm Description Description: Alarm names that you can select. Description: Alarm names that are selected. Search by name Description: Search for alarms by alarm name. Fuzzy search is supported. Letters are case insensitive. Description: Whether to expand the navigation tree of alarm names automatically. Group by NE type Description: Group alarms based on all existing NE types in the network. Settings Setting method: Setting method: Setting method: Text box.

Selected Alarm

Auto expand

Setting method: Check box.

Setting method: Check box.

2-202

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Group by alarm type

Description Description: Group alarms by alarm type, such as power system, environmental system, or signaling system. Description: Group alarms by alarm level. Alarm levels include critical, major, minor, and warning.

Settings Setting method: Check box.

Group by alarm level

Setting method: Check box.

Group by categories

Description: Group alarms by alarm categories. Alarm categories include event alarm and fault alarm.

Setting method: Check box.

Alarm Source Object Types


Name By object Description Description: Select an alarm source according to the NE. By type Description: Select an alarm source according to the NE type. Settings Setting method: Click Setting method: If you select NE Type all types of NEs in the network are selected by default. If you select an NE type under NE Type, all NEs of this type are selected. You cannot selected a specific NE if using this arrangement mode. .

Notification Time
Name Week Description Description: Time in a week to send alarm remote notification. Settings Setting method: Check box.
NOTE Select at least one option.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-203

2 Network Monitoring

M2000 Operator Guide

Name All week

Description Description: To send alarm remote notification every day in a week.

Settings Setting method: Check box.

Sun

Description: To send alarm remote notification every Sunday.

Setting method: Check box. Setting method: Check box. Setting method: Check box. Setting method: Check box.

Mon

Description: To send alarm remote notification every Monday.

Tue

Description: To send alarm remote notification every Tuesday.

Wen

Description: To send alarm remote notification every Wednesday.

Thu

Description: To send alarm remote notification every Thursday.

Setting method: Check box.

Fri

Description: To send alarm remote notification every Friday.

Setting method: Check box. Setting method: Check box.

Sat

Description: To send alarm remote notification every Saturday.

Period of Time

Description: Period in a day to send alarm remote notification every.

Setting method: Select the check box, and then set the period in the drop-down list.
NOTE You can set up to three periods.

2-204

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Notification Methods
Name Email address (formatted as: username@hos tname) SMS number Description Description: Email address used to receive emails. Description: Number of the mobile phone used to receive short messages. Memo Description: Description. Enable Description: To enable the notification method. Settings Setting method: Text box. Addresses are separated by semicolons (;). Setting method: Text box. Numbers are separated by semicolons (;). Setting method: Text box. Setting method: Option button.

Related Tasks
2.3.3.1 Setting the Remote Notification Rules for Alarms

2.8.33 Parameters for Setting Notification by Email


This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the remote notification by Email.

Parameters
Name Host name or IP of SMTP Description Description: Host name or IP address of the Simple Mail Transfer Protocol(SMTP) email server.
NOTE To protect the connection with the SMTP server against a domain resolution failure, it is recommended to use the IP address of the email server.

Settings Setting method: Enter the valid SMTP server name or IP address.

Address of sender

Description: Email address of the sender. Description: This option determines whether to provide complete configuration of the email. If the SMTP server needs authentication, you should select this option.

Setting method: Use the email address of the sender. Setting method: Option button.

Enable check right

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-205

2 Network Monitoring

M2000 Operator Guide

Name User name of SMTP

Description Description: This name is used for authentication on the SMTP server. Set this field if you select Enable check right.

Settings Setting method: Text box.

Sender password

Description: This password is used for authentication on the SMTP server. The password must match the user account. Set this field if you select Enable check right.

Setting method: Text box.

Send by server

Description: The email is sent by the server.

Setting method: Option button. Setting method: Click the button. In the Email Notification Test dialog box, enter an email address for test. Click Test. The format of the email address is user name@host name.
NOTE If M2000 prompts the operation is successful, it indicates that the settings are correct.

Test on Server

Description: Test on the server whether the mail can be sent.

Send by current client Test on Client

Description: The email is sent by the client. Description: Test on the client whether the mail can be sent.

Setting method: Option button. Setting method: Click the button. In the Email Notification Test dialog box, enter an email address for test. Click Test. The format of the email address is user name@host name.
NOTE If M2000 prompts the operation is successful, it indicates that the settings are correct.

2-206

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Enable

Description Description: Start the notification device.

Settings Setting method: Option button.

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.34 Parameters for Advanced Settings of Notification by Email


This section describes the parameters in the Communication Settings dialog box. You can refer to these parameters when you set advanced parameters of alarm notification by Email.

Parameters
Name Email Subject Description Description: Title of the email. Settings Value: Default value: Alarm Notify. Setting method: Text box. Message head Description: Prefix of each alarm in the email. Value: Default value: +++. Setting method: Text box. Message head end Description: Suffix of each alarm in the email. Value: Default value: ---. Setting method: Text box. Content Setting Description: Set the alarm fields in the email content. Sender IP Description: View the IP address of the sender. Setting method: Click the button. In the Content Setting dialog box, select the alarm fields. Setting method: Click the button.

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.35 Parameters for Setting Notification by Modem


This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the remote notification by modem.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-207

2 Network Monitoring

M2000 Operator Guide

Parameters for setting notification by modem


Name Send by server Serial Port Description Description: The SMS is sent by the server. Description: Port number between the SMS device and a computer. Baud rate Description: Baud rate of the modem. Settings Setting method: Option button. Setting method: Value range: COM1 and COM2. Default value: COM1. Setting method: Select the actual baud rate supported by the modem. Default value: 9600. Test on Server Description: After you enter the SMS number, test on server whether the short message can be sent. Setting method: Click the button. In the SMS Notification Test dialog box, enter a SMS code for test. Click Test.
NOTE
l Type the mobile phone number of a

maintenance person. The number must contain the county (region) code. For example, in +8613800755500, 86 is the county (region) code.
l If M2000 prompts the operation is

successful, it indicates that the settings are correct.

Send by current client

Description: The short message is sent by the local client. Description: After you enter the SMS number, test on client whether the short message can be sent.

Setting method: Option button. Setting method: Click the button. In the SMS Notification Test dialog box, enter a SMS code for test. Click Test.
NOTE
l Type the mobile phone number of a

Test on Client

maintenance person. The number must contain the county (region) code. For example, in +8613800755500, 86 is the county (region) code.
l If M2000 prompts the operation is

successful, it indicates that the settings are correct.

Enable

Description: Start the notification device.

Setting method: Option button.

2-208

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.36 Parameters for Advanced Settings of Notification by Modem


This section describes the parameters in the Notify Device Communication Settings dialog box. You can refer to these parameters when you set the advanced parameters of notification by modem.

Parameters
Name Message head Description Description: Prefix of each alarm in the email. Settings Value: Default value: +++. Setting method: Text box. Setting method: Message head end Description: Suffix of each alarm in the email. Value: Default value: ---. Setting method: Text box. Content Setting Description: Set the alarm fields in the email content. Sender IP Description: View the IP address of the sender. Setting method: Click the button. In the Content Setting dialog box, select the alarm fields. Setting method: Click the button.

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.37 Parameters for Setting Notification by SMS Gateway


This section describes the parameters in the Add Notify Device Communication Settings dialog box. You can refer to these parameters when you set the alarm notification by SMS gateway.

Parameters for SMS gateway settings


Name Host Address Description Description: IP address of the SMS center. Settings Setting method: For details, contact the SMS center.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-209

2 Network Monitoring

M2000 Operator Guide

Name Port

Description Description: Port number of the SMS center.

Settings Value: Value range: 1-65534. Setting method: For details, contact the SMS center. Setting method: For details, contact the SMS center. Setting method: For details, contact the SMS center. Setting method: Click the button. In the SMS Notification Test dialog box, enter a SMS code for test. Click Test.
NOTE
l Type the mobile phone number of a

User name

Description: User name in the SMS center.

Password

Description: Valid user password in the SMS center.

Code protocol

Description: Coding protocol in the SMS center.

Test

Description: Test whether the SMS receiving number can be normally used after the SMS properties are set.

maintenance person. The number must contain the county (region) code. For example, in +8613800755500, 86 is the county (region) code.
l In the external dual-band GSM

modem or CDMA modem, the test number cannot exceed 26 characters, including the plus sigh (+). In the SMS, the test number cannot exceed 20 characters, including the plus sigh (+).
l If M2000 prompts the operation is

successful, it indicates that the settings are correct.

Enable

Description: Enable the notification device.

Setting method: Option button.

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.38 Parameters for Advanced Settings of Notification by SMS Gateway


This section describes the parameters in the Notify Device Communication Settings dialog box. You can refer to these parameters when you set the advance parameters for notification by SMS gateway.

2-210

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Advance Parameters
Name Message head Description Description: Prefix of the short message body. Settings Value: Default value: +++. Setting method: Text box. Message head end Description: Suffix of the short message body. Value: Default value: ---. Setting method: Text box. Content Setting Description: Set the alarm fields of the content to be sent. Description: User number that initiates the call. Description: Type of the user number that initiates the call. Description: Type of the user number that is called. Description: Coding rule of the calling number. Setting method: Click the button. In the Content Setting dialog box, select the alarm fields. Setting method: Text box. Setting method: Text box. Value: Value range: 0-7. Default value: 1.

Calling number Calling number type

Called number type

Calling number numbering plan Called number numbering plan

Description: Coding rule of the called number.

Setting method: Text box. Value: Value range: 0-15. Default value: 1.

Parameters for Caller and Called Number Types


Code 0 Description Description: Unknown. 1 Description: International number.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-211

2 Network Monitoring

M2000 Operator Guide

Code 2

Description Description: Home number. Area or special numbers cannot be contained.

Description: Network special number.

Description: Subscriber number.

Description: Letter or number.

Description: Abbreviated number.

Description: Reserved.

Parameters for Caller and Called Number Coding


Code 0 Description Description: Unknown. If TON is equal to 5, then NPI is equal to 0. 1 Description: Integrated Services Digital Network(ISDN) or telephone number coding scheme (E164 or E163). This code applies to any Service Center (SC), Mobile Switching Center(MSC), or Mobile Station(MS). 2 Description: Reserved. 3 Description: Data coding scheme (121). 4 Description: Telegraph coding scheme. 5-7 Description: Reserved. 8 Description: Home coding scheme. 9 Description: Private coding scheme.

2-212

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Code 10

Description Description: ERMES coding scheme (ETSI DE/PS 3 01-3).

11-15

Description: Reserved.

Related Tasks
2.3.3.2 Setting Alarm Remote Notification Parameters

2.8.39 Parameters for Setting Simple Correlation Rules


This section describes the parameters in the Add Simple Correlation Rule dialog box. You can refer to these parameters when you set or modify the simple correlation rules of alarms.

Parameters
Name Alarm names Description Description: Name of the alarm that need simple correlation analysis. Settings Setting method: Click . In the displayed Select Alarm Name dialog box, set the parameter. Value: Value range: 0-10. Unit: Second (abbreviated as s)

Interval

Description:
l

For fault alarms Interval between the clearance of two fault alarms. If the status of the alarms is switched between "uncleared" and "cleared" and the interval between the clearance of two adjacent fault alarms does not exceed the preset value, these alarms are called intermittent alarms. In this case, only the first alarm that is report for the first time is displayed, and other intermittent alarms that are report later are filtered.

For event alarms Interval between the clearance of two event alarms. If the same event alarm is reported by the NE continuously for twice or more times and the interval between any two adjacent event alarms does not exceed the preset value, this alarm is called repeat event alarm. In this case, only the first alarm is displayed, and the repeat event alarms are filtered.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-213

2 Network Monitoring

M2000 Operator Guide

Name Intermittence/ Repeat Times

Description Description:
l

Settings Value: Value range: 2-6000.

For fault alarms If the frequency of the intermittent fault alarms exceeds the preset value, these alarms are called high frequent fault alarms. In this case, the M2000 filters the intermittent fault alarms, and reports an alarm of a higher level. If the level of the intermittent alarms is already highest, the M2000 reports an alarm of the same level.

For event alarms If the frequency of the repeat event alarms exceeds the preset value, these alarms are called high frequent event alarms. In this case, the M2000 displays the first event alarm, and reports an alarm of a higher level. If the level of the intermittent alarms is already highest, the M2000 reports an alarm of the same level.

Action

Description: When the M2000 detects intermittent fault alarms or repeat event alarms, it filters the report alarms. If you select Shield, the alarms are saved in the filter database. If you select Abandon, the alarms are deleted. You can view the filtered alarms by querying the filtered fault alarms and filtered event alarms.

Value: Value range: Abandon and Shield.

Memo

Description: Remarks of the alarm simple correlation filter rule.

Setting method: Text box. Value: Check box.

Enable

Description: Whether the current alarm correlation rule is enabled.

Related Tasks
2.3.7.3 Adding Simple Correlation Rules of Alarms

2.8.40 Parameters for Setting Advanced Correlation Rules


This section describes the parameters in the Add Advanced Correlation Rule dialog box. You can refer to these parameters when you set or modify the advanced correlation rules of alarms.

2-214

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameters
Name Correlati on Conditio n Alarm Instance A Description Description: An alarm instance set in the correlation condition. Settings Setting method: From the drop-down list, select Clear Alarm Instance (which indicates no configuration). Select Create Alarm Instance. In the displayed Select Alarm Name dialog box, specify the alarm instance. Setting method: From the drop-down list, select Clear Alarm Instance (which indicates no configuration). Select Create Alarm Instance. In the displayed Select Alarm Name dialog box, specify the alarm instance. Setting method: Select the priority from the drop-down list. Setting method: Select the condition from the drop-down list. Example: Example: If you select Less than for Occurrence Time, it indicates that the occurrence time of alarm instance A is earlier than that of alarm instance B, that is, alarm instance B is raised later than alarm instance A. Setting method: Select the value from the drop-down list. Example: Example: If you select Level for Property, the values include Critical and Major.

Alarm Instance B

Description: Another alarm instance set in the correlation condition.

Property

Description: Properties of the instance set in the correlation condition.

Condition

Description: Define the relation between the properties of Alarm Instance A and Alarm Instance B, or between the properties of Alarm Instance A or Alarm Instance B and Value.

Value

Description: Value of the alarm instance. It varies with the selected property. You can enter the alarm instance value when only one alarm instance exists.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-215

2 Network Monitoring

M2000 Operator Guide

Name Correlati on Action Alarm Instance

Description Description: When the correlation condition is met, the alarm instance of the correlation action is used. Description: Correlation action executed for a specific alarm when the correlation condition is met.

Settings Setting method: Select the instance from the drop-down list. Setting method: Select the action from the drop-down list. Example: Example: If you select Level Redefine, and the correlation condition is met, the M2000 executes the preset correlation action. The redefined value is set in Value.

Action

Value

Description: Alarm level. This field is valid when the value of Action is Level Redefine.

Setting method: Select the value from the drop-down list. Setting method: Value range: Maximum: 1000000000 High: 1000000 Low: -1000000 Minimum: -1000000000 Value: Option button.

Priority

Description: During correlation analysis, the M2000 determines the priorities of correlation rules, and then executes the actions. The priority of the correlation analysis for intermittent fault alarms and repeat event alarms is highest, which is 1000000000.

Enable

Description: Whether the current correlation rule is enabled.

Related Tasks
2.3.7.4 Adding Advanced Correlation Rules of Alarms

2.8.41 Parameters for the Basic Attributes of Auto-Triggering Tasks


This describes the related parameters on the Basic Attribute tab page in the Attribute dialog box. You can refer to these parameters when you set auto-triggering basic attributes.

Parameter Description
NOTE

The parameters with the asterisk cannot be null.

2-216

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Task Name

Value Range
l

Description The name of the task that is automatically triggered.

A maximum of 20 characters. The allowed characters include Chinese characters, English letters, numbers and special characters except ` ~ ! @ # $ % ^ & ; * ()+-={}[]\\|;':,.?/ <>\" The value must be unique and not empty. Case sensitive

Start Date Start Time End Date End Time Triggering Day

Year range: 1970 to 2038. 24 hours Year range: 1970 to 2038. 24 hours The following four severity levels are listed in the dropdown list:
l l l l l l l l

Indicates the time range when the script is triggered. Only when the alarm occurs in the defined time range, and in the defined Triggering Day, for example, Tuesday, the script to be executed is triggered by the server.

Everyday Mon Tuesday Wed Thursday Fri Sat Sun Run-time type refers to the way the server runs the script.
l

Run-time Type

Selected from the drop-down list.

bash represents Bourne Again shell. sh represents Bourne shell. csh represents C shell. zsh represents Z shell. ksh represents Korn shell. tcsh represents TC shell.

l l l l l

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-217

2 Network Monitoring

M2000 Operator Guide

Parameter Script file

Value Range A maximum of 255 characters.

Description Involves the absolute path and the name of the script file on the M2000 server. For example, / export/home/trigger.sh. You can assign the parameters in the script files using this function. or example, when you enter a b, the first parameter of this script file is assigned with a, and the second parameter is assigned with b. The system determines the number of a parameter based on the order in which the parameter occurs in the script file.

Run-time Param

A maximum of 9 parameters is allowed. The parameters are separated by spaces.

Remark

A maximum of 255 characters.

Involves the backup information about the auto-triggering task.

Related Tasks
2.3.8.1 Creating Auto-Triggering Tasks 2.3.8.2 Viewing the Attributes of Auto-Triggering Tasks

2.8.42 Parameters for Auto-Triggering Conditions


When you set the auto-triggering conditions, you may refer to the Trigger Condition tab page in the Attribute dialog box for the related parameter description.

Parameter Description
Parameter No. Description The serial number of the auto-triggering conditions. The system distributes the serial numbers based on the time order in which you create the triggering conditions. The name of the NE whose alarm triggers the script execution. The alarm ID that triggers the script execution. The information about the failure to create the auto-triggering condition.
NOTE If the auto-triggering condition is successfully created, the Message field is null.

Ne Name Alarm ID Message

Related Tasks
2.3.8.1 Creating Auto-Triggering Tasks 2.3.8.2 Viewing the Attributes of Auto-Triggering Tasks
2-218 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.43 Parameters for Adding the Alarm Conditions of the AutoTriggering Script
The Select NE Alarms dialog box lists the information about the parameters. You may refer to the information in this part when you add the alarm conditions of the auto-triggering script.

Parameter Description
NOTE

l l

Each auto-triggering task supports a maximum of 250 alarm conditions settings. In the Select Alarm navigation tree, the items can be listed based on the alarm name or on the alarm ID. You can right-click the blank area in the Select Alarm pane, and then choose Sort by Alarm Name or Sort by Alarm ID.

Parameter Search by Name

Description This parameter is used to search for the NE or the NE alarm that triggers the script. The querying conditions support fuzzy search whatever case the name is. The querying conditions do not support wildcard. If you select this item, in the Select NE navigation tree, the NEs are displayed in groups based on NE types. If you select this item, In the Select Alarm navigation tree, the alarms are divided based on the alarm type. The alarm types include the power supply system, the environment system, and the signaling system. If you select this item, in the Select Alarm navigation tree, the alarms are displayed in groups based on the alarm levels. The alarm levels are critical, major, minor and warning. If you select this item, in the Select Alarm navigation tree, the alarms are displayed in groups based on the alarm categories. The alarms are categorized into fault alarms and event alarms.

Group by NE Type Group by Alarm Type

Group by Alarm Level

Group by Category

Related Tasks
2.3.8.1 Creating Auto-Triggering Tasks 2.3.8.2 Viewing the Attributes of Auto-Triggering Tasks

2.8.44 Parameters for Searching Auto-Triggering Tasks


When you query the auto-triggering tasks, you may refer to the Query Task dialog box for the related parameter description.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-219

2 Network Monitoring

M2000 Operator Guide

Parameter Description
Parameter Task Name Value Range
l

Description The name of the task that is automatically triggered.

The task name has a maximum of 20 characters. The allowed characters include Chinese characters, English letters, numbers and any other special characters rather than ` ~ ! @#$%^&;*()+-={} []\\|;':,.?/<>\" The task name is unique and cannot be null. The task name is case sensitive.

Start Date End Date Start Time End Time Triggering Day

Year range: 1970 to 2038. Year range: 1970 to 2038. 24 hours. 24 hours. You may choose a period from the drop-down list that includes the following periods:
l l l l l l l l

The period that is set in the autotriggering task.

Everyday Monday Tuesday Wednesday Thursday Friday Saturday Sunday Run-time type refers to the way the server runs the script.
l

Run-time Type

You may choose a type from the drop-down list.

bash represents Bourne Again shell. sh represents Bourne shell. csh represents C shell. zsh represents Z shell. ksh represents Korn shell. tcsh represents TC shell.

l l l l l

2-220

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Ne Name

Value Range None.

Description Indicates the NE name whose alarm triggers the script execution. Click the NE name in the Select NE Alarms dialog box that is displayed after you click .

Alarm ID

None.

Indicates the ID of the alarm that triggers the script execution. Enter the alarm ID or choose from theSelect NE Alarms dialog box displayed after you click .

Related Tasks
2.3.8.3 Searching Auto-Triggering Tasks

2.8.45 Parameters for Searching Auto-Triggering Records


This describes the related parameters in the Query Record dialog box. You can refer to these parameters when you search for auto-triggering tasks.

Parameter Description
Parameter Query Condition Task Name NE Name Query All Description The name of the task that is automatically triggered. The name of the NE whose alarm triggers the script execution. Select this item. The system queries all auto-triggering tasks run by the server. The name of the task that is automatically triggered. The name of the NE whose alarm triggers the script execution. Indicates the ID of the alarm that triggers the script execution. Run-time type refers to the way the server runs the script. Involves the absolute path and the name of the script file on the M2000 server. For example, / export/home/trigger.sh.
2-221

Query Result

Task Name NE Name Alarm ID Run-time Type Script file

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 Network Monitoring

M2000 Operator Guide

Parameter Triggered time

Description Indicates the specific time for triggering the server to run the script file.

Related Tasks
2.3.8.4 Searching Auto-Triggering Records

2.8.46 Parameters for Analyzing the Trend of a Monitoring Counter


This part lists the trend chart parameter settings.

Parameters
Parameter Object Counter Value Range Options in the dropdown list Description Select object in navigation tree. Counter to be monitored. The counter to be monitored depends on the object class of the detail data specified during the setting of a monitoring task. Upper value set against the history value. Lower value set against the history value.

Upper Warp (%) Lower Warp (%)

0.000 - 100.000 0.000 - 100.000

Related Tasks
2.5.4.1 Analyzing the Trend of a Monitoring Counter

2.8.47 Parameters for Setting a Background Color for a Monitoring Chart


This topic describes parameters for setting the background color for monitor charts.

Parameters
Parameter Swatches HSB RGB Operation Select a sample color. Select a sample color or select a color by setting the HSB value. Select a color by setting the RGB value.

Related Tasks
2.5.3.7 Setting a Background Color for a Monitoring Chart
2-222 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.48 Parameters for Setting Filtering Conditions for a Monitoring Table


This part introduces parameters of Table DataFilter Setting.

Parameters
Parameter Hide the filtered data Show the filtered data Show All Object Condition Counter Condition Description To hide the data that satisfies the filtering conditions. To show the data that satisfies the filtering conditions. To show all the data. Name of the current monitored object. Name of the monitored counter of the current object monitored. You can select counter names, operators, and logical relationships. For the values, however, you must enter them manually.

Related Tasks
2.5.3.1 Setting Filtering Conditions for a Monitoring Table

2.8.49 Parameters for Setting Properties for a Monitoring Chart


This part introduces parameters about Property Setting of the monitor chart.

Parameters
Parameter Show/Hide Description You can select the counters or objects to be displayed in the monitoring chart.
l

Compare chart: The counter compare chart displays all the monitored counters; the object compare chart displays all the monitored objects. Detail chart: display all the monitored objects. Tendency chart: displays the real value, upper value, and lower value.

l l

Time range Part/Full Lost Data Status

Specifies the start and end time of the monitoring time segment for the monitoring chart.
l

Normal: Only time points in the normal monitoring status are shown in the curve in the chart. Part Lost: Time points with missing data are shown in the curve in a special color. Full Lost: Time points with lost data are shown in the curve in a special color.
2-223

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 Network Monitoring

M2000 Operator Guide

Related Tasks
2.5.3.4 Setting Properties for a Monitoring Chart

2.8.50 Parameters for Setting Real-Time Monitoring Thresholds


This describes the parameters in the Monitor Threshold Management dialog box.

Parameter Description
Parameter Object Counter Upper Warp (%) Lower Warp (%) Triggering Times Value Range None. Monitoring counters. 0.000 - 100.000 0.000 - 100.000 1 - 10 Description Object to be monitored. Counter to be monitored. Upper value set against the history value. Lower value set against the history value. Triggering times for monitor threshold alarms. The default value is 3. When a counter of a monitored task exceeds the threshold range set by monitor threshold alarm for successive three times, the system reports the Pm Alarm Threshold of the corresponding level. Severity level of the threshold alarm

Level

l l l l

Critical Major Minor Warning

Related Tasks
2.5.2.5 Setting Real-Time Monitoring Thresholds

2.8.51 Parameters for Setting Rules for Monitoring Thresholds


This part introduces parameters of Set Rules for Monitoring Thresholds.

Parameters
Parameter Date Description Date for filtering alarms.
l l l

All By Week By Month

2-224

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Time

Description Time for filtering alarms.


l l

All Specific: a maximum of three time segments

Related Tasks
2.5.2.6 Setting Rules for Monitoring Thresholds

2.8.52 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Chart
This part introduces parameters for setting the thresholds for the monitor chart.

Parameters
Parameter Counter Upper Warp Lower Warp Value Range Options in the drop-down list From -999999999.998 to 999999999.998 From -999999999.998 to 999999999.998 Description Counter name. Upper threshold of a monitored counter. Lower threshold of a monitored counter.

Related Tasks
2.5.3.5 Setting Thresholds for Displaying Counters in a Monitoring Chart

2.8.53 Parameters for Setting Thresholds for Displaying Counters in a Monitoring Table
This part introduces parameters of Table Threshold SettingShow style setting.

Parameters
Parameter Font Size Attributes Value range Enumeration. Enumeration.
l l

Description The text font. The font size. The font attributes.

Bold Italic

Foreground color

Swatches,HSB,RGB

The foreground color of the font.The default color is black.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-225

2 Network Monitoring

M2000 Operator Guide

Parameter Background color

Value range Swatches,HSB,RGB

Description The background color of the font.The default color is white.

Related Tasks
2.5.3.2 Setting Thresholds for Displaying Counters in a Monitoring Table

2.8.54 Parameters for Summarizing Alarms of RNC/NodeB


You can select a method for alarm statistics. Alarms on the RNC support statistics by levels, by IDs, and by TopN. TopN indicates the sequence based on the quantity of alarms. The NodeB with most alarms is classified as Top1. Alarms on NodeBs support statistics by levels and IDs.

Settings for Alarm Statistics


Before you take alarm statistics in the system, refer to Table 2-23 to set the statistical conditions. Table 2-23 Parameters related to the settings of alarm statistics Parameter Statistic Method Description
l l l

Statistic by Level: Alarms are categorized by levels. Statistic by ID: Alarms are categorized by IDs. Statistic by TopN of NodeB: Collect the alarms of the current object group by collecting the alarms of the NodeBs under the object group. TopN indicates the sequence based on the quantity of alarms. The NodeB with most alarms is classified as Top1. Statistic by TopN of Cell: Collect the alarms of the current object group by collecting the alarms of the cells under the object group. TopN indicates the sequence based on the quantity of alarms. The cell with most alarms is classified as Top1. Statistic by TopN of SAAL: Collect the alarms of the current object group by collecting the alarms of the SAAL links under the object group. TopN indicates the sequence based on the quantity of alarms. The SAAL link with most alarms is classified as Top1. Statistic by TopN of E1T1: Collect the alarms of the current object group by collecting the alarms of the E1/T1 links under the object group. TopN indicates the sequence based on the quantity of alarms. The E1/T1 link with most alarms is classified as Top1. Server Time: Alarm statistics are made according the time on the server. NE Time: Alarm statistics are made according the time on a specific NE.

Time Style

2-226

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter Statistic Time

Description Time range for alarm statistics


l l

Start time: start time of the alarm statistics End time: end time of the alarm statistics

Alarm Statistics by Levels


You can make alarm statistics by levels. For details of related parameters, refer to Table 2-24. Table 2-24 Parameters related to alarm statistics by levels Parameter Alarm Level Total Alarm Current Alarm History Alarm Cleared Alarm Uncleared Alarm Description Alarms are categorized into four levels: critical, major, minor and warning. Number of all alarms by levels Number of current alarms by levels Number of history alarms by levels Number of cleared alarms by levels Number of uncleared alarms by levels

Alarm Statistics by IDs


You can make alarm statistics by IDs. For details of related parameters, refer to Table 2-25. Table 2-25 Parameters related to alarm statistics by IDs Parameter Alarm ID Total Alarm Current Alarm History Alarm Cleared Alarm Uncleared Alarm Alarm Name Description ID of an alarm Number of all alarms by IDs Number of current alarms by IDs Number of history alarms by IDs Number of cleared alarms by IDs Number of uncleared alarms by IDs Name of the alarm specified by an ID

Alarm Statistics on a TopN Basis


You can make alarm statistics on a TopN basis. Three methods available are Statistic by TopN of Cell, Statistic by TopN of SAAL, and Statistic by TopN of E1T1. For details of related parameters, refer to Table 2-26.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-227

2 Network Monitoring

M2000 Operator Guide

Table 2-26 Parameters related to alarm statistics on a TopN basis Parameter Object ID Point Name Total Alarm Current Alarm History Alarm Cleared Alarm Uncleared Alarm Description ID of the object Name of the key point Number of all alarms on a TopN basis Number of current alarms on a TopN basis Number of history alarms on a TopN basis Number of cleared alarms on a TopN basis Number of uncleared alarms on a TopN basis

Related Tasks
2.6.6.1 Summarizing RNC Alarms by Alarm Severity 2.6.6.2 Summarizing RNC Alarms by Alarm ID 2.6.6.3 Summarizing RNC Alarms by NodeB 2.6.6.4 Summarizing RNC Alarms by Cell 2.6.6.5 Summarizing RNC Alarms by SAAL Link 2.6.6.6 Summarizing RNC Alarms by E1/T1 Link 2.6.6.7 Summarizing NodeB Alarms by Alarm Severity 2.6.6.8 Summarizing NodeB Alarms by Alarm ID

2.8.55 Parameters for Checking Values of RNC Monitoring Counters


This part describes the parameters of KPI counters in the active RNC object group. Table 2-27 lists the parameters of KPI counters in the active RNC object group. Table 2-27 Parameters about the information on basic configuration of the RNC object group Property Name Name CounterName CounterUnit CounterResult ResultReliable ResultTime Property Value Name of the affiliated NE Name of KPI counters Unit that KPI counters belong to Counter result Counter related to the result Report time of counter results

Related Tasks
2.6.5.1 Checking Values of RNC Monitoring Counters
2-228 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

2.8.56 Parameters for Checking the Information on Basic RNC Configuration


This part describes the basic attributes of the RNC object group and the meanings of basic configuration parameters in the object group. Table 2-28 lists the parameters about the information on basic configuration of the RNC object group. Table 2-28 Parameters about the information on basic configuration of object groups Parameter Name IP neVersion className RNCID MCC MNC Description Name of the object group. IP address of the object. The IP address varies with the object tree on the left. NE version of the object. The NE version varies with the object tree on the left. NE class name of the object. The NE class name varies with the object tree on the left. The RNC ID uniquely identifies an RNC node within the scope of the PLMN. Mobile country code that the RNC belongs to. Mobile network code that the RNC belongs to.

Related Tasks
2.6.4.1 Checking the Information on Basis RNC Configuration

2.8.57 Parameters for Checking the Information on the Iu/Iur of the RNC
This part describes the parameters about the information on the Iu/Iur interface in the RNC. Table 2-29 lists the parameters about the information on the Iu/Iur interface. Table 2-29 Parameters about the information on the Iu/Iur interface Parameter Index Name Type Property Name
Issue 06 (2008-12-16)

Description Index of the destination signalling point. The range of the index is from 0 to 37 and the step length is 1. Interface name of the DCP destination signalling point Interface type of the DCP destination signalling point Index name of the current destination signalling point
2-229

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 Network Monitoring

M2000 Operator Guide

Parameter Property Value

Description Index value of the current destination signalling point

Related Tasks
2.6.4.3 Checking the Information on the Iu/Iur of the RNC

2.8.58 Parameters for Checking the Information on Specified Links of the Iu/Iur Interface
This part describes the parameters about the information on specified links of the Iu/Iur interface in the RNC. Table 2-30 lists the parameters about the information on specified links of the Iu/Iur interface in the RNC. Table 2-30 Parameters about the information on specified links of the Iu/Iur interface Parameter Index Name Type Property Name Property Value Description Index of the destination signalling point. The range of the index is from 0 to 37 and the step length is 1. Interface name of the DCP destination signalling point Interface type of the DCP destination signalling point Index name of the current destination signalling point Index value of the current destination signalling point

Related Tasks
2.6.4.4 Checking the Information on Specified Links of the Iu/Iur Interface

2.8.59 Parameters for Checking the Information on the Iub Interface of the RNC
This part describes the parameters about the information on the Iub interface in the RNC object group. Table 2-31 lists the parameters about the information on the Iub interface in the RNC object group. Table 2-31 Basic parameters of the Iub interface Property Name Name ID IP
2-230

Property Value Name of the current object ID of the current object IP address of the current object

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Property Name Frame No Sub System No Slot No Link No

Property Value Number of the frame that the board is located in Sub-system number that the current board bears Number of the current board is located in Link number that the IUB interface bears

Related Tasks
2.6.4.5 Checking the Information on the Iub Interface of the RNC

2.8.60 Parameters for Checking the Information on Specified Links of the Iub Interface
This part describes the basic parameters about the information on specified links of the Iub interface in the RNC object group. Table 2-32 lists the basic parameters about the information on specified links of the Iub interface in the RNC object group. Table 2-32 Basic parameters of the Iub interface Property Name Identifier Serial Number Property Value Location where the alarm occurs Serial number of the alarm. The serial number is the keyword of alarm records. Based on the serial number, you can determine a unique alarm. NE name in the network Alarm ID MO object name. When the object is a real NE, the MO object is consistent with the NE name. When the object is a virtual NE, the MO object is the NE type of the object. Alarm name that enables you to quickly locate the details about alarms. Take the alarm name Database Threshold Alarm as an example. Based on this name, you can locate the details about the alarm. Source of the alarms in the network such as Power System, Trunk System, and Inside Element Management. Alarm levels that consist of four levels: critical alarm, major alarm, minor alarm, and warning. Time when an alarm occurs. Occurrence time can be server time or network element time.

NE Name Alarm ID MO Object

Alarm Name

Type Level Occurrence Time

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-231

2 Network Monitoring

M2000 Operator Guide

Property Name Status

Property Value Indicates whether a fault alarm or an event alarm is acknowledged and cleared, such as Unacknowledged and uncleared.

Related Tasks
2.6.4.6 Checking the Information on Specified Links of the Iub Interface

2.8.61 Parameters for Checking the E1/T1 Status of the RNC


This part describes the parameters about the E1T1 status of the RNC. Table 2-33 lists the parameters about the E1T1 status of the RNC. Table 2-33 Parameters about E1T1 status Parameter Frame No Description Number of the frame in which the board with the E1T1 interface is located Valid range of the parameter: 1 or 3 to 17 Slot No Number of the slot that the board with the E1T1 interface is located in Valid range of the parameter: 0 or 15 Link No E1T1 link number that begins from bottom to up Valid range of the parameter: 0 or 62If the port type is WOSE/ WOSEb/WOSEc_OPORT, the range is from 0 to 62.If the port type is WOSE/WOSEb/WOSEc_EPORT, the range is from 0 to 7.If the port type is WBIE/WBIEb_EPORT, the range is from 0 to 31. Use Status NodeB Name N7DPC Name Use status that has two states: Unused and Used NodeB name that the link maps Name of the destination signalling point

Related Tasks
2.6.5.2 Checking the E1/T1 Status of the RNC

2.8.62 Parameters for Checking the Distribution of NodeB and Cells on the RNC
This part describes the parameters about the distribution of NodeB and cells on the RNC. Table 2-34 lists the details about the parameters.

2-232

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Table 2-34 Parameters about the distribution of NodeB and cells on the RNC Parameter Frame No Sub System No Number of NodeB Number of Cell Number of NodeB with Zero Cell Number of NodeB with One Cell Number of NodeB with Two Cells Number of NodeB with Three Cells Number of NodeB with More than Three Cells Description Number of the frame in which the board is located Sub-system number of a board Total NodeB number in the current object group Total cell number in the current object group Total number of NodeB with zero cell in the current object group Total number of NodeB with one cell in the current object group Total number of NodeB with two cells in the current object group Total number of NodeB with three cells in the current object group Total number of NodeB with more than three cells in the current object group

Related Tasks
2.6.4.2 Checking the Distribution of NodeB and Cells on the RNC

2.8.63 Parameters for Checking the Information on Basic NodeB Configuration


This part describes the parameters about the information on basic configuration of the NodeB object group. Table 2-35 lists the parameters about the information on basic configuration of the NodeB object group. Table 2-35 Parameters about the information on basic configuration of object groups Property Name Name IP neVersion className ID
Issue 06 (2008-12-16)

Property Value Name of the object group IP address of the object. The IP address varies with the object tree on the left. NE version of the object. The NE version varies with the object tree on the left. NE class name of the object. The NE class name varies with the object tree on the left. Uniquely identifies a NodeB.

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-233

2 Network Monitoring

M2000 Operator Guide

Property Name Frame No Sub System No TNLBEARERTY PE NODEBPROTCL VER TRANSDELAY

Property Value Indicates the WRBS frame that manages NodeBs. Identifies the subsystem of the WSPUb where the NodeB is located. Identifies the transmission type used by Iub interfaces. Indicates the protocol version used by the NodeB. Indicates the round-trip delay of Iub interfaces.

Related Tasks
2.6.4.7 Checking the Information on Basic NodeB Configuration

2.8.64 Parameters for Checking the Information on Basic Cell Configuration


This describes the parameters for checking the information on basic cell configuration. Table 2-36 describes the parameters related to the basic configuration of a cell. Table 2-36 Parameters related to the basic configuration of a cell Parameter Name ID PSCRAMBCODE MAXTXPOWER Attribute Value Name used to uniquely identify a cell. Value range: It consists of 1 to 31 characters. ID used to uniquely identify a cell. Value range: 0 to 65535. Primary downlink scrambling code. Value range: 0 to 511. Maximum transmit power of a cell. This parameter indicates the sum of the maximum transmit power over the downlink channels in a cell. The value depends on network planning.
l l

Value range: 0 to 500. Physical value range: 0 to 50, with a step of 0.1.

UARFCNUPLINK UARFCNDOWNLI NK NodeB name LAC

Uplink frequency number. Its value range depends on the frequency selected. Downlink frequency number. Its value range depends on the frequency selected. Name a specific NodeB Location area code. Value range: H'0000 to H'FFFF (0 to 65535), excluding H'0000 and H'FFFE. This parameter defines a location area for a GSM-MAP PLMN. Its value is defined by the operator.

2-234

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter SAC

Attribute Value Service area code. The value range is H'0000-H'FFFF (0-65535). Together with PLMN-Id and LAC, this parameter defines the service area indicator (SAI). The SAI identifies an area composed of one or more cells belonged to the same location area. This area identified is also called service area, and used to identify the position of a UE. The SAC is defined by the operator. Its value is defined by the operator. Band of the frequency band of the cell. Value range: Band1, Band2, Band3, Band4, Band5, Band6, BandIndNotUsed.

BANDIND

TCELL SUPSSDT TXDIVERSITYIN D DPCHTXDIVERSI TYMODE HSPDSCHTXDIVE RSITYMODE LOCELL CFGRACIND

Difference between the cell system frequency number (SFN) and the NodeB frequency number (BFN). Indicates whether the cell supports Site Selection Diversity TPC (SSDT). Indicates whether the transmission diversity mode of the common channel is activated. Indicates the transmission diversity mode of the dedicated channel. Indicates the transmission diversity mode of the HS-PDSCH. Identifier of the local cell, which maps to the logical cell. Indicates whether the RAC is configured.
l l

NOT_REQUIRE: RAC is not configured. REQUIRE: RAC is configured.

RAC CLOSEDLOOPTI MEADJUSTMODE

Identifies the routing area in the LAI, The fixed length is one byte. It is mainly used in PS services. Identifies whether the cell supports the closed loop timing adjustment mode.

Related Tasks
2.6.4.8 Checking the Information on Basic Cell Configuration

2.8.65 Parameters for Configuration Status


This part describes the parameters related with the configuration status of the RNC, NodeB and cell.

Parameter Related with the Configuration Status of Cells


Parameter Name
Issue 06 (2008-12-16)

Description Indicates the name of a cell.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-235

2 Network Monitoring

M2000 Operator Guide

Parameter Administrative Status

Description Indicates whether a cell is blocked by the operator on the administration console of the RNC. If a cell is blocked, the users accessing the cell are not affected while new users cannot access the cell. Value range: blocked and unblocked

Operational Status

Indicates whether a cell is available. This parameter indicates a general status. If all the required resources of a cell, such as common channels and ports, are available and the administrative status of the cell is unblocked, infer that the operational status of the cell is available. Value range:
l l

Available: indicates that a cell is normal and users can access the cell. Unavailable: indicates that users cannot access a cell.

Activate Status

Indicates whether a cell can provide services. value range: activated and deactivated

Parameters Related to the Configuration Status of the RNC and the NodeB
Parameter Name Connect State Description Indicates the name of a monitoring object. Indicates whether the monitoring object is disconnected with a server. Value range: connected and disconnected

Related Concepts
2.6.1.3 Configuration Status of Monitored Objects

Related Tasks
2.6.3.4 Checking Detailed Information of Configuration Status

2.8.66 Parameters for Checking the Information on CCH Configuration


This part describes the parameters related to the basic configuration of the common channel in a cell. For details of the parameters related to the basic configuration of the common channel in a cell, refer to Table 2-37. Table 2-37 Parameters related to the basic configuration of the common channel in a cell Parameter Name
2-236

Description Name of the cell


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter ID NodeB Name PSCHPower

Description ID used to uniquely identify a cell. Value range: 0 to 65535. Name of the NodeB managing the current cell. Indicates the offset of the PSCH transmit power from the PCPICH transmit power in a cell
l l

Value range (in dBs): -350 to 150 Physical value range: -35 to 15, with a step of 0.1.

SSCHPower

Indicates the offset of the SSCH transmit power from the PCPICH transmit power in a cell
l l

Value range (in dBs): -350 to 150 Physical value range: -35 to 15, with a step of 0.1

PCPICHPower

PCPICH transmit power. This parameter is set based on the actual system environment such as cell coverage (radius) and geographical environment. For the cells to be covered, the downlink coverage should be guaranteed as a premise. For the cells requiring soft handover area, this parameter should satisfy the proportion of soft handover areas stipulated in the network planning. If the maximum transmit power of the PCPICH is configured too great, the cell capacity will be decreased because a lot of system resources will be occupied and the interference with the downlink traffic channels will be increased.
l l

Value range (in dBs): -100 to 500 Physical value range: -10 to 50, with a step of 0.1

PRACH PHYCHID SCCPCH PHYCHID PCCPCH PHYCHID

Uniquely identifies a random access physical channel in the cell Uniquely identifies the primary common control physical channel in the cell Uniquely identifies the secondary common control physical channel in the cell

Related Tasks
2.6.4.9 Checking the Information on CCH Configuration

2.8.67 Parameters for Checking the Information on Neighbors


This describes the parameters for checking the information on neighbors.Three types of neighboring cells are available: Intra-frequency neighboring cell, inter-frequency neighboring cell, and GSM neighboring cell. The three types of cells have the following meanings:
l

Intra-frequency neighboring cell


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-237

Issue 06 (2008-12-16)

2 Network Monitoring

M2000 Operator Guide

The intra-frequency neighboring cell covers an area that partly overlaps the current service cell. In addition, the carrier frequency used by the intra-frequency neighboring cell is the same as the current service area.
l

inter-frequency neighboring cell The intra-frequency neighboring cell covers an area that partly overlaps the current service cell. In addition, the carrier frequency used by the intra-frequency neighboring cell is different from the current service area.

GSM neighboring cell The GSM neighboring cell is close to the current service cell. The GSM neighboring cell, however, belongs to the GSM or GSM/GPRS system.

Table 2-38 describes the parameters related to intra-frequency neighboring cells. Table 2-38 Parameters related to intra-frequency neighboring cells Parameter CELLID RNC ID NCELLID READSFNIND Description ID of a cell, uniquely identifying a cell. Value range: 0 to 65535. ID of a neighboring cell's RNC , uniquely identifying an RNC. Value range: 0 to 4095. ID of a cell, uniquely identifying a cell. Value range: 0 to 65535. Indicate whether to read the System Frame Number (SFN) of the neighboring cell. The value range is as follows:
l l

NOT_READ: not read READ: read

CELLINDIVIDAL OFFSET

Indicates the offset of the cell CPICH measurement. This parameter is used in handover decisions and its value depends on network planning. It is used to move the cell edges in handover algorithm. Configure this parameter based on the actual situation in network planning. For 1A/ 1C/1D events, the triggering chance is in positive correlation with the value of this parameter. For 1B/1F events, the triggering chance is in negative correlation with the value of this parameter. The value range is as follows: -20 to 20, with the unit as dB.

CELLSFORBIDD EN1A

Indicates whether the addition of the cell into the active set affects the relative threshold of the event 1A.
l

NOT_AFFECT: The addition does not affect the relative threshold of the event 1A. AFFECT: The addition affects the relative threshold of the event 1A. NOT_AFFECT: not affect. AFFECT: affect.

The value range is as follows:


l l

2-238

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Parameter CELLSFORBIDD EN1B

Description Indicates whether the addition of the cell into the active set affects the relative threshold of the event 1B.
l

NOT_AFFECT: The addition does not affect the relative threshold of the event 1B. AFFECT: The addition affects the relative threshold of the event 1B. NOT_AFFECT: not affect. AFFECT: affect.

The value range is as follows:


l l

QOFFSET1SN

Indicates load level offset 1 between connection mode center and neighboring cells. This parameter is used for the cell offset of CPICH RSCP measurement value in cell selection and re-selection. This parameter is used for changing the cell border. In cell selection or reselection, this parameter is in negative correlation with the probability of selecting inter-RAT neighboring cells. The value range is as follows: Value range (in dBs): -50 to 50. The recommended value of this parameter is 0.

QOFFSET2SN

Indicates load level offset 2 between connection mode center and neighboring cells. This parameter is used for the cell offset of CPICH Ec/No measurement value in cell selection and re-selection. This parameter is used for changing the cell border. In cell selection or reselection, this parameter is in negative correlation with the probability of selecting inter-RAT neighboring cells. The value range is as follows: Value range (in dBs): -50 to 50. The recommended value of this parameter is 0.

TPENALTYHCSR ESELEC

Indicates the hierarchical cell re-selection penalty timer. The larger the parameter is, the smaller the probability of selecting neighboring cells.
l l

The value range is as follows: D0, D10, D20, D30, D40, 50, D60 Physical value range (in seconds): 0, 10, 20, 30, 40, 50, 60.

Table 2-39 describes the parameters related to inter-frequency neighboring cells. Table 2-39 Parameters related to inter-frequency neighboring cells Parameter CELLID RNC ID NCELLID Description ID of a cell, uniquely identifying a cell. Value range: 0 to 65535. ID of a neighboring cell's RNC , uniquely identifying an RNC. Value range: 0 to 4095. ID of a cell, uniquely identifying a cell. Value range: 0 to 65535.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-239

2 Network Monitoring

M2000 Operator Guide

Parameter READSFNIND

Description Indicate whether to read the System Frame Number (SFN) of the neighboring cell The value range is as follows:
l l

NOT_READ: not read READ: read

CELLINDIVIDALOFFSET

Indicates the offset of the cell CPICH measurement. This parameter is used in handover decisions and its value depends on network planning. It is used to move the cell edges in handover algorithm. Configure this parameter based on the actual situation.
l

The value range is as follows: -20 to 20, with the unit as dB. The value range is as follows: Physical value range: -10 to 10, with a step length of 0.5

BLINDHOFLAG

Indicates whether to perform blind handover. The value 0 represents the highest priority. Priorities 0 through 15 are assigned to concentric neighboring cells, which can ensure successful handover. Priorities 16 through 30 are assigned to neighboring cells for blind handover, which cannot ensure successful handover. Value range: 0-30

QOFFSET1SN

Indicates the offset between inter-RAT neighboring cell and WCDMA cell. In cell selection or re-selection, this parameter is in negative correlation with the probability of selecting inter-RAT neighboring cells. The value range is as follows: -50 to 50, with the unit as dB.

QOFFSET2SN

Indicates the offset 2 between inter-RAT neighboring cell and WCDMA cell. In cell selection or re-selection, this parameter is in negative correlation with the probability of selecting inter-RAT neighboring cells. The value range is as follows: -50 to 50, with the unit as dB.

TPENALTYHCSRESELEC

Indicates the hierarchical cell re-selection penalty timer. The larger the parameter is, the smaller the probability of selecting neighboring cells.
l

The value range is as follows: D0, D10, D20, D30, D40, 50, D60 Physical value range (in seconds): 0, 10, 20, 30, 40, 50, 60.

Table 2-40 describes the parameters related to GSM neighboring cells.

2-240

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Table 2-40 Parameters related to GSM neighboring cells Parameter CELLID GSMCELLINDEX Description ID of a cell, uniquely identifying a cell. Value range: 0 to 65535. Index of a GSM cell, uniquely identifying a GSM cell. The GSM cell identified by this parameter is already configured in the ADD GSMCEL command. This cell becomes the neighboring cell of a WCDMA cell. The difference between GSMCELLINDEX and CID is that the previous one is unique to identify a GSM cell while the latter one is not. Value range: 0-4095 CELLINDIVIDALOFFSET It is set according to the topographic feature. This parameter is used in inter-RAT handover decision. The smaller the parameter, the lower the handover priority of the GSM cell. The value range is as follows: -50 to 50, with the unit as dB. BLINDHOFLAG Indicates whether to perform blind handover. FALSE means that the cell is not in candidate cells for blind handover, so blind handover to this cell cannot be triggered. True means that the cell is in candidate cells for blind handover, so blind handover to his cell might be triggered. Value range: FALSE and TRUE QOFFSET1SN Indicates the offset between inter-RAT neighboring cell and WCDMA cell. In cell selection or re-selection, this parameter is in negative correlation with the probability of selecting inter-RAT neighboring cells. The value range is as follows: -50 to 50, with the unit as dB. TPENALTYHCSRESELEC Indicates the hierarchical cell re-selection penalty timer. When the penalty mechanism works, the UE is not allowed to re-select between the two cells where the last reselection occurs. This mechanism avoids the frequent cell re-selections.
l

The value range is as follows: D0, D10, D20, D30, D40, 50, D60 Physical value range (in seconds): 0, 10, 20, 30, 40, 50, 60.

Related Tasks
2.6.4.10 Checking the Information on Neighbors

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-241

2 Network Monitoring

M2000 Operator Guide

2.8.68 Parameters for Checking the Values of Cell Monitoring Counters


This part describes the parameters related to cell monitoring counters. For details of the parameters, refer to Table 2-41. Table 2-41 Parameters related to NodeB and cell statistics Parameter Name CounterName CounterUnit CounterResult CounterTime Description Number of the subrack that houses the board Name of a counter Unit that a counter belongs to Result of a counter Report time of a counter

Related Tasks
2.6.5.5 Checking the Values of Cell Monitoring Counters

2.8.69 Parameters for Searching for Objects


In case that many monitored objects exist, you can search the related monitored objects by using the fuzzy search method. Then you can locate the object quickly. When setting the parameters to be found, refer to Table 2-42. Table 2-42 Parameters for searching for monitored objects Parameter Search Keyword Object Type Search Scope Case Sensitive Description Keywords of the object. It can include letter, number and underline. The value range is 1-256 characters. The value can be RNC, NodeB or CELL. You can search in all the object groups or in a specified object group. This parameter can be selected or deselected. If selected, it means case sensitive. If deselected, it means not case sensitive. The options are available. You can search by the object name. Research the result list. The node names and pathes are displayed.

Search Style Search Result

2-242

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Related Tasks
2.6.3.2 Searching for Objects

2.8.70 Parameters for Setting Thresholds of the M2000 Server


This section describes the parameters of system monitor settings. You can refer to these parameters when you set the server thresholds.

Performance
Name CPU sustained overload times(times)
NOTE When the database of the M2000 server is DB2, the M2000 client does not display this parameter.

Description Description: Times of continuously sampling the CPU usage. If the CPU usage that is sampled each time exceeds the sum of the preset value and offset value, the M2000 raises a CPU alarm. If the CPU usage that is sampled each time is less than the sum of the preset value and offset value, the M2000 raises a cleared alarm. Description: Interval of performance refreshing. Description: Threshold of the CPU usage.

Settings Value: Value range: 40-400 Default value: 40

Performance status refresh interval(sec.)

Value: Value range: 2-60 Default value: 3 Value: Value range: 1-99. Default value: 80. Offset value range: 0-10. Default value: 5.

CPU used rate(%)

Memory used rate(%)

Description: Threshold of the memory usage. When the memory usage exceeds the sum of the preset value and offset value, the M2000 raises a memory busy alarm. When the memory usage is less than the sum of the preset value and offset value, the M2000 raises a cleared alarm.

Value: Value range: 1-99. Default value: 87. Offset value range: 0-10. Default value: 3.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-243

2 Network Monitoring

M2000 Operator Guide

Hard Disk
Name Hard disk refresh interval (sec.) Description Description: Interval of hard disk refreshing. Description: Default thresholds of all the hard disk usage on the M2000 server. When the hard disk usage of the alarms exceeds the sum of the preset value and offset value of a certain level, the M2000 raises a hard disk alarm. Settings Value: Value range: 60-3600 Default value: 60 Value:
l

Default value(%)

Value range: 1-100 Default value:


Warning: 60 Minor: 70 Major: 80 Critical: 90

Offset value range: 0-10 Offset default value:


Warning: 3 Minor: 3 Major: 3 Critical: 2

NOTE The threshold of a low-level alarm must be smaller than the threshold of a high-level alarm.

Used rate(%)

Description: Thresholds of all the hard disk usage on the M2000 server. When the hard disk usage exceeds the sum of the preset value and offset value, a hard disk alarm is raised. When you select Default value, the M2000 uses the thresholds defined in default value. When you select Customize value, the M2000 uses the thresholds that you define manually.

Value: Value range: 1-99 Offset value range: 0-10


NOTE The threshold of a low-level alarm must be smaller than the threshold of a high-level alarm.

2-244

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Database
Name Database used rate(%) Description Description: Settings Value: Default value: 90 Database status refresh interval(sec.) Description: Interval of database refreshing. Description: Select the database name and set whether to monitor the database. Value: Value range: 300-3600 Default value: 300 Setting method: In the left list, select the database name. In the dropdown list on the right, select enable or disable.

Threshold of database usage. Value range: 1-100

Database Monitor Settings

Services
Name Service refresh interval(sec.) Description Description: Interval of service refreshing. Settings Value: Value range: 60-3600 Default value: 60 Service Monitor Screen Tip Settings Description: Set whether to display the service status at the lower right corner of the M2000 client by or . If all the monitored services are is displayed; if a running, monitored service is stopped, is displayed. The Service Monitor tab is displayed when or is clicked. Setting method: In the left list, select the service name. In the dropdown list on the right, select enable or disable.

Related Tasks
2.7.1 Setting Monitoring Parameters 2.7.1.2 Setting the Parameters for the M2000 Performance Monitoring 2.7.1.3 Setting the Parameters for the M2000 Hard Disk Monitoring 2.7.1.4 Setting the Parameters for the M2000 Database Monitoring

2.8.71 Parameters for Monitoring Performance of the M2000 Server


This section describes the parameters of the query result displayed in the Performance Monitor tab.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-245

2 Network Monitoring

M2000 Operator Guide

Parameters
Name Server Name Description Description: Name of the M2000 server. Server Status Description: Status of the M2000 server, including status of the primary server and secondary server. OS Description: Operating system of the server. Free Physical Memory(KB) Description: Remaining physical memory space. Total Physical Memory(KB) Description: Total physical memory space. Free Swap Memory(KB) Description: Remaining virtual memory space. Total Swap Memory(KB) Description: Total virtual memory space. CPU Usage Rate(%) Description: CPU usage. Memory Usage(%) Description: The usage of the total memory space (including physical memory and virtual memory).

Related Tasks
2.7.2 Monitoring the M2000 Performance Status

2.8.72 Parameters for Monitoring Hard Disk of the M2000 Server


This section describes the parameters of the query result displayed in the Hard Disk Monitor tab.

Parameters
Name Server Name Description Description: Name of the M2000 server. Server Status Description: Status of the M2000 server, including Active and Standby.

2-246

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name OS

Description Description: Operating system of the server.

Partition(Mounted Path)

Description: Hard disk partitions and their mapping paths.

Total Size(KB)

Description: Total space of a specific partition, equals to the sum of Used Size and Free Size.

Used Size(KB)

Description: Used space of a specific partition.

Free Size(KB)

Description: Available space of a specific partition.

Used Rate(%)

Description: Current usage of a specific partition.

Status

Description: Current status of a specific partition, including normal and abnormal. If the usage exceeds the maximum, the system displays Abnormal.

Related Tasks
2.7.3 Monitoring the M2000 Hard Disk Status

2.8.73 Parameters for Monitoring Database of the M2000 Server


This section describes the parameters of the query result displayed in the Database Monitor tab.

Parameters
Name Database Name Description Description: Name of the database on the M2000 server. Server Name Description: Name of the M2000 server. OS Description: Operating system in the server. Total Data Space(KB) Description: Total data space.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-247

2 Network Monitoring

M2000 Operator Guide

Name Used Space(KB)

Description Description: Used data space.

Free Space(KB)

Description: Remaining data space.

Used Rate(%)

Description: Usage rate of the used data space and total data space.

Log Space(KB) Total Log Space(KB) Free Log Space(KB)

Description: Total log space. Description: Remaining log space.

Status

Description: Database status, including normal and abnormal. If the database usage exceeds the threshold, the system displays Abnormal.

Related Tasks
2.7.4 Monitoring the M2000 Database Status

2.8.74 Parameters for Monitoring Services of the M2000 Server


This section describes the parameters of the query result displayed in the Service Monitor tab.

Parameters
Name Agent Name Description Description: The name of a process. Service Name Description: The name of a service. Service Description Description: The description information of functions and interfaces provided by a service. Status Description: The status of a service. Auto Restart Count Description: The times that the service is restarted automatically when it is stopped abnormally.

2-248

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

2 Network Monitoring

Name Service Start Time

Description Description: The time that the service is started.

Server Name

Description: The name of the server.

Related Tasks
2.7.5 Monitoring the M2000 Service Status

2.8.75 Parameters for Monitoring Process of the M2000 Server


This section describes the parameters of the query result displayed in the Process Monitor tab.

Parameters
Name Agent Name Description Description: Name of a process. Process ID Description: ID of a process. Handle Number Description: Amount of handles used by a process. CPU Usage Rate(%) Description: CPU usage by a process. Memory Usage(KB) Description: Memory usage by a process. Unit: KB. DB Connection Number Description: Amount of connected databases. Thread Number Description: Amount of connected threads in a process.

NOTE

If the M2000 uses the DB2 database, the client does not display DB Connection Number.

Related Tasks
2.7.6 Monitoring the M2000 Process Status

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-249

M2000 Operator Guide

3 Topology Management

3
About This Chapter

Topology Management

Topology management offers the function of constructing and managing the topology structure of the whole network to display the networking situation and running status of the equipment. You can query and monitor the entire network operation in real time through the topology view. 3.1 Basic Knowledge of Topology Before performing topology management operations, you must be familiar with the basic knowledge of topology such as network topology type, topology object, and topology shortcut menu. The basic topology knowledge helps you understand the contents of topology management. 3.2 Constructing a Physical Subnet In the topology view, the physical subnet is used to show the hierarchical network structure. By designing physical subnets properly, you can improve the visibility of the telecommunication network and the operability of the network management system. 3.2.4 Creating Physical NEs A physical NE is the communication equipment that has the physical connection with the M2000 and can be managed by the M2000. Only when the related physical NE is created on the M2000, the M2000 can manage the communication equipment. 3.4 Managing SNMP Parameter Templates The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. The template types consist of SNMPV1, SNMPV2c, and SNMPV3. By managing SNMP parameter templates, you can browse the detailed information on the existing templates on the current server. In addition, you can add, modify, and delete the templates. 3.5 Monitoring NEs You can monitor the alarm status and connection status on the NEs. By monitoring NEs, you can detect and solve the abnormalities in real time. 3.6 Adjusting the Network Topology After creating a subnet, NE, or link, you can adjust the network topology as required. Adjusting the network topology involves modifying and deleting a subnet, NE, or link. 3.7 Adjusting the Topology View
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-1

3 Topology Management

M2000 Operator Guide

You can adjust the topology view as required. For example, you can expand or hide the topology navigation tree, switch the current subnet, display the topology view in full screen, zoom in or out of the view, and customize the topology tips. 3.8 Printing a Topology View Using the print function, you can print the topology view to paper. 3.9 Reference for Topology Management Interfaces This part describers the topology management interfaces and relevant parameters, which helps you perform the operation related to topology management.

3-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

3.1 Basic Knowledge of Topology


Before performing topology management operations, you must be familiar with the basic knowledge of topology such as network topology type, topology object, and topology shortcut menu. The basic topology knowledge helps you understand the contents of topology management. 3.1.1 Topology Management Function Topology management is used to construct and manage the entire network topology and helps you know the networking and operational status of the devices. You can browse the topology view to know and monitor the entire network status in real time. 3.1.2 Objects in a Topology View Topology objects refer to the elements in a network.

3.1.1 Topology Management Function


Topology management is used to construct and manage the entire network topology and helps you know the networking and operational status of the devices. You can browse the topology view to know and monitor the entire network status in real time. Topology management provides the following functions:
l

Three topology types: physical topology, electronic map, and custom view. You can define and categorize different topology views according to actual requirements. The topology views of the MSC Pool and CDMA Pool are custom views. To create an MSC pool, refer to 12.2 Creating MSC Pool Topology on the M2000. To create a CDMA pool, refer to 13.2 Creating CDMA Pool. Different icons are used to identify different topology object types. Small icons are used to identify the status of the topology objects, such as disconnected and synchronizing. You can add, delete, modify, and move the NEs, subnets, and links in the topology view. Status of each managed object is displayed, for example, whether there is a fault and whether the objects are connected with other NEs. You can query or browse the alarm information about the NEs through the topology view. You can customize the initial view, filter the topology objects by type, lay out the topology objects by legend, and lay out the topology objects by name or type. You can set the background for the topology view. You can know the position of a device node through the icon position in the background. You can zoom in or zoom out globally or partially on the topology view to view the network topology structure. The topology view supports global and local topology search and helps you locate a topology object quickly. The topology view provides auxiliary tools such as overview, print, and filter to help you implement topology management.

l l

l l

3.1.2 Objects in a Topology View


Topology objects refer to the elements in a network. Each element managed by the network management system is called an object.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-3

3 Topology Management
l

M2000 Operator Guide

Subnet In the M2000, a large network can be divided into several smaller networks based on a specific rule (for example, by region) for the convenience of network management. In topology, these smaller networks are called subnets. Subnets exist in the physical topology and logical topology.

NE NEs are used to identify concrete entity devices, such as switches and routers. NEs can be grouped into physical NEs and virtual NEs.

Group NE In a telecommunication network, some NEs are interdependent. A group NE is an NE that has the characteristics of both NE and subnet.

Links Links refer to the links between NEs that are mapped in the topology, including physical links and virtual links. A physical link indicates that there is physical connection between two physical NEs. Currently the M2000 supports six types of links: M3UA, H248, BICCSCTPLNK, DATALINK, MTP3, and MTP3B. M3UA, H248, and BICCSCTPLNK links are created by the system automatically. DATALINK, MTP3 and MTP3B links are created manually. Only physical links that are manually created can be deleted. A virtual link refers to the logic link between two NEs (including physical NEs and virtual NEs), and you can set up a virtual link manually.

3.2 Constructing a Physical Subnet


In the topology view, the physical subnet is used to show the hierarchical network structure. By designing physical subnets properly, you can improve the visibility of the telecommunication network and the operability of the network management system. 3.2.1 Designing the Physical Topology Before deploying NEs in the physical topology, you need to design the physical subnet. The physical topology presents the topology structure of the actual communication network, and you can operate and maintain the topology easily. 3.2.2 Setting the Topology Background You can set a proper background for the topology view according to the device layout; thus you can know the locations of the devices directly. 3.2.3 Creating a Physical Subnet You can create a physical subnet in the physical view or electronic view, and add NEs to the physical subnet. 3.2.4 Creating Physical NEs A physical NE is the communication equipment that has the physical connection with the M2000 and can be managed by the M2000. Only when the related physical NE is created on the M2000, the M2000 can manage the communication equipment. 3.2.5 Creating a Virtual NE Virtual NEs refer to the devices that cannot be managed by the M2000 in the entire communication network. You can have a better understanding of the entire communication network by adding the existing virtual NEs to the physical topology. 3.2.6 Creating IP Device An IP device refers to the IP networking device in the mobile network. After you create IP device on the M2000 topology, the communications between the M2000 and an IP device are
3-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

established. Thus, M2000 can perform centralized management and maintenance on multiple IP devices. 3.2.7 Creating a Physical Link A physical link indicates the actual physical connection between two physical NEs. By establishing a physical link, you can know the communication status of the connected NEs. You need to manually create MTP3 and MTP3B links, which cannot be automatically created by the system. 3.2.8 Creating a Virtual Link Virtual links are not the actual links in the network. They indicate the logical relation between NEs. By creating virtual links, you can understand the relations between NEs better. 3.2.9 Creating Links in Batches To reduce the maintenance workload, M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology at the same time. 3.2.10 Setting an NE as a Transfer Server The M2000 software management is based on the FTP. Therefore, you need to set the FTP server, that is, the relay server, to transfer files between the M2000 and NEs. Since firewall always exists between NEs and the M2000, many NEs cannot establish an FTP connection with the M2000. If an NE supports the FTP server mode, you can set the NE as an FTP Server. In this case, the NE acts as the FTP server, and the M2000 server acts as the FTP client. The NE acting as FTP server connects the M2000 to other NEs and improves network access efficiency for the purpose of file transfer.

3.2.1 Designing the Physical Topology


Before deploying NEs in the physical topology, you need to design the physical subnet. The physical topology presents the topology structure of the actual communication network, and you can operate and maintain the topology easily. The left of the logical topology is a navigation tree and the right is a topology view. The navigation tree displays the hierarchies between the topology objects, and the topology view displays the positions of the topology objects. You can divide the physical subnets as follows:
l l l l

By region: based on the regions where the NEs are located. By NE type: based on the types of the NEs. By IP address or network segment: based on the IP addresses of the NEs. By responsible person: based on the responsible persons of the NEs.

3.2.2 Setting the Topology Background


You can set a proper background for the topology view according to the device layout; thus you can know the locations of the devices directly.

Context
Only the image files in the formats of *.gif or *.jpg can be imported, and the file size cannot exceed 1MB.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-5

3 Topology Management

M2000 Operator Guide

Procedure
Step 1 Choose Topology > Main Topology. Step 2 Right-click in the topology view and choose Set Background or select Topology > Set Background. Step 3 In the Set Background dialog box, select a subview (also known as subnet) in the table, then click Select Background. Step 4 In the Select Map File dialog box, select an image, then click Open.
NOTE

To remove the background, select empty.gif in the Select Map File dialog box and then click Open.

Step 5 Click OK. ----End

3.2.3 Creating a Physical Subnet


You can create a physical subnet in the physical view or electronic view, and add NEs to the physical subnet.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the Current Viewdrop-down list, select a view where you want to create a physical subnet, such asPhysical View. Step 3 Choose one of the following method to start to create the physical subnet: l l In navigation tree of the topology, choose New > Create Physical Subnet . Right-click in the topology view and choose New > Create Physical Subnet .

Step 4 Click the Basic Attribute tab. Set the name, coordinate, background, and memo. Step 5 Click the Objects Selection tab. In the Available Objects list, select a NE or a subnet, click to add the selected object to the Selected Objects list. Thus the object is added to the subnet being created.
NOTE

In the Selected Objects list, click to the Available Objects list.

. The object added to the subnet being created can be moved back

Step 6 Click OK. The physical subnet is created successfully in the current subnet or view. You can double-click the subnet to open it. ----End

Related References
3.9.3 Parameters for Setting a Physical Subnet
3-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

3.2.4 Creating Physical NEs


A physical NE is the communication equipment that has the physical connection with the M2000 and can be managed by the M2000. Only when the related physical NE is created on the M2000, the M2000 can manage the communication equipment. 3.3.1 NE Type The mobile network devices managed by the M2000 are categorized according to the home network, service function, and management functions supported by NEs. 3.3.2 Basic NE information This part describes the basic NE information. You are required to acquire the basic NE information before creating NEs, modifying NEs, and querying NE reports. 3.3.3 Creating a Physical NE This describes the procedure for creating a physical NE on the topology view. After the NE is created, the M2000 obtains the configuration data of the NE by synchronizing the NE. 3.3.4 Creating Multiple Physical NEs To reduce the maintenance workload, the M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology at the same time.

3.2.5 Creating a Virtual NE


Virtual NEs refer to the devices that cannot be managed by the M2000 in the entire communication network. You can have a better understanding of the entire communication network by adding the existing virtual NEs to the physical topology.

Procedure
Step 1 In the physical navigation tree or physical view, right-click the subnet where you want to create an NE, and then choose New > Create Topo Object . Step 2 Select a specified virtual NE from the navigation tree of the Create Topo Object dialog box. Step 3 In the right part of the Create Topo Object dialog box, enter the name, coordinates, and memo. Step 4 Click OK. ----End

3.2.6 Creating IP Device


An IP device refers to the IP networking device in the mobile network. After you create IP device on the M2000 topology, the communications between the M2000 and an IP device are established. Thus, M2000 can perform centralized management and maintenance on multiple IP devices.

Prerequisite
l l

The network communications between the M2000 and an IP device are functioning well. The parameters used for connecting the M2000 is set on the IP device.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-7

3 Topology Management

M2000 Operator Guide

Context
IP device includes SNMP, routers, and switches. After the IP device is successfully created, the M2000 system automatically obtains related alarms from the IP device if the IP device incurs faults.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 In the physical topology navigation tree or on the physical view, right-click the subnet of the NE to be created and choose New > Create Topo Object on the shortcut menu. Step 3 Select a mapping NE node under the Single Create node from the navigation tree in the left part of the Create Topo Object dialog box. Step 4 For details of the parameters, refer to 3.9.4 Parameters for Creating an IP Device.
TIP

When the SNMP is created, you can right-click the parameter panel of the SNMP template and choose Save to save the modification performed in the parameter template, or click Save As to save the current parameter information about the SNMP as a template.

Step 5 Click OK. You can view the execution progress of creating the IP device in the displayed Create NE Progress dialog box. You can click Detail in the dialog box to view the detailed information about creating an IP device.
NOTE

A dialog box is displayed to show the progress of creating the IP device. If the communications between the M2000 and an IP device are not functioning well, the status icon is displayed at the top left corner of the created IP device on the topology. The icon indicates that the NE is located in the disconnected state.

Step 6 Click Close. Then, the Create NE Progress dialog box is closed. ----End

Related References
3.9.4 Parameters for Creating an IP Device

3.2.7 Creating a Physical Link


A physical link indicates the actual physical connection between two physical NEs. By establishing a physical link, you can know the communication status of the connected NEs. You need to manually create MTP3 and MTP3B links, which cannot be automatically created by the system.

Prerequisite
l l

You have logged in to the M2000 client. The topology view and network levels are already planned.

Context
l

Currently the M2000 supports six types of links: M3UA, H248, BICCSCTPLNK, DATALINK, MTP3, and MTP3B. M3UA, H248and BICCSCTPLNK links can be
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-8

M2000 Operator Guide

3 Topology Management

automatically created by the system. DATALINK, MTP3 and MTP3B links must be manually created.
l l

Only physical links that are manually created can be deleted. The physical links are named automatically by the system. To change the name of a physical link, see 3.6.6 Viewing/Modifying a Physical Link. The supported NE type varies with the link type. For details, see 3.9.5 Parameters for Physical Link.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Right-click the subnet node in the physical topology navigation tree or the physical topology view, and select New > Create Topo Object. Step 3 Select a specific link type from the navigation tree of the Create topo objects dialog box. You can use either of the following methods:
l l

Select a specific link type from the Link node under the Single Create node. Select the Link node under the Bulk Create node. Click Add in the right part of the window.

Step 4 Configure link information. For details of parameters about link information, refer to 3.9.5 Parameters for Physical Link.
TIP

l l

If you want to create multiple links, repeat step1 to step3. If you need re-configure link information, click Reset.

Step 5 Click OK. The system displays the Create Link prompt box. The progress of creating the link is shown. After the link is created successfully, a link is displayed between two NEs.
NOTE

After a physical link is set up, you can only modify its name.

Step 6 Click OK to close the Create Link prompt box. ----End

Related References
3.9.5 Parameters for Physical Link

3.2.8 Creating a Virtual Link


Virtual links are not the actual links in the network. They indicate the logical relation between NEs. By creating virtual links, you can understand the relations between NEs better.

Context
l

The two NEs at the both ends of a virtual link are called left node and right node. You can only select an NE as the right or left node. If you select a subnet or a link as the right or left node, the selection is invalid, and you need to select the node again.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-9

Issue 06 (2008-12-16)

3 Topology Management
l l

M2000 Operator Guide

When there is more than one virtual link between two NEs, a virtual link set is set up. Double-click the link set. A table is displayed, listing the links in the set.

Procedure
Step 1 In the physical navigation tree or physical view, right-click the subnet where you want to create a link, and then choose New > Create Topo Object . Step 2 Select the Virtual Link node under the Single Create node from the navigation tree of the Create Topo Object dialog box. Step 3 In the right part of the Create Topo Object dialog box, enter the name, type, and left node and right node of the virtual link. Step 4 Click OK. ----End

Related References
3.9.6 Parameters for Setting a Virtual Link

3.2.9 Creating Links in Batches


To reduce the maintenance workload, M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology at the same time.

Prerequisite
l l

You have logged in to the M2000 client. The topology view and network levels are already planned.

Context
l

Some physical links can be set up automatically through a program. For the other physical links that cannot be set up through the program, you can set them up manually. The physical links are named automatically by the system. To change the name of a physical link, see 3.6.6 Viewing/Modifying a Physical Link. The MGW and MSC Server support this function.

Procedure
Step 1 Choose Topology > Main Topology, theMain Topologywindow is displayed. Step 2 Right-click the subnet node in the physical topology navigation tree or the physical topology view, and select New > Create Topo Object. Step 3 Select the Link node under Bulk Create from the navigation tree of the Create topo objects dialog box. Step 4 Click Add in the right pane. Step 5 To know how to configure link information in Add a link, refer to 3.9.5 Parameters for Physical Link.
3-10 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


TIP

3 Topology Management

If you need re-configure link information, click Reset.

Step 6 Click OK to close the Add a link dialog box. Step 7 Repeat step4 to step6 to create multiple links. Step 8 Click OK. The system displays the Create Link prompt box. The progress of creating the link is shown. After the link is created successfully, a link is displayed between two NEs.
NOTE

After a physical link is set up, you can only modify its name.

Step 9 Click OK to close the Create Link prompt box. ----End

3.2.10 Setting an NE as a Transfer Server


The M2000 software management is based on the FTP. Therefore, you need to set the FTP server, that is, the relay server, to transfer files between the M2000 and NEs. Since firewall always exists between NEs and the M2000, many NEs cannot establish an FTP connection with the M2000. If an NE supports the FTP server mode, you can set the NE as an FTP Server. In this case, the NE acts as the FTP server, and the M2000 server acts as the FTP client. The NE acting as FTP server connects the M2000 to other NEs and improves network access efficiency for the purpose of file transfer.

Context
l

The system sets the NEs that can serve as an FTP server for file transfer M2000 server and an NE. If an NE chooses another NE or the M2000 server as its transfer server, the file transfer process can be stopped. If the NE chooses itself as the transfer server, the file transfer process cannot be stopped. The M2000 provides the function of setting FTP servers in batches to save the maintenance effort. You set multiple NEs as FTP servers concurrently. The typical setting is to use the RNC as the relay server for transferring NodeB data.

Procedure
Step 1 Choose Software > File Server Setting. The File Server Setting dialog box is displayed. Step 2 Select the type of the target NE from the navigation tree of the dialog box. All the NEs of this type on M2000 are listed in the right pane.
NOTE

click Refresh to refresh the NE information in the list at the right of the File Server Setting dialog box.

Step 3 Select the destination NE from the NE Name list. You can use Shift or Ctrl to select multiple NEs. Then right-click them and choose Set to set NEs in batches. Step 4 Click the File Server Name column. The File Server IP box displays the IP address of the file server that you have set.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-11

3 Topology Management
NOTE

M2000 Operator Guide

If you click Refresh, the Confirm dialog box is displayed. Click No to cancel the previous setting for the file server.

Step 5 To activate the setting, click Apply. ----End

3.3 Creating Physical NEs


A physical NE is the communication equipment that has the physical connection with the M2000 and can be managed by the M2000. Only when the related physical NE is created on the M2000, the M2000 can manage the communication equipment. 3.3.1 NE Type The mobile network devices managed by the M2000 are categorized according to the home network, service function, and management functions supported by NEs. 3.3.2 Basic NE information This part describes the basic NE information. You are required to acquire the basic NE information before creating NEs, modifying NEs, and querying NE reports. 3.3.3 Creating a Physical NE This describes the procedure for creating a physical NE on the topology view. After the NE is created, the M2000 obtains the configuration data of the NE by synchronizing the NE. 3.3.4 Creating Multiple Physical NEs To reduce the maintenance workload, the M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology at the same time.

3.3.1 NE Type
The mobile network devices managed by the M2000 are categorized according to the home network, service function, and management functions supported by NEs.

Categorize According to Home Networks


According to the different home networks of NEs, the mobile network devices managed by the M2000 can be categorized into the devices of the four network types: GSM, WCDMA, CDMA, and WiMAX. IP devices do not belong to the three networks. Table 3-1 lists the network devices of each type of network.

3-12

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Table 3-1 Network devices categorized according to their home networks NE Type GSM Network Device
l l l l l l l

PCU/PCU33 BSC/GT800BSC iMSC tMSC HLR36 rMSCSvr MSC/MSC33 MGW SGSN RNC HLR SIWF CG MSCServer IMSOMU CSCF HSS ATS RM CCF DOPRA SBC MRF AG AHR ICS(IP Clock Server)

WCDMA

l l l l l l l l l l l l l l l l l l l

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-13

3 Topology Management

M2000 Operator Guide

NE Type CDMA

Network Device
l l l l l l l l l l l

AAA CHLR CBSC CBTS(3606&3612) RAC RAU CMSC MSCe POC CHLR9820 PDSN ASN-GW BWA MRFP MRFC MEDIAX IPCTRX CSE MediaX3600

WiMAX

l l l l l l l l

IP device

ROUTER. The specific models are as follows:


l l l l l l l l

AR28 Eudemon1000 Eudemon200 Eudemon500 NE08 NE16 NE40 NE80 S2000 S2000B S3000 S3500 S5500 S8500

SWITCH. The specific models are as follows:


l l l l l l

3-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

NE Type Other networking devices

Network Device
l

IPsec Gateway

Categorize According to Service Functions


Based on the service function supported by the NEs, the mobile network devices that can be managed by the M2000 can be classified into CN, AN, and IP devices. Table 3-2 lists the NEs in each class. Table 3-2 Categorize According to Service Functions NE Type Access Network Network Device
l l l l l l l l l l

BSC PCU RNC CBSC CBTS(3606&3612) RAC RAU ASN-GW BWA ICS(IP Clock Server)

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-15

3 Topology Management

M2000 Operator Guide

NE Type Core Network

Network Device
l l l l l l l l l l l l l l l l l l l l l l l l l l l

CG GGSN80 HA HLR MGW MSC Server rMSCSvr SGSN tMSCSvr AAA CHLR CMSC MSCe POC CHLR9820 PDSN IMSOMU CSCF HSS ATS RM CCF DOPRA SBC MRF AG AHR

3-16

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

NE Type IP device

Network Device ROUTER. The specific models are as follows:


l l l l l l l l

AR28 Eudemon1000 Eudemon200 Eudemon500 NE08 NE16 NE40 NE80 S2000 S2000B S3000 S3500 S5500 S8500 IPsec Gateway

SWITCH. The specific models are as follows:


l l l l l l

Other networking devices

Categorize According to the Functions Supported by NEs


According to the different functions supported by the NEs, the mobile network devices managed by the M2000 can be categorized into NEs in classes A, B, and C. Table 3-3 lists the NEs in each class.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-17

3 Topology Management

M2000 Operator Guide

Table 3-3 NEs categorized according to the supported functions NE Type A NE Network Device
l l l l l l l l l l l l l l l l l l l l l l l l l

BSC HLR9820 NodeB SGSN GGSN CG MSC Server MGW RNC CHLR9820 MSCe IMSOMU CSCF HSS ATS RM CCF DOPRA SBC MRF ASN-GW BWA AG AHR ICS(IP Clock Server) BTS MSC PCU HLR36 GT800 BSC iMSC rMSC tMSC

B NE

l l l l l l l l

3-18

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

NE Type C NE

Network Device
l l l l l l l l l l l l l l

CHLR9820 GLMS RAC TSC RAU POC CT800 GLMS CBTS CBSC SG7000 MSCe PDSN CMGW HA

IP device

ROUTER. The specific models are as follows:


l l l l l l l l

AR28 Eudemon1000 Eudemon200 Eudemon500 NE08 NE16 NE40 NE80 S2000 S2000B S3000 S3500 S5500 S8500 IPsec Gateway

SWITCH. The specific models are as follows:


l l l l l l

Other networking devices

3.3.2 Basic NE information


This part describes the basic NE information. You are required to acquire the basic NE information before creating NEs, modifying NEs, and querying NE reports.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-19

3 Topology Management

M2000 Operator Guide

Table 3-4 describes the NE basic information. Except User name, Password, Confirm Password, and Coordinate, other NE information is displayed in the NE table. Table 3-4 Basic NE information Message NE Name NE Type Version Description Name of the NE, which must be entered when you create an NE. Type of an NE, which cannot be changed after the NE is created. NE version number obtained from the NE. Manual input or modification of class A NE version is not allowed. Manual input or modification of classes B and C NE versions are required. IP address of an NE, which serves for the NE to communicate with the M2000. You must enter an IP address when creating an NE. Location of an NE. Name of an NE vendor. Description of the NE. District of the NE. For the users outside China, import the files of their own district information. Indicates the maintenance region where NEs are located . The candidate maintenance regions are determined by the server side. Indicates the subareas where the NEs are located. The candidate NEs subareas are determined by the server side. Name of an NE user. This parameter is displayed only when the NE is an NE in classes B or C. For details of NEs in classes B and C, refer to 3.3.1 NE Type. Password Password for logging in to the NE. This parameter is displayed only when the NE is an NE in classes B or C. For details of NEs in classes B and C, refer to 3.3.1 NE Type. Confirm Password The confirm password for logging in to the NE. This parameter is displayed only when the NE is an NE in classes B or C. For details of NEs in classes B and C, refer to 3.3.1 NE Type. Coordinate The pointer changes to + after you click Axis. In the physical topological view, click where the NE is created to display the X and Y coordinates values of the NE.

IP address

Physical Location Vendor Description District Maintenance region

Subarea User

3-20

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

3.3.3 Creating a Physical NE


This describes the procedure for creating a physical NE on the topology view. After the NE is created, the M2000 obtains the configuration data of the NE by synchronizing the NE.

Prerequisite
l l l

You have logged in to the M2000 client. The mediation applications of accessed NEs are successfully installed. You have obtained the basic information about NEs, such as NE name, IP address of NEs, NE version, and district of NEs. The physical NE communicates properly with the M2000 server.

Context
l

After the RNC is created, it serves as a subnet or an NE. You can use 3.3.4.1 Automatically Searching for NodeBs to view all the NodeBs belonging to the RNC on the physical topology view and the navigation tree. After the IMSOMU is created, it can be both a subnetwork and an NE. By referring to 3.3.4.2 Automatically Searching the Sub-NEs of the IMSOMU, you can display all the sub-NEs of the IMSOMU on the topology view and the navigation tree. After the ASN-GW is created, it serves as a subnet or an NE. You can create a BWA under the ASN-GW subnet. After the MGW is created, you can use 3.6.2.1 Moving an NE into a Group NE to add it to the MSC server. This addition does not change the user authority of the MGW. The M2000 individually manages the BAM servers of three CN NEs, that is, MSC Server, MSCe, and SG7000 servers. These NEs are called third-party servers. The third-party server can only be created manually under the MSC Server, MSCe, and SG7000. The sub-NEs of the IMSOMU are the CSCF, HSS, ATS, RM, CCF, and DOPRA. These sub-NEs cannot be created manually. After creating the IMSOMU, you can deliver the automatic search command. The searched NEs are displayed on the physical topology view.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 In the physical topology navigation tree or on the physical view, right-click the subnet of the NE to be created and choose New > Create Topo Object on the shortcut menu. Step 3 From the navigation tree in the Create topo objects dialog box, select a specific NE node under Single Create.
NOTE

l l

The RNC, MSC Server, ASN-GW, and BSC are also group objects. They can manage NodeBs, MGWs, BWAs, and BTSs in addition to subnets. The physical BTS cannot be manually created. If a BSC is controlled by a BTS, the BTS is automatically created when you synchronize the BSC.

Step 4 In the right part of the window, configure NE-related information.


NOTE

For RNCs, you need set the NE partitions where the NodeBs are located. The NE partitions that can be selected are determined by the M2000 server.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-21

3 Topology Management

M2000 Operator Guide

For information about NEs that need configuring, refer to 3.9.9 Parameters for Creating an NE. Step 5 Click OK. The displayed Create NE Progress dialog box shows the NE creation progress. You can click Detail in the dialog box to view the detailed information about creating a physical NE. After an NE is created, the NE is displayed in the physical topology navigation tree and in the topology view. Step 6 Click Close. Then, the Create NE Progress dialog box is closed. ----End

Result
After the physical NE is created successfully, the system automatically synchronizes the configuration information on the NE.

Related References
3.9.9 Parameters for Creating an NE

3.3.4 Creating Multiple Physical NEs


To reduce the maintenance workload, the M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology at the same time. 3.3.4.1 Automatically Searching for NodeBs This describes how to automatically search for NodeBs. The automatic searching function helps you know information about the NodeBs under an RNC such as the total number of NodeBs under one RNC, the number of NodeBs that connect to the M2000, the number of NEs whose names are duplicate, and the number of NodeBs whose IP addresses are duplicated. 3.3.4.2 Automatically Searching the Sub-NEs of the IMSOMU This task is performed to automatically detect the sub-NEs of the specified IMSOMU on the physical topology view. 3.3.4.3 Exporting an NE Information Template (in .ini Format) When you create NEs in batches, you can apply the format of the .ini file to record information on multiple NEs. The system provides the template for exporting NE information to ensure that the file is in .ini format. You can configure attributes of these NEs according to the items in the template. 3.3.4.4 Exporting an NE Information Template (in .csv Format) When you create NEs in batches, you can apply the format of the .csv file to record information on multiple NEs. The system provides the NE information exporting template to ensure that the file is in .csv format. You can configure attributes of these NEs according to the items in the template. 3.3.4.5 Editing a Script for Creating NEs in Batches (in .ini Format) Before creating physical NEs in batches, you must configure the information about the physical NEs as an .ini file. You can configure the NE information in .ini files according to the value range applied when you create a single physical NEs. If the value is beyond the range, physical NEs cannot be created in batches. 3.3.4.6 Editing a Script for Creating NEs in Batches (in .csv Format)
3-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

To create physical NEs in batches, you need to add the information about all these physical NEs to a .csv file. You can configure the NE information in .csv files according to the value range applied when you create a single physical NE. If the value is beyond the range, physical NEs cannot be created in batches. 3.3.4.7 Creating Physical NEs in Batches To reduce the maintenance workload, M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology view at the same time. 3.3.4.8 Description of the .ini Template Format Used by the Batch NE Creation Script The M2000 provides a standard template for the script files for creating NEs in batches. You need only export the template, and then enter the information of the NEs to be created. Two formats of templates are available: INI and CSV. This part describes the template in .ini format to facilitate the creation of NEs in batches through script files. 3.3.4.9 Description of the .csv Template Format Used by the Batch NE Creation Script The M2000 provides a standard template for the script files for creating NEs in batches. You need only export the template, and then enter the information of the NEs to be created. Two formats of templates are available: INI and CSV. This part describes the template in .csv format to facilitate the creation of NEs in batches through script files.

Automatically Searching for NodeBs


This describes how to automatically search for NodeBs. The automatic searching function helps you know information about the NodeBs under an RNC such as the total number of NodeBs under one RNC, the number of NodeBs that connect to the M2000, the number of NEs whose names are duplicate, and the number of NodeBs whose IP addresses are duplicated.

Prerequisite
l l

You have logged in to the M2000 client. The RNCs are well connected to the M2000 server.

Context
NodeBs can be reparented. Therefore, the NodeBs that need to be deleted are not deleted automatically when they are found automatically. Instead, they are displayed as Disconnected. In this case, you need to determine whether the disconnected NodeBs need to be deleted. For information about how to delete NodeBs, refer to 3.6.9 Deleting a Virtual NE.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 From the topology navigation tree or the topology view, right-click an RNC and choose Search NodeB on the shortcut menu. If the RNCs are disconnected from the M2000 server, Search NodeB becomes dimmed.
NOTE

For the RNCs in the multi-server load-sharing system, you also need to select the NE partition of the NodeB.

----End

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-23

3 Topology Management

M2000 Operator Guide

Result
In the Main Topology window, the system automatically synchronizes the information about the NodeBs managed by a specific RNC, such as the total number of NodeBs under one RNC, the number of NodeBs that connect to the M2000, the number of NEs whose names are duplicate, and the number of NodeBs whose IP addresses are duplicated.

Automatically Searching the Sub-NEs of the IMSOMU


This task is performed to automatically detect the sub-NEs of the specified IMSOMU on the physical topology view.

Prerequisite
If an IMSOMU is connected, this task enables you to automatically detect the sub-NEs of the IMSOMU on the physical topology view or from the navigation tree. These sub-NEs are the CSCF, HSS, ATS, RM, CCF, and DOPRA.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 From the navigation tree or on the physical topology view, select an IMSOMU. Right-click the pane and choose Search IMSOMU NE from the shortcut menu. ----End

Result
The searched IMSOMU sub-NEs are displayed on the physical topology view.

Exporting an NE Information Template (in .ini Format)


When you create NEs in batches, you can apply the format of the .ini file to record information on multiple NEs. The system provides the template for exporting NE information to ensure that the file is in .ini format. You can configure attributes of these NEs according to the items in the template.

Context
l

To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt. The file entrancectrlbycondition.csv is located in \client\style\defaultstyle\conf\omccommon in the installation path of the client. This file contains NENAME and NETYPE. The file bulkCreateNe.txt is installed in \client\style\defaultstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation. Two formats of templates are available for creating NEs in batches: .ini and .csv. To create NEs in batches successfully, you must configure the .ini or .csv file correctly. Group NEs such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS260 0,MEDIAX,IPCTRX) can only be created in batches through the INI template.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-24

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Choose Configuration > Export NE Attribute Template > INI File Format. Step 2 In the Export NE Info Template(.ini) dialog box, select an NE type. Step 3 click to select a path for saving the template.

Step 4 Enter a name for saving the .ini file, and then click Save to return to Export NE Information template(INI file format) dialog box. Step 5 Click Confirm to export the .ini file template for creating NEs in batches. The Message dialog box is displayed, showing that the template is exported successfully. Step 6 Click OK to close the Message dialog box. ----End

Related Tasks
3.3.4.5 Editing a Script for Creating NEs in Batches (in .ini Format)

Related References
3.3.4.8 Description of the .ini Template Format Used by the Batch NE Creation Script 3.9.8 Parameters for Exporting an NE Information Template (in .ini Format)

Exporting an NE Information Template (in .csv Format)


When you create NEs in batches, you can apply the format of the .csv file to record information on multiple NEs. The system provides the NE information exporting template to ensure that the file is in .csv format. You can configure attributes of these NEs according to the items in the template.

Context
l

To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt. The file entrancectrlbycondition.csv is located in \client\style\productstyle\conf\omccommon in the installation path of the client. This file contains NENAME and NETYPE. The file bulkCreateNe.txt is installed in \client\style\productstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation. Two formats of templates are available for creating NEs in batches: .ini and .csv. To create NEs in batches successfully, you must configure the .ini or .csv file correctly. Group NEs such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS260 0,MEDIAX,IPCTRX) can only be created in batches through the INI template. The NodeB supports two IP addresses. Therefore, the NodeB template is different from those of other NEs.

Procedure
Step 1 Choose Configuration > Export NE Attribute Template > CSV File Format.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-25

3 Topology Management

M2000 Operator Guide

Step 2 In the Export NE Info template(CSV file format) dialog box, select Template Type. Step 3 Click to set the path for saving files.

Step 4 Enter a name for saving the .csv file, and then click Save to return to Export NE Information Template(.csv) dialog box. Step 5 Click Confirm to export the .csv file template for creating NEs in batch. The Message dialog box is displayed, showing that the template is exported successfully. Step 6 Click OK to close the Message dialog box. ----End

Related Tasks
3.3.4.6 Editing a Script for Creating NEs in Batches (in .csv Format)

Related References
3.3.4.9 Description of the .csv Template Format Used by the Batch NE Creation Script

Editing a Script for Creating NEs in Batches (in .ini Format)


Before creating physical NEs in batches, you must configure the information about the physical NEs as an .ini file. You can configure the NE information in .ini files according to the value range applied when you create a single physical NEs. If the value is beyond the range, physical NEs cannot be created in batches.

Prerequisite
l l

You have obtained the NE type, NE IP address, and district area. You have exported the NE information template through 3.3.4.3 Exporting an NE Information Template (in .ini Format).

Context
l l

This operation does not support virtual NEs. To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt. The file entrancectrlbycondition.csv is located in \client\style\productstyle\conf\omccommon in the installation path of the client. This file contains NENAME and NETYPE. The file bulkCreateNe.txt is installed in \client\style\productstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation. Group NEs such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS260 0,MEDIAX,IPCTRX) can only be created in batches through the INI template. For information about the value range of each NE parameter when you create a physical NE, refer to 3.9.9 Parameters for Creating an NE and 3.9.4 Parameters for Creating an IP Device.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-26

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Use Notepad delivered with the operating system to open the NE information template. Step 2 Enter the NE name, NE version, and district. ----End

Related Tasks
3.3.4.3 Exporting an NE Information Template (in .ini Format)

Related References
3.3.4.8 Description of the .ini Template Format Used by the Batch NE Creation Script

Editing a Script for Creating NEs in Batches (in .csv Format)


To create physical NEs in batches, you need to add the information about all these physical NEs to a .csv file. You can configure the NE information in .csv files according to the value range applied when you create a single physical NE. If the value is beyond the range, physical NEs cannot be created in batches.

Prerequisite
l l

You have obtained the NE type, NE IP address, and district area. You have exported the NE information template through 3.3.4.4 Exporting an NE Information Template (in .csv Format).

Context
l l

This operation does not support virtual NEs. To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt. The file entrancectrlbycondition.csv is located in \client\style\productstyle\conf\omccommon in the installation path of the client. This file contains NENAME and NETYPE. The file bulkCreateNe.txt is installed in \client\style\productstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation. The script file in .csv format can be used to create physical NEs in batches. It cannot be used to create group NEs, such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS260 0,MEDIAX,IPCTRX). For information about the value range of each NE parameter when you singly create physical NEs, refer to 3.9.9 Parameters for Creating an NE. The NodeB supports two IP addresses. Therefore, the template for creating NodeBs is different from those of other NEs. You need to use the NodeB template when creating NodeBs. As the separator of columns, commas are not allowed in each cell of the .csv file.
TIP

It is recommended that you use the Microsoft Excel to edit .csv files.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-27

3 Topology Management

M2000 Operator Guide

Procedure
Step 1 Open the exported NE information template.
NOTE

Use a NodeB template when creating NodeBs.

Step 2 Enter the NE information such as the NE type, NE name, NE version, and home administration region. ----End

Related Tasks
3.3.4.4 Exporting an NE Information Template (in .csv Format)

Related References
3.3.4.9 Description of the .csv Template Format Used by the Batch NE Creation Script

Creating Physical NEs in Batches


To reduce the maintenance workload, M2000 provides the function of creating physical NEs in batches. You can create multiple physical NEs on the topology view at the same time.

Prerequisite
l l l

You have logged in to the M2000 client. The mediation software of the NE to be created is successfully installed. The script in .csv or .ini format used for creating NEs in batches is available.

Context
l l

The M2000 does not support the batch creation of virtual NEs. To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt. The file entrancectrlbycondition.csv is located in \client\style\productstyle\conf\omccommon in the installation path of the client. This file contains NENAME and NETYPE. The file bulkCreateNe.txt is installed in \client\style\productstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation. Two formats of templates are available for creating NEs in batches: .ini and .csv. The script files in .csv format do not support the bulk creation of group NEs such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS260 0,MEDIAX,IPCTRX).

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 In the physical topology navigation tree or on the physical view, right-click the subnet of the NE to be created and choose New > Create Topo Object on the shortcut menu.
3-28 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

CAUTION
If the type of the new NE is NodeB, a virtual or physical RNC is selected as the subnet where the new NE is located. If the type of the new NE is BWA, a virtual or physical ASN-GW is selected as the subnet where the new NE is located. Step 3 Select the NE node under the Bulk Create node from the navigation tree of the Create topo objects dialog box. Step 4 In the right part, click and select the NE configuration script file.

Step 5 Click Verify to check the configuration of the script file. For errors, modify them according to 3.3.4.6 Editing a Script for Creating NEs in Batches (in .csv Format) or 3.3.4.5 Editing a Script for Creating NEs in Batches (in .ini Format). Step 6 Click OK to start creating NEs. The Create NE Progress prompt box is displayed, showing the progress of NE creation and results. Step 7 Click Close. Then, the Create NE Progress dialog box is closed. ----End

Result
After creating a physical NE successfully, the system performs NE synchronization automatically to obtain configuration data from this NE. If synchronized successfully, the NE is displayed in the specified position on the topology view and is in the Being Synchronized . If the network connection between the M2000 and this physical state, as shown by the icon NE is abnormal, the NE can also be displayed in the designated position on the topology view, but the NE is in the disconnection state, as shown by the icon .

Related References
3.9.10 Parameters for Batch Creating Physical NEs

Description of the .ini Template Format Used by the Batch NE Creation Script
The M2000 provides a standard template for the script files for creating NEs in batches. You need only export the template, and then enter the information of the NEs to be created. Two formats of templates are available: INI and CSV. This part describes the template in .ini format to facilitate the creation of NEs in batches through script files.

Format Description
The templates in INI format apply to create all types of NEs in batches except virtual NEs. Use the notepad to edit the templates in the INI format. Different from the CSV templates, the INI templates apply to different parameter groups. You can configure the NE information in .ini files according to the value range applied when you create a single physical NEs. If the value is beyond the range, physical NEs cannot be created in batches. For details about the value range of parameters for each NE, refer to 3.9.9 Parameters for Creating an NE and 3.9.4 Parameters
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-29

3 Topology Management

M2000 Operator Guide

for Creating an IP Device. For details about the basic configuration information of each NE, refer to 3.3.2 Basic NE information.

CAUTION
If several NEs of the same category are created, you need to provide the associated parameter groups. The ID of NE types should be duplicate. For instance, when several RNCs are created, the [RNC] at the beginning of the configuration information should be duplicate to identify the NE type for each RNC in the .ini template. Do not configure the information on several RNCs under one [RNC].

Instances of Creating NE Configuration Information in Batches


[RNC] Name = RNC_1 Vendor = Huawei Physical Location = A Zone District = Beijing City IP Address = 10.161.170.22 Description = NE of A Zone subarea = osssvr-1 nodebsubarea =osssvr-1 pos X = 153 pos Y = 141 longitude = latitude = [RNC] Name = RNC_2 Vendor = Huawei Physical Location = B Zone District = Beijing City IP Address = 10.71.36.40 Description = NE of B Zone subarea =osssvr-2 nodebsubarea =osssvr-2 pos X = 113 pos Y = 105 longitude = latitude = [MGW] Name = MGW_A Vendor = Huawei Physical Location = A Zone District = Beijing City IP Address = 10.161.118.23 Description = NE of A Zone subarea =osssvr-2 pos X = 407 pos Y = 220 longitude = latitude =

Related Tasks
3.3.4.3 Exporting an NE Information Template (in .ini Format) 3.3.4.5 Editing a Script for Creating NEs in Batches (in .ini Format)

Description of the .csv Template Format Used by the Batch NE Creation Script
The M2000 provides a standard template for the script files for creating NEs in batches. You need only export the template, and then enter the information of the NEs to be created. Two formats of templates are available: INI and CSV. This part describes the template in .csv format to facilitate the creation of NEs in batches through script files.

Format Description
The script file in .csv format can be used to create physical NEs in batches. It cannot be used to create group NEs, such as RAC, RNC, BSC, GT800BSC, BSC6000, CBSC, and IMS (IMSOMU,CSCF,HSS,ATS,RM,CCF,DOPRA,SBC,MRF,MRFC,MRFP,CSE,OMS2600,ME DIAX,IPCTRX). To determine whether an NE supports bulk creation, you can compare the NETYPE in the file entrancectrl-bycondition.csv and the file bulkCreateNe.txt.
l

The file entrancectrl-bycondition.csv is located in \client\style\productstyle\conf \omccommon in the installation path of the client. This file contains NENAME and NETYPE.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-30

M2000 Operator Guide


l

3 Topology Management

The file bulkCreateNe.txt is installed in \client\style\productstyle\conf\omccm in the installation path of the client. This file contains the NETYPE of the NEs that support batch creation.

The system can create NEs in batches only when you conform to the value range of parameters for each NE. For details about the value range of parameters for each NE, refer to 3.9.9 Parameters for Creating an NE. For details about the basic configuration information of each NE, refer to 3.3.2 Basic NE information.

Example of the CSV Template


Use the Microsoft Excel to edit the templates in the CSV format. All the NEs except NodeB use the common templates, as shown in Figure 3-1. Figure 3-1 An example of CSV templates

NOTE

NodeB templates have two IP addresses: ATM network IP address and IP bearer network IP address. Other parameters are the same as the common template.

Related Tasks
3.3.4.4 Exporting an NE Information Template (in .csv Format) 3.3.4.6 Editing a Script for Creating NEs in Batches (in .csv Format)

3.4 Managing SNMP Parameter Templates


The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. The template types consist of SNMPV1, SNMPV2c, and SNMPV3. By managing SNMP parameter templates, you can browse the detailed information on the existing templates on the current server. In addition, you can add, modify, and delete the templates. 3.4.1 Creating SNMP Parameter Templates The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. You can create the required templates. 3.4.2 Modifying SNMP Parameter Templates The SNMP parameter templates are used to save the parameters typed. Thus, the parameters are easy to import when the SNMPs are created. You can modify the SNMP parameter templates when the created SNMP parameter templates are outdated or incorrect. 3.4.3 Deleting SNMP Parameter Templates The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. For the created SNMP parameter templates, you can delete unneeded templates.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-31

3 Topology Management

M2000 Operator Guide

3.4.1 Creating SNMP Parameter Templates


The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. You can create the required templates.

Procedure
Step 1 Choose Configuration > SNMP Template Management to open the Template Management dialog box. Step 2 Select the template type to be created from the Protocol Version navigation tree and click Add. Step 3 Configure parameters in the displayed Template Parameter. For details of configuring parameters, refer to 3.9.15 Parameters for SNMP Parameter Templates. Step 4 Click OK or Apply. The added parameter template is displayed in the right window of the Template Parameter Management dialog box. ----End

Related References
3.9.15 Parameters for SNMP Parameter Templates

3.4.2 Modifying SNMP Parameter Templates


The SNMP parameter templates are used to save the parameters typed. Thus, the parameters are easy to import when the SNMPs are created. You can modify the SNMP parameter templates when the created SNMP parameter templates are outdated or incorrect.

Prerequisite
The SNMP parameter templates are already created.

Procedure
Step 1 Choose Configuration > SNMP Template Management to open the Template Management dialog box. Step 2 Select the template types to be modified from the Protocol Version navigation tree and select the parameter templates to be modified on the right of the window. Step 3 Double-click the parameter templates or click Modify to open the Template Parameter dialog box. Step 4 Modify parameters in Template Parameter. For details about modifying parameters, refer to 3.9.15 Parameters for SNMP Parameter Templates. Step 5 Click OK. The latest parameter template is displayed in the right window of the Template Parameter Management. ----End
3-32 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Related References
3.9.15 Parameters for SNMP Parameter Templates

3.4.3 Deleting SNMP Parameter Templates


The SNMP parameter templates are used to save the parameters typed by users. Thus, the parameters are easy to import when the SNMPs are created. For the created SNMP parameter templates, you can delete unneeded templates.

Prerequisite
The SNMP parameter templates are already created.

Procedure
Step 1 Choose Configuration > SNMP Template Management to open the Template Management dialog box. Step 2 Select the template type to be deleted from the Protocol Version navigation tree and select the parameter templates to be deleted on the right of the window. Step 3 Click Delete. Step 4 Click OK in the displayed Confirmation prompt box. ----End

3.5 Monitoring NEs


You can monitor the alarm status and connection status on the NEs. By monitoring NEs, you can detect and solve the abnormalities in real time. 3.5.1 Monitoring NE Status You can monitor the NE status to view the name, type, and status of the NEs that are managed by the M2000 so that you can know the running status of the NEs and solve the abnormalities in time. 3.5.2 Allowing Reconnection to an NE When an NE is disconnected with the M2000 server, you can specify whether the M2000 server automatically connects the NE. There are two connection states: Enable Connection and Disable Connection. 3.5.3 Manually Reconnecting an NE You can reconnect an NE manually when the NE is disconnected from the M2000 server.

3.5.1 Monitoring NE Status


You can monitor the NE status to view the name, type, and status of the NEs that are managed by the M2000 so that you can know the running status of the NEs and solve the abnormalities in time.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-33

3 Topology Management

M2000 Operator Guide

Context
l

You can right-click an NE in the system monitor and browse window, and then choose Topology Location to view the topology view of the NE. You can right-click in the system monitor and browse window, and then choose Refresh to refresh the current window.

Procedure
Step 1 Choose Monitor > System Monitor > Monitor Browser . Step 2 In the System Monitor Browser window, click the NE Monitor tab to view the NEs that are managed by the M2000. Step 3 Optional: Click Filter. Select NE Type and Alarm Status. Click OK. The information on the NEs that matches the filter conditions are displayed in the table. Step 4 Optional: Click Save As. The monitoring data is saved to the local disk. ----End

Related References
3.9.11 Parameters for Monitoring the Status of an NE

3.5.2 Allowing Reconnection to an NE


When an NE is disconnected with the M2000 server, you can specify whether the M2000 server automatically connects the NE. There are two connection states: Enable Connection and Disable Connection.

Context
There are two NE reconnection states:
l

Enable Connection: When the communication between an NE and the M2000 server is disconnected, the M2000 attempts to reconnect the NE. By default, the connection state of a newly added NE is Enable Connection. Disable Connection: When the communication between an NE and the M2000 is disconnected, the M2000 does not attempt to reconnect the NE.

The set connection state is maintained even after you restarts the system.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 In the navigation tree or on the topology view, select an NE and set a reconnection state.

3-34

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Menu Item

Result

Enable connect NE The connection is enabled between the M2000 server and an NE. When disconnected , the M2000 server automatically reconnect the NE. At the same time, the disabling connection icon disappears. If the connection succeeds, the disconnection icon disappears. Disable connect NE An NE is disconnected from the M2000 server. The reconnection function between the M2000 server and the NE is disabled. At the same time, the NE is labeled with the disconnection icon and the disabling connection icon .

NOTE

The menu displayed after you right-click an NE varies with the change of the reconnection status. If you right-click an NE in the Enable Connection state, the displayed menu shows the Disable connect NE option. If you right-click an NE in the Disable Connection state, the displayed menu shows the Enable connect NE option.

Step 3 Click Yes in the displayed Confirm dialog box. A dialog box is displayed, showing the operation results and progress. Step 4 Click Close. ----End

3.5.3 Manually Reconnecting an NE


You can reconnect an NE manually when the NE is disconnected from the M2000 server.

Context
NodeBs may be in the disconnected state because they are deleted or reparented. Therefore, you need to determine the reason why the NodeBs are disconnected before performing the related operation such as deleting, reconnecting, and waiting for the NodeBs to be reparented.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 On the physical topology view, select an NE with the Disconnected icon . Step 3 Right-click the NE, and select Reconnect. The disconnected icon is removed when the NE is reconnected to the server. ----End

3.6 Adjusting the Network Topology


After creating a subnet, NE, or link, you can adjust the network topology as required. Adjusting the network topology involves modifying and deleting a subnet, NE, or link. 3.6.1 Searching for Topology Objects
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-35

3 Topology Management

M2000 Operator Guide

You can search for and identify the specific NEs, links, link sets, and subnets in the topology. 3.6.2 Adjusting the Position of an NE This task is performed to adjust the position of an NE. For example, you can move an NE to a group object or other subnets and adjust its position in the subnet. 3.6.3 Moving a NodeB To re-parent NodeBs, the RNC sends a command about deleting NodeBs and then a command about creating NodeBs to the M2000. Upon receiving the command of NodeB deletion, the M2000 closes the connection with the physical NodeBs rather than directly deleting the NodeBs. In this way, you can determine the binding relation between the NodeBs before and after the reparenting, thus avoiding the loss of alarm and performance data. 3.6.4 Viewing/Modifying the Basic Attributes of a Subnet After creating a physical subnet, you can view and modify the attributes of the physical subnet, such as the name, object, and background. 3.6.5 Viewing/Modifying NE Properties After creating a physical or virtual NE, you can view or modify the basic attributes as required. 3.6.6 Viewing/Modifying a Physical Link On the physical topology view, you can view the basic information on physical links. In addition, you can set conditions to view the details about a physical link. This function does not apply to virtual links. After a physical link is set up, you can modify only the name of the link. 3.6.7 Viewing/Modifying a Virtual Link After a virtual link is set up, you can view and modify the name and other information on the virtual link. 3.6.8 Deleting Subnets You can delete the physical subnets or logical subnets that are no longer needed. 3.6.9 Deleting a Virtual NE When the topology is adjusted and a virtual NE is removed from the topology, you need to delete the virtual NE from the topology view. 3.6.10 Deleting Physical NEs in Batches You can delete multiple physical NEs from the physical topology view at a time. 3.6.11 Deleting a Physical Link After a physical link is set up, you can remove it manually. At the same time, the network structure is refreshed. 3.6.12 Deleting a Virtual Link A virtual link indicates that two NEs (including physical NE and virtual NE) communicate with each other. You can delete the link. 3.6.13 Refreshing a Topology View You can perform this operation to refresh the status of an object such as an NE and a link in the topology view.

3.6.1 Searching for Topology Objects


You can search for and identify the specific NEs, links, link sets, and subnets in the topology.

3-36

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Context
l

In the Search Content text box, you can enter the key words containing the wildcard (*) to perform a fuzzy search. In the Search Results list, click a record. The object related to the record is located in the topology view.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 On the toolbar, click .

Step 3 In Search Type, select the type of the searched objects. Step 4 In Search Content, enter the keywords for search. Step 5 In Search Scope, set the range for search.
NOTE

l l l

Search sublayer: If you select this item, you can search the path and the subpath specified in Search Scope. Case sensitive: If this check box is selected, it is case sensitive in the search operation. Match whole word only: If this check box is selected, only the results that exactly meet the conditions are to be displayed.

Step 6 Click Search. The Search Results list displays all the found records. ----End

3.6.2 Adjusting the Position of an NE


This task is performed to adjust the position of an NE. For example, you can move an NE to a group object or other subnets and adjust its position in the subnet. 3.6.2.1 Moving an NE into a Group NE On the topology view, you can move one or multiple NEs to a group NE which is logically associated with the NE or NEs. For example, you can move a NodeB into the RNC that manages the NodeB. Group NEs refer to NEs which can also act as subnets, such as RNC, ASN-GW and MSC Server. 3.6.2.2 Moving an NE into Another Subnet On the topology view, you can move one or more NEs into another subnet to facilitate the management. 3.6.2.3 Moving an NE Within a Subnet On the topology view, you can move an NE to other locations within its subnet, thus locating the NE correctly and facilitating NE management. This operation changes only the physical location on the topology view and has no effect on the actual situation.

Moving an NE into a Group NE


On the topology view, you can move one or multiple NEs to a group NE which is logically associated with the NE or NEs. For example, you can move a NodeB into the RNC that manages
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-37

3 Topology Management

M2000 Operator Guide

the NodeB. Group NEs refer to NEs which can also act as subnets, such as RNC, ASN-GW and MSC Server.

Prerequisite
l l

You have logged in to the M2000 client. The NE to be moved is located in the same subnet as the group NE.

Context
This operation supports the MGW, NodeB, BWA, ASN-GW, RNC and MSC Server. Moving an NE into a group NE changes only the dependency relationship on the topology view, and has no effect on the actual situation.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 On the topology view, select the group NE that the NE is to be moved into. Step 3 Right-click the group NE and select Property from the shortcut menu. The NE Property dialog box is displayed. Step 4 Click the Object Selection tab as shown in Figure 3-2. Figure 3-2 NE Property

3-38

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Step 5 Select the NE to be moved into the group NE in the Available Objects list. Click Then the NE is added to the Selected Objects list.
TIP

You can select multiple NEs at the same time.

Step 6 Click OK. The Message dialog box is displayed, showing the operation results. Step 7 Click OK to close the Message dialog box. ----End

Moving an NE into Another Subnet


On the topology view, you can move one or more NEs into another subnet to facilitate the management.

Prerequisite
You have logged in to the M2000 client.

Context
All network devices support this operation. Moving an NE into another subnet changes only the dependency relationship on the topology view and has no effect on the actual situation.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Determine the relationship between the NE and the subnet. Relationship Between NE and Subnet Then...

The NE and the subnet are located in different level of network hierarchy Go to Step 3. on the navigation tree. The NE and the subnet are located in the same level of network hierarchy Go to Step 4. on the navigation tree. Step 3 Move the NE to the network level of the subnet.
l

If the NE is located in the first network level under the Physical Root node while the subnet to be moved into is located in the first network level, perform the following steps: 1. 2. 3. In the topology view, select the subnet of the subnet to be moved into. Right-click the subnet and select Modify from the shortcut menu. the Modify Physical Subnet dialog box is displayed. Click the Object Selection tab.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-39

Issue 06 (2008-12-16)

3 Topology Management

M2000 Operator Guide

4. 5.
l

Select the NE to be moved into the group NE in the Available Objects list. Click . Then the NE is added to the Selected Objects list. If the subnet is located in the third or higher network level, repeat operation a to operation d till the NE is moved to the same network level with the subnet.

If the NE is located in the second network level under the Physical Root node while the subnet to be moved into is located in the first network level, perform the following steps: 1. 2. 3. 4. 5. In the topology view, select the subnet of the NE to be moved out. Right-click the subnet and select Modify from the shortcut menu. the Modify Physical Subnet dialog box is displayed. Click the Object Selection tab. Select the NE to be moved out of the NE group in the Selected Objects list. Click . Then the NE is added to the Available Objects list. If the subnet is located in the third or higher network level, repeat operation a to operation d till the NE is moved to the same network level with the subnet.

If both the NE and the subnet are located in the second or higher level of the Physical Root node, perform the previous steps till the NE is located in the same network level with the subnet to be moved into.

Step 4 Move the NE to the corresponding subnet. 1. 2. 3. 4. In the topology view, select the subnet to be moved into. Right-click the subnet and select Modify from the shortcut menu. the Modify Physical Subnet dialog box is displayed. Click the Object Selection tab. Select the NE to be moved into the group NE in the Available Objects list. Click . Then the NE is added to the Selected Objects list. You can select multiple NEs. Step 5 Click OK. ----End

Moving an NE Within a Subnet


On the topology view, you can move an NE to other locations within its subnet, thus locating the NE correctly and facilitating NE management. This operation changes only the physical location on the topology view and has no effect on the actual situation.

Prerequisite
l l

You have logged in to the M2000 client. The NE is created.

Context
All network devices support this operation.
3-40 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Select an NE on the topology view. Step 3 Drag the NE to the target location. Step 4 Click the icon ----End on the toolbar to save the new location.

3.6.3 Moving a NodeB


To re-parent NodeBs, the RNC sends a command about deleting NodeBs and then a command about creating NodeBs to the M2000. Upon receiving the command of NodeB deletion, the M2000 closes the connection with the physical NodeBs rather than directly deleting the NodeBs. In this way, you can determine the binding relation between the NodeBs before and after the reparenting, thus avoiding the loss of alarm and performance data. 3.6.3.1 Moving a NodeB in the Same RNC This describes how to move a NodeB in the same RNC. The binding relation can be automatically identified or manually specified. 3.6.3.2 Moving a NodeB to Another RNC This describes how to manually specify the binding relation between the NodeBs before and after re-parenting so that the NodeB can be moved to another RNC.

Related References
3.9.16 Parameters for Moving a NodeB 3.9.2 Interface Description: Moving a NodeB

Moving a NodeB in the Same RNC


This describes how to move a NodeB in the same RNC. The binding relation can be automatically identified or manually specified.

Prerequisite
l l

You have logged in to the M2000 client. You have the right to operate the related NEs.

Context
Figure 3-3 shows the process for moving a NodeB in the same RNC.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-41

3 Topology Management

M2000 Operator Guide

Figure 3-3 Process for moving a NodeB in the same RNC

The process for moving a NodeB to another RNC shown in Figure 3-3 is as follows: 1. 2. 3. 4. The RNC sends a command about deleting the NodeB to the M2000. The M2000 closes the connection with the NodeB (hereinafter referred to as A). After the NodeB is re-parented, the RNC sends a command about creating a NodeB to the M2000. The M2000 searches for the NE with the same NodeBID. If an NE with the same NodeBID is found, you can infer that the created NodeB is the reparented one. Then the system updates the information about the existing NodeB with the created NodeB. If no such a NodeB is found, the M2000 automatically searches for NodeBs and creates a new NodeB (hereinafter referred to as A'). Then you can specify the binding relation through the NodeB re-parenting tool. At the same time, the system deletes A'. 5. After the re-parenting, the state of A changes to connected.

Procedure
Step 1 Double-click omcNodebmove.bat under M2000 client installation directory\client\bin to view the Login dialog box.
3-42 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

By default, the M2000 client is installed in the path C:\iManagerM2000Client. Step 2 Enter the user name, password, and IP address of the M2000 server. Then, click OK. Step 3 Select the related NodeBs in the NodeB Re-parent navigation trees. Then, click Add Bind(s).
l l

After being bound, the NodeB turns blue in color and the node name is added binded. A binding record is added to the result table. You can select one or more binding records and click Remove Bind(s) to remove the binding relation. You can repeat Step 3 to specify multiple binding relations for bulk re-parenting.

Step 4 Click Confirm Move. The system automatically updates the information about A with the information about A', including NodeID and the relation with the RNC, and then deletes A'. After that, A is automatically connected to the system.
NOTE

A' is the logical representation of A. The IP address, belonged RNC, and sometimes the configuration information of A' are changed after the re-parenting. You need to synchronize the information about A with the information about A'. Then after the synchronization, the system deletes the logical NE A'.

Step 5 Click Close. Step 6 In the displayed Confirm dialog box, click OK. ----End

Result
After the NodeB is moved in the same RNC, the progress bar in the NodeB Re-parent dialog box displays 100%. You can view the result in Operation Result.

Related References
3.9.16 Parameters for Moving a NodeB 3.9.2 Interface Description: Moving a NodeB

Moving a NodeB to Another RNC


This describes how to manually specify the binding relation between the NodeBs before and after re-parenting so that the NodeB can be moved to another RNC.

Prerequisite
l l

You have logged in to the M2000 client. You have the right to operate the related NEs.

Context
Figure 3-4 shows the process for moving a NodeB to another RNC.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-43

3 Topology Management

M2000 Operator Guide

Figure 3-4 Process for moving a NodeB to another RNC

The process for moving a NodeB to another RNC shown in Figure 3-4 is as follows: 1. 2. 3. 4. The RNC sends a command about deleting the NodeB to the M2000. The M2000 closes the connection with the NodeB (hereinafter referred to as A). After the NodeB is re-parented, the RNC to which the NodeB is moved sends a command about creating a NodeB to the M2000. The M2000 automatically searches for the NodeB and then creates a new NodeB (hereinafter referred to as A'). After A is re-parented, it is displayed as A' and its state changes to disconnected. A' is automatically found by the M2000 and regarded as a new NE.

CAUTION
The IP addresses of NEs of the same type must be unique on the M2000. Therefore, the IP address of a NodeB must be changed after it is moved to another RNC. The conflict caused by identical IP addresses may result in the failure to create a new NodeB. The System Output Window may display error. In this case, you need to manually change the IP address of the NodeB and then enable the M2000 to automatically search for the NodeB. 5. The user specifies the binding relation between A and A' by using the NodeB re-parenting tool. The system automatically updates the information about A, that is, NodeBID and the relation with the RNC, with the information about A', and then deletes A'.
3-44 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

3 Topology Management

A' is the logical representation of A. The IP address, belonged RNC, and sometimes the configuration information of A' are changed after the re-parenting. You need to synchronize the information about A with the information about A'. Then after the synchronization, the system deletes the logical NE A'.

6.

After the re-parenting, the state of A changes to connected.

Procedure
Step 1 Double-click omcNodebmove.bat under M2000 client installation directory\client\bin to view the Login dialog box. By default, the M2000 client is installed in the path C:\iManagerM2000Client. Step 2 Enter the user name, password, and IP address of the M2000 server. Then, click OK. Step 3 Select the related NodeBs in the NodeB Re-parent navigation trees. Then, click Add Bind(s).
l l

After being bound, the NodeB turns blue in color and the node name is added binded. A binding record is added to the result table. You can select one or more binding records and click Remove Bind(s) to remove the binding relation. You can repeat Step 3 to specify multiple binding relations for bulk re-parenting.

Step 4 Click Confirm Move. The system automatically updates the information about A with the information about A', including NodeID and the relation with the RNC, and then deletes A'. After that, A is automatically connected to the system. Step 5 Click Close. Step 6 In the displayed Confirm dialog box, click OK. ----End

Result
After the NodeB is moved to another RNC, the progress bar in the NodeB Re-parent dialog box displays 100%. You can view the result in Operation Result.

Related References
3.9.16 Parameters for Moving a NodeB 3.9.2 Interface Description: Moving a NodeB

3.6.4 Viewing/Modifying the Basic Attributes of a Subnet


After creating a physical subnet, you can view and modify the attributes of the physical subnet, such as the name, object, and background.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-45

3 Topology Management

M2000 Operator Guide

Context

CAUTION
l l

Do not modify the coordinate of the ROOT node in the physical topology. The size of the background picture must be less than 1 MB.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 In the physical topology navigation tree or on the physical topology view, select the subnet to be modified. Right-click the subnet and choose Modify to view the Modify Physical Subnet dialog box. Step 3 Select the corresponding tab and then view and modify the basic attributes of the subnet. Tab Basic Attribute Operation View and set the name, coordinate, background, and remarks.

Object Selection Deselected objects are listed in the left part of the tab and selected objects are listed in the right part of the tab. To set objects included in a subnet, click Step 4 Click OK. ----End or .

Related References
3.9.12 Parameters for Viewing/Modifying the Basic Attributes of a Subnet

3.6.5 Viewing/Modifying NE Properties


After creating a physical or virtual NE, you can view or modify the basic attributes as required.

Context
l

If you have modified the IP address of the NE, the system automatically reconnects the NE through the new IP address. To save the NE location information, drag the NE to the specified location and then click on the topology toolbar.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Right-click an NE on the navigation tree or topology view, and choose Property from the shortcut menu, then you can view or modify the information.
3-46 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

CAUTION
The information on a physical BTS cannot be modified. Step 3 Click OK. ----End

3.6.6 Viewing/Modifying a Physical Link


On the physical topology view, you can view the basic information on physical links. In addition, you can set conditions to view the details about a physical link. This function does not apply to virtual links. After a physical link is set up, you can modify only the name of the link.

Procedure
Step 1 Select a physical link. 1. Open the Link Browser window by using either of the following ways: Method Method 1 Operation a. Choose Topology > Main Topology. The Main Topology window is displayed. b. On the physical topology view, double-click a physical link or a physical link set. In the displayed information box, right-click a link and choose Query Link Information on the shortcut menu. c. Click Filter. Method 2 2. a. Choose Configuration > Link Browser.

Select one or more NEs in the End A NE and End Z NE fields respectively.
l

If you do not select NEs for either end, this function displays the information about all the available physical links. If you select NEs for only one end, this function displays the information about all the available physical links with the ends as the specified NEs.

3.

Click Query. The links that satisfy the conditions are shown in the list.

Step 2 Modify the physical link. 1. 2. 3. 4. Select a link from the displayed link list. Right-click the link, and then choose the Modify menu item or click Modify to view the Change Link Name dialog box. Type the name of the link, and then click OK. A prompt box is displayed, showing the operation results. Click OK to close the prompt box.

----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-47

3 Topology Management

M2000 Operator Guide

Related References
3.9.5 Parameters for Physical Link

3.6.7 Viewing/Modifying a Virtual Link


After a virtual link is set up, you can view and modify the name and other information on the virtual link.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 On the physical topology view, double-click a virtual link or a virtual link set. You can also right-click and choose Display on the shortcut menu. Step 3 Check the information about the virtual link in the displayed information box. Step 4 Right-click a virtual link and choose Modify on the shortcut-menu. The Modify Virtual Link dialog box is displayed.
NOTE

For a signal virtual link, you can right-click it directly on the topology view and choose Modify. The Modify Virtual Link dialog box is displayed.

Step 5 In the Modify Virtual Link table, modify the virtual link attributes.

CAUTION
l l

You can modify the name and remarks of a virtual link. After a virtual link is created, three attributes, that is type, End A NEs, and End Z NEs cannot be modified.

Step 6 Click OK. ----End

Related References
3.9.6 Parameters for Setting a Virtual Link

3.6.8 Deleting Subnets


You can delete the physical subnets or logical subnets that are no longer needed.

Context
l l

The root nodes in the navigation tree cannot be deleted. When a subnet is deleted, the elements in the subnet are not deleted. They are moved to the upper subnet. The IMSOMU is an exception. When deleting an IMSOMU, you must perform association deletion to delete all the subnets belonging to the IMSOMU. When a subnet is deleted, the elements in the subnet are not deleted. They are moved to the upper subnet.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-48

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the navigation tree or topology view, right-click a subnet and choose Delete. Step 3 In the Confirm dialog box, click Yes. ----End

3.6.9 Deleting a Virtual NE


When the topology is adjusted and a virtual NE is removed from the topology, you need to delete the virtual NE from the topology view.

Context
You can delete the virtual NE in the physical view, or electronic view. You cannot delete the virtual NE in the custom view. This section describes how to delete the virtual NE in the physical view. In the custom topology, you cannot delete a virtual NE.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the navigation tree or the view, right-click a virtual NE and choose Delete. Step 3 Click Yes. ----End

3.6.10 Deleting Physical NEs in Batches


You can delete multiple physical NEs from the physical topology view at a time.

Context
The CSCF, HSS, ATS, RM, CCF and DOPRA do not support batch deletion.
NOTE

Do not perform the batch deletion when a subnet is selected.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Press Ctrl to select multiple physical NEs from the physical topology navigation tree or the physical topology view. Step 3 Right-click the selected NEs, and then choose Delete NEs in batch. Step 4 In the displayed Confirm dialog box, click Yes. The Delete NE prompt box is displayed, showing the deleting progress and operation results. Step 5 Click Close to close the Delete NE prompt box. ----End
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-49

3 Topology Management

M2000 Operator Guide

Result
The system deletes the information related to the NEs in the database.

3.6.11 Deleting a Physical Link


After a physical link is set up, you can remove it manually. At the same time, the network structure is refreshed.

Context

CAUTION
Do not remove the physical links that the are automatically set up by the system. The physical links are automatically refreshed according to the connection status between NEs.

Procedure
Step 1 Choose Configuration > Link Browser to view the Link Browser window. Step 2 Set conditions for querying the links you want to remove. Step 3 In the displayed link list, select one or more links. Step 4 Right-click the Delete option or click Delete in the dialog box. Step 5 In the displayed dialog box, click Yes. The Operation Progress prompt box is displayed, showing the deletion progress and operation results. Step 6 Click Close to close the Operation Progress prompt box. ----End

Related References
3.9.5 Parameters for Physical Link

3.6.12 Deleting a Virtual Link


A virtual link indicates that two NEs (including physical NE and virtual NE) communicate with each other. You can delete the link.

Context
l l

When a virtual link is deleted, the corresponding physical link is not deleted. You can delete the virtual link in the physical view, electronic view, or machine view. You cannot delete the virtual link in the custom view. This section describes how to delete the virtual link in the physical view.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

3-50

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the physical view, right-click a virtual link and choose Delete. Step 3 In the Confirm dialog box, click Yes. ----End

Related References
3.9.6 Parameters for Setting a Virtual Link

3.6.13 Refreshing a Topology View


You can perform this operation to refresh the status of an object such as an NE and a link in the topology view.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 On the toolbar of the topology view, click .

The status of the objects in the topology view and navigation tree is refreshed. ----End

3.7 Adjusting the Topology View


You can adjust the topology view as required. For example, you can expand or hide the topology navigation tree, switch the current subnet, display the topology view in full screen, zoom in or out of the view, and customize the topology tips. 3.7.1 Showing/Hiding the Navigation Tree of a Topology View The topology view shows all the service windows. This task is performed to show or hide the navigation tree of a topology view. 3.7.2 Setting Alarm Display on the Topology View After you set alarm display on the topology view, when an alarm is raised on an NE, the color of the NE on the topology view is changed to the color indicating the highest alarm severity in the corresponding status, thus you can know the alarm information in time. 3.7.3 Switching the Current Subnet On the topology view, you can switch the current subnet view to the desired one. 3.7.4 Display the filtered topology view When there are excessive objects, the topology view may appear crowded. You can set the filter conditions to filter the objects in the view by type. 3.7.5 Zooming In/Out on a Topology View You can adjust the topology view as desired, including zooming in, zooming out, magnifying, resetting, and fitting the view to the contents. 3.7.6 View the topology aerial view
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-51

3 Topology Management

M2000 Operator Guide

When the topology view is larger than 1024 x 768 pixels, only a part of the view is displayed in the topology window. You can use the aerial view to browse the entire view and locate the area to be displayed. 3.7.7 Laying Out Topology Objects Automatically If there are multiple objects in the topology view in disorder, you can lay out the objects automatically. 3.7.8 Expand or Collapse Child Objects You can expand or collapse the topology objects in the navigation tree so that you can view the objects conveniently. 3.7.9 Sorting Topology Objects You can sort the topology objects in the navigation tree in the ascending or descending order. 3.7.10 Displaying the Alarm Pop-Up Pane You can set the display of the alarm pop-up pane. When an alarm is raised, the number of the alarms of the highest severity is displayed in the pop-up pane on the upper right of the NE. 3.7.11 Customizing Topology Tips The topology tip refers to the information displayed when the cursor stays on an object for a few seconds on the topology view. You can select counters for setting the tips. The counters can be sorted in two ways: by NE, and by link. 3.7.12 Setting a Subnet Displayed When the Topology View is Started You can specify the default subnet view that is displayed when the topology view is started. If view is manually set, the default startup subnet view is the root subnet view. 3.7.13 Enabling the E-Map The electronic map supports the map files in .mif or .mid format. This view can directly display the actual locations of the NEs in all areas.

3.7.1 Showing/Hiding the Navigation Tree of a Topology View


The topology view shows all the service windows. This task is performed to show or hide the navigation tree of a topology view.

Context
or is located between the physical topology navigation tree and physical topology view.

If both the topology view and topology navigation tree are displayed, you can click to hide the topology navigation tree. Then the topology view extends to the area of the topology navigation tree.

If the topology navigation tree is not displayed, you can click to display the navigation tree.

3-52

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Hide or display the topology navigation tree.

Click to hide the topology navigation tree.

Click to display the topology navigation tree.

----End

3.7.2 Setting Alarm Display on the Topology View


After you set alarm display on the topology view, when an alarm is raised on an NE, the color of the NE on the topology view is changed to the color indicating the highest alarm severity in the corresponding status, thus you can know the alarm information in time.

Context
You can customize the display of the following alarm states:
l l l l l

Uncleared Fault Alarm Unacknowledged & Cleared Fault Alarm Unacknowledged & Uncleared Fault Alarm Unacknowledged Fault Alarm Acknowledged & Uncleared Fault Alarm

Uncleared fault alarms represent unacknowledged and uncleared fault alarms, and unacknowledged and uncleared fault alarms. Unacknowledged fault alarms represent unacknowledged and uncleared fault alarms, and unacknowledged and cleared fault alarms. To know the meaning of each alarm state, refer to 2.1.3 Alarm Status.

Procedure
Step 1 Choose System > Preferences. Step 2 In the Preferences dialog box, select the Topology Status Display node. Step 3 In Alarm status, select the status of the alarms that you want to display on the topology view. Click Up or Down to adjust the display priority. Step 4 Click OK. ----End

3.7.3 Switching the Current Subnet


On the topology view, you can switch the current subnet view to the desired one.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-53

3 Topology Management

M2000 Operator Guide

Context
You can switch the current subnet both on the navigation tree and the topology view. The procedures are the same.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 On the navigation tree or the topology view, click a desired subnet to switch a current subnet to the subnet. ----End

3.7.4 Display the filtered topology view


When there are excessive objects, the topology view may appear crowded. You can set the filter conditions to filter the objects in the view by type.

Context
l

When the M2000 is started, the default filter condition is null, that is, the topology objects in all types are displayed. When you filter the parent nodes in the navigation tree, indicates all selected. indicates partially selected, and

Procedure
Step 1 Choose Topology > Main Topology. Step 2 On the toolbar, click .

Step 3 In the displayed dialog box, click the Filter. Step 4 In the Filter tab, in the Topology Filter navigation tree, choose a node type. Only those topology objects in the chose types are displayed in the current topology view. ----End

Related References
3.9.13 Parameters for Setting Topology Filter Display

3.7.5 Zooming In/Out on a Topology View


You can adjust the topology view as desired, including zooming in, zooming out, magnifying, resetting, and fitting the view to the contents.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 Perform the following operations to zoom in and out topology objects:
l

On the topology toolbar, click

to zoom in on the topology view.


Issue 06 (2008-12-16)

3-54

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

M2000 Operator Guide


l l

3 Topology Management

On the topology toolbar, click

to zoom out on the topology view.

On the topology toolbar, click . Click in the topology view and drag a rectangle. The objects in the rectangle are magnified. On the topology toolbar, click On the topology toolbar, click to reset the size of the topology view. to display all the objects in the topology window.

l l

When you click this button, the size of the topology objects may change, but the coordinates and shapes do not change. ----End

3.7.6 View the topology aerial view


When the topology view is larger than 1024 x 768 pixels, only a part of the view is displayed in the topology window. You can use the aerial view to browse the entire view and locate the area to be displayed.

Context
The resolution is determined by the screen size of the client, and is not always 1024 x 768 pixels.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 On the toolbar in the topology window, click . The Overview window is displayed. The rectangle area is visible in the current view. Step 3 In the Overview window, drag the rectangle area to modify the display area of the current view.
NOTE

When you switch to another topology view or window, the Overview window is closed.

----End

3.7.7 Laying Out Topology Objects Automatically


If there are multiple objects in the topology view in disorder, you can lay out the objects automatically.

Context
l

There are four layout modes: table, tree, star, and ring. You can select the mode according to the actual requirements. If you select part of the topology objects, only the selected objects are laid out. If you do not select any object, all the objects in the topology view are laid out. Layout of a link or a link set refers to the layout of the NEs at the both end of the link. When you lay out topology objects, the M2000 places the figure corresponding to each topology objects in the cell of a table. The row spacing and column spacing respectively correspond to the height and width of the cell. The display effects of the figures are the same.

l l l l

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-55

3 Topology Management

M2000 Operator Guide

Procedure
Step 1 Choose Topology > Main Topology. Step 2 In the topology view, select the topology objects for layout, and then click Step 3 In the Layout dialog box, select the layout mode. l l l l Select Table. In Column spacing and Row spacing, enter the length and height between nodes. Select Tree. Select Star. In Spacing, enter the spacing between nodes. Select Ring. In Spacing, enter the spacing between nodes. .

Step 4 Click OK. Step 5 In the Set Layout dialog box, click OK.
NOTE

Select Automatically save the coordinates of the node.

----End

3.7.8 Expand or Collapse Child Objects


You can expand or collapse the topology objects in the navigation tree so that you can view the objects conveniently.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 Perform the following operations to expand and collapse topology objects:
l l l

On the toolbar, click On the toolbar, click

to expand all the topology objects in the navigation tree. to collapse all the topology objects in the navigation tree. to expand the to collapse

In the navigation tree, select one or multiple subnets. On the toolbar, click selected subnets. In the navigation tree, select one or multiple subnets. On the toolbar, click the selected subnets.

----End

3.7.9 Sorting Topology Objects


You can sort the topology objects in the navigation tree in the ascending or descending order.

3-56

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Context
NOTE

Topology objects in the navigation tree are sorted according to the following rules:
l

No matter whether topology objects are sorted in ascending or descending order, the sequence of the types of topology objects is unchanged. It is local NMSs, subnets, NEs with subnodes, NEs without subnodes, links, and link sets. The local NMS is always displayed on the top. For each type, topology objects are sorted by name in alphabetical order. Object names are case insensitive.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 Perform the following operations to sort topology objects:
l

On the top of the navigation tree, click on the toolbar. The topology objects of the same typein the navigation tree are sorted in the ascending alphabetic order. on the toolbar. The topology objects of the same On the top of the navigation tree, click type in the navigation tree are sorted in the descending alphabetic order.

----End

3.7.10 Displaying the Alarm Pop-Up Pane


You can set the display of the alarm pop-up pane. When an alarm is raised, the number of the alarms of the highest severity is displayed in the pop-up pane on the upper right of the NE.

Procedure
Step 1 Choose Topology > Main Topology. Step 2 Right-click in the topology view and choose Show Alarm Balloon. When an alarm is raised, the number of the alarms of the highest severity is displayed in the pop-up pane on the upper right of the NE. ----End

3.7.11 Customizing Topology Tips


The topology tip refers to the information displayed when the cursor stays on an object for a few seconds on the topology view. You can select counters for setting the tips. The counters can be sorted in two ways: by NE, and by link.

Prerequisite
You have logged in to the M2000 client.

Procedure
Step 1 Choose System > Customize Topology Tips to view the Customize Topology Tips dialog box.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-57

3 Topology Management

M2000 Operator Guide

By default, the system displays the configurable and activated counters of the first NE in the navigation tree. Step 2 Under the ToolTip node of the navigation tree, select an object on which a topology tip is required. Then set the counter item in the right part of the dialog box. Step 3 Click OK or Apply.
l l

Click OK to save the settings and close the dialog box. Click Apply to save the settings without closing the dialog box. You can set other counters for tips.

----End

3.7.12 Setting a Subnet Displayed When the Topology View is Started


You can specify the default subnet view that is displayed when the topology view is started. If view is manually set, the default startup subnet view is the root subnet view.

Prerequisite
You have logged in to the M2000 client.

Context

CAUTION
The setting takes effect the client is restarted.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Right-click the subnet on the topology view and choose Set to My Topology on the displayed shortcut menu. A prompt box is displayed indicating that the operation is successful. Step 3 Click OK. ----End

3.7.13 Enabling the E-Map


The electronic map supports the map files in .mif or .mid format. This view can directly display the actual locations of the NEs in all areas.

Prerequisite
You have logged in to the M2000 client.
3-58 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Context
l l

If you needs an electronic map, contact the technical support engineers. The electronic map can help you color the districts, thus showing or hiding the names of districts. Each district is marked with a unique color. You can double-click a province name to open the detailed map of the province.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 On the tool bar of the Main Topology window, select Electronic View from the Current View drop-down list. The electronic view is displayed. Step 3 You can right-click in the view and select Show District Name from the shortcut menu. The names of districts are displayed in the electronic map view. ----End

3.8 Printing a Topology View


Using the print function, you can print the topology view to paper.

Context
You can directly print the topology view by clicking Print in the Print Preview dialog box and setting print attributes.

Procedure
Step 1 Choose Topology > Main Topology. The Main Topology window is displayed. Step 2 Click on the toolbar.

Step 3 Set the attributes, such as the printer, print range and copies, and then click Print to print. ----End

Related References
3.9.14 Parameters for Printing a Topology View

3.9 Reference for Topology Management Interfaces


This part describers the topology management interfaces and relevant parameters, which helps you perform the operation related to topology management. 3.9.1 Interface Description: Topology Management This part describes the Main Topology interface. You can know the function of each part of the interface and meanings of icons and shortcut menus on the topology view. 3.9.2 Interface Description: Moving a NodeB
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-59

3 Topology Management

M2000 Operator Guide

This decries the NodeB Re-parent interface. You can move NodeBs through this interface. 3.9.3 Parameters for Setting a Physical Subnet This section describes the parameters of physical subnet. You can refer to these parameters when you create or modify a physical subnet. 3.9.4 Parameters for Creating an IP Device This part describes the parameters used for creating IP devices on the topology view. You can refer to this part when creating IP devices on the topology view. 3.9.5 Parameters for Physical Link This describes the parameters related with the physical links. You can refer to these parameters when you create, search for, or change a physical link. 3.9.6 Parameters for Setting a Virtual Link This section describes the parameters of virtual links. You can refer to these parameters when you create, modify, or view links. 3.9.7 Parameters for Setting the Topology View This section describes the parameters in the Create Custom View dialog box. You can refer to these parameters when you create or modify a custom view. 3.9.8 Parameters for Exporting an NE Information Template (in .ini Format) This part describes the parameters in the Export NE Attributs template (INI File Format) dialog box. You can refer to this part when exporting an NE information template. 3.9.9 Parameters for Creating an NE This part provides the parameter description about one physical NE or virtual NE. When you create a physical NE and a virtual NE, you can set parameters according to the information given below. 3.9.10 Parameters for Batch Creating Physical NEs This part describes the parameters in the Create Physical NEs in Batch dialog box. You can refer to this part when creating physical NEs in batches. 3.9.11 Parameters for Monitoring the Status of an NE This part describes the parameters related with NE status monitoring. You can refer to this part when setting the parameters related with NE status monitoring. 3.9.12 Parameters for Viewing/Modifying the Basic Attributes of a Subnet This part describes the parameters in the Modify Physical Subnet dialog box. You can refer to this part when modifying basic attributes of a physical subnet and selecting the background. 3.9.13 Parameters for Setting Topology Filter Display This section describes the parameters in the Filter tab. You can refer to these parameters when you set the topology filter display. 3.9.14 Parameters for Printing a Topology View This part describes the parameters shown in the Print dialog box. When printing the topology view, you can refer to this part to set parameters. 3.9.15 Parameters for SNMP Parameter Templates This part describes the parameters in the Template Parameter. When creating or modifying SNMP parameter templates, set the parameters by referring to the information described below. 3.9.16 Parameters for Moving a NodeB This describes the parameters displayed in the NodeB Re-parent dialog box. You can refer to these parameters when manually specifying the binding relations before and after the NodeB is re-parented.
3-60 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

3.9.1 Interface Description: Topology Management


This part describes the Main Topology interface. You can know the function of each part of the interface and meanings of icons and shortcut menus on the topology view. As shown in Figure 3-5, the Main Topology interface comprises three parts: physical topology navigator, topology bar, physical topology view. For details, see Table 3-5. Figure 3-5 Main Topology interface

Table 3-5 Description of the Physical Topology interface No. (1) Name Physical topology navigation Topology Tool Bar Description Displays the hierarchy of the objects on the topology view. You can locate the objects on the topology view through the navigation tree. The shortcut icon on the topology tool bar can be used to perform operations easily and quickly on the physical topology. For the description of the shortcut menu, refer to Shortcut Menu in the Topology View. Displays all the devices managed by the M2000 in a map.

(2)

(3)

Physical topology view

Topology Legend
On the topology view, the M2000 uses different icons to identify the objects such as subnet, NE, group NE, and link.
Issue 06 (2008-12-16) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-61

3 Topology Management

M2000 Operator Guide

Table 3-6 lists the icons of topology objects. Table 3-6 Description of topology legends Icon Meaning Common subnet Root Custom view Logical view MSC Pool Logical View Core Network Access Network OMC
NOTE On the topology view, different icons are used to identify different NEs. To know the legend of each NE and its meaning, refer to the Legend tab page on the topology navigation tree.

BICCSCTPLINK BICCSCTPLINK set MTP3Link MTP3Link set Virtual link LinkSet

NE State
l

Connection State On the physical topology, the connection states of the NEs are indicated by the NE icon and the state icon. The state icon is located at the upper left of the NE icon. Multiple state icons can be combined to indicate that the NE is in multiple states at the same time. For details of NE connection states, refer to Table 3-7.

3-62

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Table 3-7 Description of NE connection states Icon Meaning Synchroni zing processing Connectio n down NE not match ForbidCon nect Unknown type FourStates Critical alarm on LinkSet Major alarm on LinkSet Minor alarm on LinkSet Warning alarm on LinkSet
l

Description The data of NE on the M2000 Server are synchronizing with that on the NE. The connection between the M2000 Server and the NE is interrupted. The NE is not configured. The M2000 server is forbidden to automatically reconnect the NE. Current system does not support the NE type. The NE state contains four or more states. Critical alarm on linkset.

Major alarm on linkset.

Minor alarm on linkset

Warning alarm on linkset

Alarm State If an physical NE raises an alarm, the color of the NE icon on the physical topology view changes to show the alarm status of the NE. If an NE raises multiple fault alarms at the same time, the color of the NE icon maps to the top alarm severity. In addition, an alarm balloon is generated beside the icon. The balloon displays the alarm severity identity and number of alarms. To know how to set the icon color of each alarm severity, refer to 2.3.2.6 Setting the Alarm Color. To set whether to display the alarm balloon on the topology view through the shortcut menu, refer to Shortcut Menu in the Topology View. Table 3-8 lists the samples of integrated alarm states.

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-63

3 Topology Management

M2000 Operator Guide

Table 3-8 Samples of alarm states Icon Meaning Indicates the OMC without any fault alarm Description None.

Indicates the OMC with 102 critical fault alarms

The meaning of 102C is as follows:


l l

C: indicates the alarm severity. indicates the number of fault alarms of this severity. C: indicates critical alarms M: indicates major alarms N: indicates minor alarms W: indicates warning

In an alarm balloon:
l l l l

Indicates that the OMC has major fault alarms

If an alarm balloon does not appear, the amount of fault alarms at the corresponding severity is not displayed.

In the physical topology view, the NEs are connected in a hierarchical way. When a fault alarm occurs on the sub-NE of an NE, the following icons are displayed to indicate the alarms. If there are several fault alarms occurring on a sub-NE at the same time, the NE icon indicating the severest alarm is displayed. To know how to set the icon color of each alarm severity, refer to 2.3.2.6 Setting the Alarm Color. Table 3-9lists the samples of alarm states. Table 3-9 Samples of alarm states Icon Meaning Contain critical alarm Contain major alarm Contain minor alarm Contain warning alarm Description A critical alarm occurs on the sub-NE of the NE. A major alarm occurs on the sub-NE of the NE. A minor alarm occurs on the sub-NE of the NE. A warning alarm occurs on the sub-NE of the NE.

3-64

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide


NOTE

3 Topology Management

When multiple alarms are reported to the server from the NEs, the alarm statistical result on the NE tip will be different from the real-time statistical result for a while.

Topology Tool Bar


The shortcut icons in the topology tool bar facilitate the operations on the topology view. Table 3-10 describes the function of each shortcut icon. Table 3-10 Description of the topology tool bar Icon Name Create Description You can click the drop-down button to create a physical subnet or topology object. To return to the subnet of the upper level. When you move the view, you click to select the objects in the view. Move Hand To move the entire view without changing the spacing between the topology objects. To create a virtual link in the topology view. To set the print attributes to print the content of topology view. To preview the print result of the topology view. You can also print by using this icon. To save current view as JPG picture. To browse the topology structure of the topology view. To find the topology subjects (supporting * wildcard, the length of the value: 0-64) in physical topology. Entering nothing indicates searching for all topology objects on the topology view.

Back to Parent Select

Create Link Print

Print Preview

Save Picture Overview

Find

Issue 06 (2008-12-16)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-65

3 Topology Management

M2000 Operator Guide

Icon

Name Refresh

Description To refresh the topology view, and obtain the latest data from the M2000 server. Show all the elements in the topology view in the topology window. When the button is clicked, the size of the topology elements may change, but their shapes and positions in the coordinates remain the same. Save the positions of the physical objects. When you view the physical topology next time, the objects are displayed in these positions. To filter the topology objects, display the legend, and display the NE properties. To display the alarm list at the bottom of the client. To lay out the objects in the preset layout mode in the topology view automatically. To zoom in on the topology view. To zoom out on the topology view
l

Save Positions

Filter & Legend

Display Alarm List layout

Zoom In Zoom Out

When you zoom in on the topology view, the system hides the topology status to guarantee the display effect. When you zoom out on the topology view to certain extent, the system hides the names of the topology objects to guarantee the display effect.

Magnifier

To magnify the topology objects in the specified rectangle area to achieve better display effect of the topology view.

3-66

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 06 (2008-12-16)

M2000 Operator Guide

3 Topology Management

Icon

Name Reset Zoom Fit to Contents

Description To restore the topology view to the normal size. To display all the current subnets in the topology window. When the button is clicked, the size of the topology elements may change, but their shapes and positions in the coordinates remain the same.

Shortcut Menu in the Topology View


Table 3-11 describes the functions of the shortcut menu on the topology view. Table 3-11 Description of the shortcut menu Short