Long journey of Ruby standard library at RubyConf AU 2024
M2000 operation-guide
1. M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary i
Contents
1 About This Guide ......................................................................................................................1-1
1.1 Purpose..........................................................................................................................................................1-2
1.2 Intended Users...............................................................................................................................................1-2
1.3 Organization..................................................................................................................................................1-2
1.4 Reference ......................................................................................................................................................1-3
2 Introduction to M2000...............................................................................................................2-1
2.1 Introduction to the M2000 System................................................................................................................2-2
2.2 Logging in to the M2000 Client....................................................................................................................2-2
2.3 Setting Properties of the M2000 Client.........................................................................................................2-3
2.3.1 Setting Properties of the System ..........................................................................................................2-3
2.3.2 Customizing Toolbar............................................................................................................................2-5
3 NE Connection............................................................................................................................3-1
3.1 Connecting NEs to the M2000......................................................................................................................3-2
3.2 Monitoring Connection Status of NEs ..........................................................................................................3-2
3.2.1 Introduction to Connection Status of NEs............................................................................................3-2
3.2.2 Monitoring NE Status in the Topology View.......................................................................................3-3
3.2.3 Monitoring NE Status through the System Monitor Browser..............................................................3-3
4 Topology Management.............................................................................................................4-1
4.1 Terminologies Related to Topology Management.........................................................................................4-2
4.1.1 Topology View.....................................................................................................................................4-2
4.1.2 Network Elements................................................................................................................................4-2
4.1.3 Subnets.................................................................................................................................................4-3
4.1.4 Group NEs ...........................................................................................................................................4-3
4.1.5 Links ....................................................................................................................................................4-3
4.1.6 Topology Objects.................................................................................................................................4-4
4.1.7 Templates for Creating Physical NEs in Batches.................................................................................4-5
4.2 Creating NEs.................................................................................................................................................4-6
4.2.1 Creating Physical NEs .........................................................................................................................4-6
4.2.2 Creating Virtual NEs............................................................................................................................4-8
4.2.3 Creating NE Batch Script Files in CSV Format...................................................................................4-9
4.2.4 Creating NE Batch Script Files in INI Format...................................................................................4-10
2. 1 About This Guide
M2000
Operator Guide
ii Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.2.5 Creating Physical NEs in Batches......................................................................................................4-10
4.3 Deleting NEs...............................................................................................................................................4-12
4.3.1 Deleting Physical NEs .......................................................................................................................4-12
4.3.2 Deleting Virtual NEs..........................................................................................................................4-12
4.3.3 Deleting Group NEs...........................................................................................................................4-13
4.4 Creating Subnets .........................................................................................................................................4-14
4.5 Deleting Subnets .........................................................................................................................................4-15
4.6 Creating Links.............................................................................................................................................4-16
4.6.1 Creating Physical Links .....................................................................................................................4-16
4.6.2 Creating Virtual Links........................................................................................................................4-17
4.7 Moving NEs ................................................................................................................................................4-17
4.7.1 Moving NEs to a Group NE...............................................................................................................4-17
4.7.2 Moving NEs to another Subnet..........................................................................................................4-19
4.7.3 Moving NEs on the Same Subnet ......................................................................................................4-20
4.8 Filtering NEs in the Topology View............................................................................................................4-21
4.9 Customizing Topology Tips ........................................................................................................................4-21
4.10 Switching Background Maps ....................................................................................................................4-22
5 Alarm Management...................................................................................................................5-1
5.1 Introduction to Alarms ..................................................................................................................................5-3
5.1.1 Alarm Categories .................................................................................................................................5-3
5.1.2 Alarm Severity Levels..........................................................................................................................5-3
5.1.3 Alarm Types.........................................................................................................................................5-3
5.2 Alarm Statuses...............................................................................................................................................5-4
5.2.1 Acknowledged Alarms.........................................................................................................................5-4
5.2.2 Cleared Alarms.....................................................................................................................................5-4
5.2.3 Relationship Between Alarm Categories and Alarm Statuses..............................................................5-4
5.3 Alarm Processing Procedures........................................................................................................................5-5
5.3.1 Overview..............................................................................................................................................5-5
5.3.2 Reporting Alarms.................................................................................................................................5-6
5.3.3 Saving Alarms......................................................................................................................................5-6
5.3.4 Displaying Alarms ...............................................................................................................................5-7
5.3.5 Changing Alarm Status ........................................................................................................................5-7
5.4 Querying and Browsing Alarms....................................................................................................................5-7
5.4.1 Querying Current Fault Alarms............................................................................................................5-7
5.4.2 Querying Event Alarms........................................................................................................................5-8
5.4.3 Querying History Fault Alarms............................................................................................................5-9
5.4.4 Querying Shielded Alarms...................................................................................................................5-9
5.4.5 Browsing Real-Time Fault Alarms ....................................................................................................5-10
5.4.6 Browsing Real-Time Event Alarms ...................................................................................................5-11
5.4.7 Querying Alarm Explanation .............................................................................................................5-12
5.4.8 Querying Correlated Alarms ..............................................................................................................5-13
3. M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary iii
5.4.9 Setting the Alarm Displaying Columns..............................................................................................5-14
5.5 Collecting Alarm Statistics..........................................................................................................................5-15
5.5.1 Collecting Instant Statistics................................................................................................................5-15
5.5.2 Collecting Real-Time Statistics..........................................................................................................5-17
5.6 Acknowledging and Unacknowledging Alarms ..........................................................................................5-18
5.6.1 Acknowledging Alarms Manually......................................................................................................5-18
5.6.2 Acknowledging Alarms Automatically ..............................................................................................5-18
5.6.3 Unacknowledging Alarms..................................................................................................................5-20
5.7 Creating User Defined Alarms ....................................................................................................................5-20
5.8 Displacing Alarms to a File.........................................................................................................................5-21
5.8.1 Displacing Event Alarms ...................................................................................................................5-21
5.8.2 Displacing History Fault Alarms........................................................................................................5-23
5.9 Synchronizing Alarms.................................................................................................................................5-24
5.9.1 Synchronizing Alarms Manually........................................................................................................5-24
5.9.2 Synchronizing Alarms Automatically ................................................................................................5-25
5.10 Redefining the Alarm Severity Level........................................................................................................5-25
5.11 Setting Alarm Correlation Rules ...............................................................................................................5-27
5.11.1 Overview..........................................................................................................................................5-27
5.11.2 Setting Alarm Correlation Rules for Intermittent Fault Alarms .......................................................5-27
5.11.3 Setting Alarm Correlation Rules for Repeated Event Alarms ..........................................................5-29
5.12 Managing the Alarm Knowledge Library..................................................................................................5-30
5.12.1 Overview..........................................................................................................................................5-30
5.12.2 Modifying Alarm Knowledge Directly ............................................................................................5-30
5.12.3 Modifying Alarm Knowledge Through a File..................................................................................5-31
5.13 Operating the Alarm Board .......................................................................................................................5-32
5.13.1 Overview..........................................................................................................................................5-32
5.13.2 Setting the Display of the Alarm Board ...........................................................................................5-32
5.13.3 Setting the Alarm Sound ..................................................................................................................5-33
5.13.4 Starting or Stopping the Alarm Sound .............................................................................................5-34
5.13.5 Setting the Alarm Color ...................................................................................................................5-35
5.13.6 Starting or Stopping the Alarm Flash...............................................................................................5-36
5.14 Operating the Alarm Box ..........................................................................................................................5-36
5.14.1 Overview..........................................................................................................................................5-36
5.14.2 Setting the Alarm Box Filter ............................................................................................................5-36
5.14.3 Stopping Alarm Sounds of the Alarm Box.......................................................................................5-38
5.14.4 Stopping the Alarm Box...................................................................................................................5-39
5.14.5 Resetting the Alarm Box..................................................................................................................5-39
5.15 Setting the Alarm Notification by SMS.....................................................................................................5-40
5.16 Setting the Alarm Notification by PhoneNo. or PagerNo..........................................................................5-41
5.17 Setting the Alarm Notification by Email...................................................................................................5-42
6 Performance Management .......................................................................................................6-1
4. 1 About This Guide
M2000
Operator Guide
iv Huawei Technologies Proprietary Issue 02 (2006-10-31)
6.1 Terminologies Related to Performance Management....................................................................................6-3
6.1.1 Meausrement Counter..........................................................................................................................6-3
6.1.2 Function Set and Function Subset........................................................................................................6-3
6.1.3 Measurement Object ............................................................................................................................6-4
6.1.4 Measurement Period ............................................................................................................................6-5
6.2 Performance Measurement Process...............................................................................................................6-5
6.2.1 Overview..............................................................................................................................................6-5
6.2.2 Reporting Performance Data................................................................................................................6-6
6.2.3 Saving Performance Data into the Database........................................................................................6-7
6.2.4 Viewing of Performance Data..............................................................................................................6-7
6.3 Querying Performance Measurement Results...............................................................................................6-7
6.3.1 Overview Performance Counters.........................................................................................................6-7
6.3.2 Querying Results of Periodic Performance Measurements..................................................................6-7
6.3.3 Querying Results of Real-Time Performance Measurements ............................................................6-11
6.3.4 Setting Query Condition Templates ...................................................................................................6-13
6.3.5 Applying Query Condition Templates................................................................................................6-14
6.4 Saving Performance Measurement Results to a File...................................................................................6-15
6.5 Saving Performance Measurement Results to a File Automatically............................................................6-16
6.6 Browsing Files Storing Performance Measurement Results .......................................................................6-17
6.7 Synchronizing Performance Data................................................................................................................6-17
6.7.1 Synchronizing Performance Data Manually ......................................................................................6-17
6.7.2 Synchronizing Performance Data Automatically...............................................................................6-19
6.8 Managing Performance Measurement.........................................................................................................6-19
6.8.1 Subscribing to Performance Measurement Results............................................................................6-19
6.8.2 Checking Reliability of Performance Measurement Results..............................................................6-21
6.8.3 Collecting the Missing Performance Measurement Results...............................................................6-23
6.8.4 Suspending the Collection of Performance Measurement Results.....................................................6-24
6.9 Setting Extended Performance Counters.....................................................................................................6-25
6.9.1 Starting the Measurement of Extended Performance Counters..........................................................6-25
6.9.2 Stopping the Measurement of Extended Performance Counters........................................................6-26
6.10 Setting Measurement Objects....................................................................................................................6-27
6.10.1 Adding Measurement Objects..........................................................................................................6-27
6.10.2 Deleting Measurement Objects........................................................................................................6-29
6.11 Setting Thresholds for Collecting Performance Measurement Results .....................................................6-30
6.12 Managing User Defined Counters.............................................................................................................6-31
6.12.1 Creating User Defined Counters......................................................................................................6-31
6.12.2 Modifying User Defined Coudnters.................................................................................................6-33
6.13 Managing Performance Monitoring ..........................................................................................................6-33
6.13.1 Overview..........................................................................................................................................6-33
6.13.2 Creating Performance Monitoring Tasks .........................................................................................6-33
6.13.3 Starting Performance Monitoring.....................................................................................................6-36
6.13.4 Filtering Monitoring Results............................................................................................................6-37
5. M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary v
6.13.5 Setting Monitoring Thresholds ........................................................................................................6-38
6.13.6 Exporting Data from the Current Monitoring Table.........................................................................6-39
6.13.7 Viewing the Current Monitoring Chart ............................................................................................6-40
6.13.8 Viewing the Trend Chart..................................................................................................................6-42
6.13.9 Setting Attributes for the Monitoring Chart.....................................................................................6-43
6.13.10 Exporting Monitoring Results........................................................................................................6-44
6.14 Managing Thresholds for Real-Time Counters .........................................................................................6-45
6.14.1 Overview..........................................................................................................................................6-45
6.14.2 Adding Monitoring Thresholds........................................................................................................6-46
6.14.3 Modifying Monitoring Thresholds...................................................................................................6-47
6.14.4 Deleting Monitoring Thresholds......................................................................................................6-48
7 Configuration Management.....................................................................................................7-1
7.1 Querying NE Configuration..........................................................................................................................7-2
7.1.1 Configuration Types.............................................................................................................................7-2
7.1.2 Querying NE Configuration.................................................................................................................7-2
7.1.3 Querying the Basic NE Configuration .................................................................................................7-3
7.2 Synchronizing NE Configuration..................................................................................................................7-4
7.2.1 Synchronizing NE Configuration Manually ........................................................................................7-4
7.2.2 Synchronizing NE Configuration Automatically .................................................................................7-5
7.2.3 Synchronizing NE Configuration Periodically ....................................................................................7-6
7.3 Exporting NE Configuration .........................................................................................................................7-6
7.3.1 Exporting NE Configuration Manually................................................................................................7-6
7.3.2 Exporting NE Confiugration Periodically............................................................................................7-7
7.4 Saving NE Configuration to a File................................................................................................................7-8
7.5 Setting NE Type Privilege Rules...................................................................................................................7-9
7.6 Applying NE Type Privilege Rules .............................................................................................................7-10
7.7 Managing NE Users ....................................................................................................................................7-11
7.7.1 Overview of NE Users.......................................................................................................................7-11
7.7.2 Principles for NE User Authorization ................................................................................................7-11
7.7.3 Creating NE Users .............................................................................................................................7-11
7.7.4 Modifying Privileges for NE Users....................................................................................................7-12
7.7.5 Deleting NE User Accounts...............................................................................................................7-14
7.8 Monitoring Operations of M2000 Users and NE Users ..............................................................................7-15
7.8.1 Overview of User Logs and NE Logs................................................................................................7-15
7.8.2 Synchronizing NE Logs.....................................................................................................................7-15
7.8.3 Querying NE Logs.............................................................................................................................7-17
7.8.4 Monitoring NE User Login on LMTs ................................................................................................7-18
7.8.5 Monitoring Operations and Sessions of NE Users.............................................................................7-19
7.9 Management of Enhanced Maintenance for NEs........................................................................................7-19
7.9.1 Overview............................................................................................................................................7-19
7.9.2 Upgrading Enhanced Maintenance for NEs.......................................................................................7-20
6. 1 About This Guide
M2000
Operator Guide
vi Huawei Technologies Proprietary Issue 02 (2006-10-31)
7.9.3 Equipment Management ....................................................................................................................7-21
7.9.4 Monitoring Management....................................................................................................................7-22
7.9.5 Tracing Management .........................................................................................................................7-24
7.10 Executing NE MML Commands...............................................................................................................7-25
7.10.1 Overview of MML Commands........................................................................................................7-25
7.10.2 Viewing the MML Command Window............................................................................................7-25
7.10.3 Executing One MML Command......................................................................................................7-26
7.10.4 Setting the MML Command Script..................................................................................................7-27
7.10.5 Executing Multiple MML Commands .............................................................................................7-29
7.10.6 Executing MML Commands Periodically........................................................................................7-30
7.10.7 Saving MML Command Results......................................................................................................7-30
8 NE Software and License Management.................................................................................8-1
8.1 Checking the NE Software............................................................................................................................8-2
8.1.1 Checking NE Software Packages on the M2000 .................................................................................8-2
8.1.2 Checking the Running NE Software....................................................................................................8-3
8.2 Setting the File Server...................................................................................................................................8-4
8.2.1 Purpose of and Principles for Setting the File Server ..........................................................................8-4
8.2.2 Setting the NE File Server ...................................................................................................................8-4
8.3 Upgrading the NE Software ..........................................................................................................................8-5
8.3.1 Procedure for Upgrading the NE Software ..........................................................................................8-5
8.3.2 Copying the NE Software to the M2000 Client ...................................................................................8-6
8.3.3 Uploading the NE Software from the M2000 Client to the M2000 Server..........................................8-7
8.3.4 Downloading the NE Software to a Board of an NE ...........................................................................8-8
8.3.5 Operating the NE Software................................................................................................................8-10
8.3.6 Downloading NE Software Patches to a Board of an NE ..................................................................8-11
8.3.7 Operating Patches ..............................................................................................................................8-12
8.3.8 Monitoring the Software Upgrade Progress.......................................................................................8-13
8.3.9 Falling Back the Software Version.....................................................................................................8-14
8.4 Upgrading the NodeB Software and Patches ..............................................................................................8-14
8.4.1 NodeB Upgrade Policies....................................................................................................................8-14
8.4.2 Upgrading One NodeB.......................................................................................................................8-15
8.4.3 Upgrading Multiple NodeBs..............................................................................................................8-17
8.5 Managing the Software License..................................................................................................................8-17
8.5.1 Overview............................................................................................................................................8-17
8.5.2 Checking the License Allocated to NodeBs.......................................................................................8-18
8.5.3 Modifying the License Allocated to NodeBs.....................................................................................8-19
8.5.4 Allocating the RAN License ..............................................................................................................8-20
8.5.5 Synchronizing the License Allocated to NodeBs...............................................................................8-20
8.5.6 Deleting the RAN License.................................................................................................................8-21
8.5.7 Uploading the License from the Client to the Folder on the Server...................................................8-22
9 Backup Managemnet.................................................................................................................9-1
7. M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary vii
9.1 Overview of the NE Data..............................................................................................................................9-2
9.2 Backing Up NE Data.....................................................................................................................................9-4
9.2.1 Backup Modes .....................................................................................................................................9-4
9.2.2 Backing Up NE Data Periodically .......................................................................................................9-4
9.2.3 Backing Up NE Data Manually ...........................................................................................................9-5
9.3 Browsing the NE Backup Progress ...............................................................................................................9-6
9.4 Checking NE Backup Files ...........................................................................................................................9-7
9.5 Restoring the NE Data...................................................................................................................................9-7
10 Troubleshooting.....................................................................................................................10-1
10.1 Client Login Failures.................................................................................................................................10-2
10.1.1 Prompt "Login failed. Confirm that your user name and password are case sensitive and correct."
....................................................................................................................................................................10-2
10.1.2 Prompt "Invalid user account." ........................................................................................................10-2
10.1.3 Prompt "Invalid login duration."......................................................................................................10-2
10.1.4 Prompt Message "Invalid password." ..............................................................................................10-3
10.1.5 Prompt Message "The password has expired. Please change your password! " ..............................10-3
10.1.6 Prompt Message "Maintenance Mode."...........................................................................................10-3
10.1.7 Prompt Message "The User Has Reached the Maximum Login Attempts. The User Account Has
Been Locked, and It Can Be Unlocked in 1 Minute.".................................................................................10-4
10.1.8 Prompt Message "The Server Doesn’t Exist or Service Is Not Running.".......................................10-4
10.1.9 Prompt Message "Exceed Maximum Sessions." ing........................................................................10-5
10.1.10 Prompt Message "Loading Module Failed, System Will Exit.".....................................................10-5
10.1.11 Prompt Message "Failed to Log in to the Server after the Auto Client Upgrade or Running
Exception"...................................................................................................................................................10-5
10.2 Client Running Faults................................................................................................................................10-6
10.2.1 Abortion of the M2000 Client..........................................................................................................10-6
10.2.2 Failure to Run the M2000 Client .....................................................................................................10-6
10.2.3 Abnormal Display of M2000 Client Interface..................................................................................10-7
10.2.4 The Bulb on the GUI Is On and Off Intermittently..........................................................................10-7
10.3 Topology Management Faults...................................................................................................................10-8
10.3.1 Failure to Refresh the Topology View..............................................................................................10-8
10.3.2 Failure to Discover NodeBs Automatically .....................................................................................10-9
10.3.3 Conflicted Names for the Created Topology Objects.......................................................................10-9
10.4 Alarm Management Faults ........................................................................................................................10-9
10.4.1 Time Delay of Alarm Message Real-Time Printing.........................................................................10-9
10.4.2 Failure to Receive Alarm Emails in Real-Time .............................................................................10-10
10.4.3 Failure to Receive Alarm SMSs in Real-Time...............................................................................10-10
10.4.4 Unknown NE Names During the Alarm Query .............................................................................10-10
8. 1 About This Guide
M2000
Operator Guide
viii Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figures
Figure 2-1 M2000 client interface (Physical Topology window)......................................................................2-3
Figure 2-2 Output Window tab in the System Setting dialog box ..................................................................2-4
Figure 2-3 Terminal tab in the System Setting dialog box...............................................................................2-5
Figure 2-4 Customize Toolbar dialog box ........................................................................................................2-6
Figure 3-1 Monitoring the NE statuses through the system monitor browser....................................................3-4
Figure 4-1 An example of CSV templates..........................................................................................................4-5
Figure 4-2 Create NE dialog box ......................................................................................................................4-7
Figure 4-3 Progress of creating physical NEs ....................................................................................................4-8
Figure 4-4 Creating physical NEs in batches ...................................................................................................4-11
Figure 4-5 Creating physical subnets ...............................................................................................................4-15
Figure 4-6 NE Property dialog box.................................................................................................................4-18
Figure 4-7 Modify Physical Subnet dialog box..............................................................................................4-20
Figure 5-1 Process by which a fault alarm changes to a history fault alarm ......................................................5-5
Figure 5-2 Procedure for processing M2000 alarms ..........................................................................................5-6
Figure 5-3 Querying current fault alarms...........................................................................................................5-8
Figure 5-4 Browsing alarms.............................................................................................................................5-11
Figure 5-5 Alarm details...................................................................................................................................5-13
Figure 5-6 Selecting the columns to be displayed in the alarm list ..................................................................5-15
Figure 5-7 Alarm statistics table.......................................................................................................................5-16
Figure 5-8 Alarm statistics pie chart.................................................................................................................5-17
Figure 5-9 Setting conditions for auto acknowledgement................................................................................5-19
Figure 5-10 Auto displacement ........................................................................................................................5-22
Figure 5-11 Manual displacement ....................................................................................................................5-23
Figure 5-12 Redefining the alarm severity (level)............................................................................................5-26
Figure 5-13 Setting correlation for intermittent fault alarms............................................................................5-28
Figure 5-14 Modifying the alarm knowledge...................................................................................................5-31
9. M2000
Operator Guide Figures
Issue 02 (2006-10-31) Huawei Technologies Proprietary ix
Figure 5-15 Setting the alarm sounds...............................................................................................................5-34
Figure 5-16 Setting the alarm board.................................................................................................................5-35
Figure 5-17 Setting the alarm box filter ...........................................................................................................5-38
Figure 5-18 Setting the remote alarm notification by SMS..............................................................................5-40
Figure 6-1 Levels of measurement counters.......................................................................................................6-4
Figure 6-2 Process of performance measurement of the M2000 system............................................................6-6
Figure 6-3 Selecting the measurement unit and objects .....................................................................................6-9
Figure 6-4 Selecting measurement counters.....................................................................................................6-10
Figure 6-5 Selecting the query period and time................................................................................................6-11
Figure 6-6 Entering a name for the query condition template..........................................................................6-14
Figure 6-7 Synchronizing performance measurement results manually...........................................................6-18
Figure 6-8 Subscribing measurement results....................................................................................................6-20
Figure 6-9 Subscribing results for real-time measurements .............................................................................6-21
Figure 6-10 Please select time segment dialog box........................................................................................6-22
Figure 6-11 Setting extended counters .............................................................................................................6-26
Figure 6-12 Selecting measurement objects.....................................................................................................6-28
Figure 6-13 Adding an alarm threshold for collecting performance measurement results...............................6-31
Figure 6-14 Creating user defined counters .....................................................................................................6-32
Figure 6-15 Setting monitor parameters...........................................................................................................6-35
Figure 6-16 Starting performance monitoring..................................................................................................6-36
Figure 6-17 Setting conditions for filtering monitoring results........................................................................6-38
Figure 6-18 Setting a threshold ........................................................................................................................6-39
Figure 6-19 Setting parameters for the monitoring chart .................................................................................6-41
Figure 6-20 Setting parameters for the trend chart...........................................................................................6-43
Figure 6-21 Setting attributes for the monitoring chart....................................................................................6-44
Figure 6-22 Adding monitoring thresholds ......................................................................................................6-47
Figure 7-1 Querying NE configuration through the MIT browser .....................................................................7-3
Figure 7-2 NE Report dialog box......................................................................................................................7-4
Figure 7-3 Synchronization progress..................................................................................................................7-5
Figure 7-4 Operation Result dialog box...........................................................................................................7-9
Figure 7-5 Selectting an NE and command groups for the created NE user account.......................................7-12
Figure 7-6 Selecting an NE user.......................................................................................................................7-13
Figure 7-7 Selecting command groups.............................................................................................................7-14
10. 1 About This Guide
M2000
Operator Guide
x Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 7-8 Software Browser dialog box .........................................................................................................7-16
Figure 7-9 Synchronizing NE logs automatically ............................................................................................7-17
Figure 7-10 Querying NE logs .........................................................................................................................7-18
Figure 7-11 enhanced NE maintenance............................................................................................................7-21
Figure 7-12 Device panel .................................................................................................................................7-22
Figure 7-13 Monitor Panel ...............................................................................................................................7-23
Figure 7-14 Trace panel....................................................................................................................................7-25
Figure 7-15 MML Command window............................................................................................................7-26
Figure 7-16 Selecting the script mode..............................................................................................................7-28
Figure 7-17 Create Task dialog box................................................................................................................7-29
Figure 8-1 Checking the NE version..................................................................................................................8-3
Figure 8-2 Setting the file server........................................................................................................................8-5
Figure 8-3 Procedure for upgrading the NE software ........................................................................................8-6
Figure 8-4 Selecting the file location and type...................................................................................................8-9
Figure 8-5 Selecting download software parameters........................................................................................8-10
Figure 8-6 Step 1 of 2 for upgrading one NodeB .............................................................................................8-16
Figure 8-7 Step 2 of 2 for upgrading one NodeB .............................................................................................8-16
Figure 8-8 Browsing the license of the current NodeB ....................................................................................8-18
Figure 9-1 Creating a periodic NE backup task..................................................................................................9-5
Figure 10-1 The connection fails between the client and the server.................................................................10-7
11. M2000
Operator Guide Tables
Issue 02 (2006-10-31) Huawei Technologies Proprietary xi
Tables
Table 3-1 Icons indicating NE connection status................................................................................................3-2
Table 4-1 Descriptions of two link types............................................................................................................4-4
Table 6-1 Exporting the monitoring data..........................................................................................................6-44
Table 8-1 File servers available for the NEs.......................................................................................................8-4
Table 9-1 NE backup data...................................................................................................................................9-2
12. M2000
Operator Guide 1 About This Guide
Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-1
1 About This Guide
About This Chapter
The following table lists the contents of this chapter.
Title Description
1.1 Purpose Introduces the purpose of this guide.
1.2 Intended Users Introduces the intended users of this guide.
1.3 Organization Introduces the organization of this guide.
1.4 Reference Introduces the reference of this guide.
13. 1 About This Guide
M2000
Operator Guide
1-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
1.1 Purpose
This guide describes how to operate and maintain the network equipment. It includes the
following content:
! Monitoring network performance
! Monitoring network alarms
! Managing network configuration information
! Upgrading the network element (NE) software
! Backing up the NE data
1.2 Intended Users
The guide is intended for the following users:
! Network engineers
! Shift operators
1.3 Organization
This guide consists of the following chapters:
! 1 "About This Guide" introduces the purpose, intended users, and organization of this
guide.
! 2 "Introduction to M2000" describes the procedures for logging in to the M2000 client
and setting the client.
! 3 "NE Connection" describes the types of NEs the M2000 system manages, relevant
operation tasks, and the procedures for connecting types of network equipment.
! 4 "Topology Management" introduces topology management and describes the relevant
operation tasks and procedures.
! 5 "Alarm Management" introduces alarm management and describes relevant operation
tasks and procedures.
! 6 "Performance Management" introduces performance management and describes
relevant operation tasks and procedures.
! 7 "Configuration Management" describes the procedures for configuring and querying
NE service data.
! 8 "NE Software and License Management" describes the operation tasks and procedures
related to NE software and license management.
! 9 "Backup Managemnet" describes the operation tasks and procedures related to server
data backup and NE data backup.
! 10 "Troubleshooting" describes the handling suggestions for common faults that may
occur during operations on the client.
14. M2000
Operator Guide 1 About This Guide
Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-3
1.4 Reference
When you read this guide, see M2000 Online Help for more information.
15. M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-1
2 Introduction to M2000
About This Chapter
The following table lists the contents of this chapter.
Title Description
2.1 Introduction to the M2000
System
Introduces the M2000 system.
2.2 Logging in to the M2000
Client
Describes how to log in to the M2000 client.
2.3 Setting Properties of the
M2000 Client
Describes how to set the properties of the M2000 client.
16. 2 Introduction to M2000
M2000
Operator Guide
2-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
2.1 Introduction to the M2000 System
iManager M2000 Mobile Element Management System (M2000 for short) is the network
management system (NMS) for Huawei mobile communications products. It works in the
widely used Client/Server mode. The M2000 system contains a set of servers and multiple
clients connected to the servers.
! The M2000 server runs on the Unix platform. The server processes and stores NE data.
! The M2000 clients run on the Windows platform. The clients provide friendly graphical
interfaces for operations and maintenance on the NEs.
2.2 Logging in to the M2000 Client
Description
Start the M2000 Client, and log in to the M2000 server.
After logging in to the M2000 client successfully, you can use the client to perform routine
operation and maintenance for the network equipment.
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before logging in to the M2000 client, ensure that:
! The M2000 client software is installed.
! The corresponding M2000 server is working properly.
! The software versions of the M2000 client and the M2000 server match.
! The M2000 client communicates normally with the M2000 server.
! You have the required user name and password.
Procedure
To log in to the M2000 client, perform the following steps:
Step 1 Choose Start > Programs > iManager M2000 Client > M2000 Client to start the M2000
client.
You can configure the path for the menu iManager M2000 Client > M2000 Client in Start >
Programs when you install the client software. The default path is iManager M2000 Client.
Step 2 In the displayed User Login dialog box, enter the server IP address to log in to the M2000
client.
17. M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-3
If User Login does not list the information about the specified server, click . The Server
Information dialog box is displayed.
In this dialog box, set the server information, such as the server IP and sever port.
Step 3 Enter the user name and password. Click Login.
After the connection is set up, the client obtains the required data from the server. After the
data is loaded, the Physical Topology window is displayed, as shown in Figure 2-1. The
Physical Topology window is the M2000 client interface.
Figure 2-1 M2000 client interface (Physical Topology window)
----End
2.3 Setting Properties of the M2000 Client
2.3.1 Setting Properties of the System
Description
Set the following properties of the M2000 client.
! Mode for displaying messages
! Maximum output lines
! Auto displacement
! Auto locking period
18. 2 Introduction to M2000
M2000
Operator Guide
2-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before setting the properties of the system, ensure that you have logged in to the M2000
client.
Procedure
To set the properties of the M2000 client, perform the following steps:
Step 1 Choose System > System Setting.
The System Setting dialog box is displayed, as shown in Figure 2-2.
Figure 2-2 Output Window tab in the System Setting dialog box
Step 2 In the Output Window tab, set parameters such as Maximum Output Lines.
Step 3 Click the Terminal tab in the System Setting dialog box, as shown in Figure 2-3.
19. M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-5
Figure 2-3 Terminal tab in the System Setting dialog box
Step 4 Set the period for Automatically locked or turn off the option.
Step 5 Click OK.
----End
2.3.2 Customizing Toolbar
Description
Create the self defined toolbar in the M2000 client.
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before customizing the toolbar, ensure that you have logged in to the M2000 client.
Procedure
To customize the toolbar, perform the following steps:
20. 2 Introduction to M2000
M2000
Operator Guide
2-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Step 1 Choose Tools > Customize Toolbar.
The Customize Toolbar dialog box is displayed, as shown in Figure 2-4.
Figure 2-4 Customize Toolbar dialog box
Step 2 Select the tool groups and button on the toolbar.
Step 3 Click OK.
----End
21. M2000
Operator Guide 3 NE Connection
Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-1
3 NE Connection
About This Chapter
The following table lists the contents of this chapter.
Title Description
3.1 Connecting NEs to the
M2000
Introduces how to connect the NEs to the M2000.
3.2 Monitoring Connection
Status of NEs
Describes how to monitor the connection statuses of the
NEs in the topology view or through the system monitor
browser.
22. 3 NE Connection
M2000
Operator Guide
3-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
3.1 Connecting NEs to the M2000
After the NEs are connected to the M2000, you can operate or maintain the NEs through the
M2000 system.
Debug the NEs and ensure that they work well before you connect them to the M2000 system.
For details, see the M2000 Commissioning Guide.
3.2 Monitoring Connection Status of NEs
3.2.1 Introduction to Connection Status of NEs
In the topology view, the connection statuses of the NEs are shown by NE icon and NE status
icon. The NE status icon is displayed at the top left of the NE icon. Multiple NE icons
displayed at the same time indicate that the NE is in several connection statuses.
When the NE and the M2000 are connected, the NE icon and NE status icon is displayed in
the topology view. You can operate and maintain the NE through the M2000.
When the NE is processing synchronization or disconnected with the M2000, the NE status
icons are displayed at the top left corner of the NE icon, as shown in Table 3-1.
Table 3-1 Icons indicating NE connection status
Icon Meaning Description
Synchronization
processing
The M2000 extracts the NE configuration from the NE. The
data is synchronized when the NE is connected or reconnected
to the M2000.
Connection
down
The M2000 server is disconnected with the NE.
The O&M (operation and maintenance) path between the NE
and the M2000 does not work smoothly, or errors occur to
some TCP or UDP ports.
NE not match The NE is not matched.
The O&M path between the NE and the M2000 works well.
You cannot, however, operate or maintain the NE through the
M2000 because the NE is not installed with the right version of
the mediation package.
Forbid Connect The NE is prohibited from being connected to the M2000
server.
Unknown type The current system does not support the NE type.
FourStates The NE state contains four or more states.
23. M2000
Operator Guide 3 NE Connection
Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-3
3.2.2 Monitoring NE Status in the Topology View
Description
Monitor the status of the NEs in the topology view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before monitoring the status of an NE, ensure that you have logged in to the M2000 client.
Procedure
To monitor the status of an NE in the topology view, perform the following steps:
Step 1 Click the Tree tab on the left of the topology view.
Step 2 Select the subnet with the NE.
Step 3 Select the NE.
The NE status is shown in the topology view on the right of the topology view. Here are two
examples,
! shows that the NE HLR36 is in the Connected status.
! shows that the NE MGW is in the Connection down status.
For the NEs in the Connection down status, contact the department concerned immediately.
----End
3.2.3 Monitoring NE Status through the System Monitor Browser
Description
View the connection status of NEs through the system monitor browser.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before monitoring NE status through the system monitor browser, ensure that you have
logged in to the M2000 client.
24. 3 NE Connection
M2000
Operator Guide
3-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Procedure
To monitor NE status through the system monitor browser, perform the following steps:
Step 1 Choose Tools > System Monitor > Monitor Browser.
The System Monitor Browser dialog box is displayed.
Step 2 Click the NE Monitor tab.
The status of each NE is displayed, as shown in Figure 3-1.
Figure 3-1 Monitoring the NE statuses through the system monitor browser
25. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-1
4 Topology Management
About This Chapter
The following table lists the contents of this chapter.
Title Description
4.1 Terminologies Related to
Topology Management
Introduces the glossary related to topology management.
4.2 Creating NEs Describes how to create the NEs in the topology view and
in batches.
4.3 Deleting NEs Describes how to delete the NEs and the group NEs in the
topology view.
4.4 Creating Subnets Describes how to create the subnets in the topology view.
4.5 Deleting Subnets Describes how to delete the subnets in the topology view.
4.6 Creating Links Describes how to create the links in the topology view.
4.7 Moving NEs Describes how to move the NEs in the topology view.
4.8 Filtering NEs in the
Topology View
Describes how to filter the NEs in the topology view.
4.9 Customizing Topology
Tips
Describes how to customize the topology tips.
4.10 Switching Background
Maps
Describes how to switch the background maps of the
topology views.
26. 4 Topology Management
M2000
Operator Guide
4-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.1 Terminologies Related to Topology Management
4.1.1 Topology View
Meaning
The topology view is the mapping of the communication network (managed through the
M2000 system) on the M2000. The topology view shows the equipment and the connection
between the equipment in the form of view and tree. It also provides entry points for the
operations related to the configuration, alarm, and performance management through the
client.
The M2000 topology view consists of two parts: tree and view.
! The navigation tree on the left shows all the involved topology objects, such as NEs,
subnets, and the hierarchical architecture between these objects.
! The topology view on the right shows all the topology objects in the current network and
the location-related relationship between these objects.
The system synchronizes the navigation tree and the topology view automatically.
Examples
The displayed window after you log in the M2000 client is a topology view.
4.1.2 Network Elements
Meaning
Topology management uses NEs to identify the communication equipment in the network.
! Physical NE
Physical NEs are the communication devices that can be managed by the M2000.
! Virtual NE
The third-party communication equipment in the entire communication network. The
M2000 cannot manage the equipment. Virtual NEs help complete the structure of the
communication network.
In the topology view, the physical NE and virtual NE are distinguished by different icon
colors. For example, the physical NE HLR is displayed as in the topology view, while
the virtual NE HLR is displayed as .
The equipment type corresponds to the NE type. The NE types are identified by different icons. You can
view the icons by clicking the Legend tab in the left of the window.
Examples
Some examples of NEs are as follows:
27. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-3
! Huawei BTS3812A sets up a physical connection with the M2000; thus it is a physical
NE.
! The third-party equipment MOTOROLA HLR is a virtual NE.
! The M2000 itself is a special NE. The M2000 is displayed as OMC in the topology view.
4.1.3 Subnets
Meaning
To manage NEs more efficiently, the huge M2000 network can be divided into several smaller
networks based on certain principles, such as by region. These smaller networks are called
subnets in the topology.
Examples
An example of subnets is as follows:
If the M2000 can manage all the NEs in the provinces A, B and C, these NEs can be divided
into three subnets by region (herein province).
The three subnets can also be divided into smaller subnets by city or county. In other words, a
subnet can be nested in another subnet.
4.1.4 Group NEs
Meaning
Some NEs in the communication network form a certain hierarchical architecture. The Group
NE is an NE that works as both an NE and a subnet.
Examples
Some examples of group NEs are as follows:
! An RNC is a group NE. It manages NodeB NEs.
! An MSC Server is a group NE. It manages MGW NEs.
4.1.5 Links
Meaning
The topology view uses links to identify the physical or logical connections between the
communication equipment. There are two types of links, physical and virtual, as shown in
Table 4-1.
28. 4 Topology Management
M2000
Operator Guide
4-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Table 4-1 Descriptions of two link types
Link
type
Description
It refers to the signaling connections between two physical NEs.
M2000 supports six types of physical links: MTP3, MTP3B, DATALINK,
M3UA, H248, and BICCSCTP.
MTP3
MTP3B
MTP3 and MTP3B can only be created manually.
! The NE at one side of the link must be a physical MGW.
! The NE at the other side of the link can be a physical MSC
Server, or a virtual RNC or MSC Server.
DATALINK
M3UA
H248
Physical
link
BICCSCTP
These three types are created by the system automatically.
! DATALINK links can be created between a physical CG and
a physical GGSN80 or SGSN.
! H248 and M3UA links can only be created between a
physical MGW and MSC Server.
! BICCSCTP links can only be created between a physical
MSC Server.
Virtual
link
! Virtual link refers to the logical communication connections between two
NEs.
! Virtual links can only be created manually. You can modify or delete virtual
links.
Examples
Some examples of the links are as follows:
! The links between physical MGW and virtual MSC Server are physical links created by
the manually.
! The links between virtual MSC Server and virtual HLR are virtual links created
manually.
4.1.6 Topology Objects
Meaning
NEs, subnets, and group NEs are topology objects.
Examples
Some examples of topology objects are as follows:
! Huawei communication equipment BTS3812 that communicates with the M2000 is a
topological object.
! The manually created virtual link is a topological object.
! The manually created subnet C is a topological object.
29. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-5
4.1.7 Templates for Creating Physical NEs in Batches
Meaning
To create NEs in batches on the M2000 client, you must create a script file manually and
perform the creation in bathes through executing the script.
Templates for creating physical NEs in batches are the standard templates provided by the
M2000 client. You only need to export the template, and then enter the information of the NEs
to be created. Two formats of templates are available: INI and CSV.
Templates for creating physical NEs in batches are the standard templates provided by the
M2000 client. Two formats of templates are available: INI and CSV.
Templates in the CSV Format
The templates in the CSV format apply only to the NEs in WCDMA networks.
Use the Microsoft Excel to edit the templates in the CSV format. All the NEs apply the same
parameter group, as shown in Figure 4-1.
Figure 4-1 An example of CSV templates
Templates in the INI Format
The templates in the INI format apply to create all types of NEs in batches except virtual NEs.
Use the notepad to edit the templates in the INI format. Different from the CSV templates, the
INI templates apply different parameter groups. To create multiple NEs of the same class, the
corresponding parameter groups should be provided accordingly.
The following examples show the parameter groups for some typical NEs.
Example 1: RNC
[RNC]
Name =
Vendor =
Physical Location =
District =
IP address =
Description =
Pos X =
Pos Y =
Position =
Coordination =
30. 4 Topology Management
M2000
Operator Guide
4-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Example 2: BSC
[BSC]
Name =
Vendor =
Physical Location =
District =
IP address =
Description =
Username =
Password =
Pos X =
Pos Y =
Position =
Coordination =
For the parameters of the INI templates, see M2000 Online Help.
4.2 Creating NEs
4.2.1 Creating Physical NEs
Description
Create physical NEs in the topology view.
After you create an NE successfully, the M2000 synchronizes the NE to obtain the NE
configuration data.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a physical NE, ensure that:
! You have logged in to the M2000 client.
! The mediation software for the NE to be created is installed.
! You have obtained the NE information, such as the NE name, IP address, NE version,
and district information.
Procedure
To create a physical NE in the topology view, perform the following steps:
Step 1 Right-click in the topology view, and select Create NE on the displayed menu.
The Create NE dialog box is displayed, as shown in Figure 4-2.
31. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-7
Figure 4-2 Create NE dialog box
Step 2 Select the physical NE category in the Select Category drop-down list.
Step 3 Select the NE type in the Select NE Type drop-down list.
Step 4 Click Next.
Step 5 Select the district.
Enter the information such as the NE name and IP address.
Step 6 Click Finish.
The prompt dialog box Create NE displays the progress of the NE creation.
For example, the progress of creating the BSC NE is as shown in Figure 4-3.
32. 4 Topology Management
M2000
Operator Guide
4-8 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 4-3 Progress of creating physical NEs
The icon for this NE is displayed in the topology view while the system displays the
synchronization progress . The progress bar closes automatically after 100% is displayed.
You can operate and maintain the NE through the M2000 client.
----End
4.2.2 Creating Virtual NEs
Description
Create virtual NEs in the physical topology.
After you create a virtual NE successfully, the icon for this NE is displayed in the topology
view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a virtual NE, ensure that:
! You have logged in to the M2000 client.
! You have obtained the information about the NE, such as the NE name, IP address, and
district information.
Procedure
To create a virtual NE in the topology view, perform the following steps:
Step 1 Right-click in the topology view, and select Create NE on the displayed menu.
The Create NE dialog box is displayed, as shown in Figure 4-2.
33. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-9
Step 2 Select Virtual NEs in the Select Category drop-down list.
Step 3 Select an NE type in the Select NE Type drop-down list.
Step 4 Click Next.
Step 5 Select the district of the NE. Enter the information such as the NE name and IP address.
Step 6 Click Finish.
The prompt dialog box Create NE displays the progress of the NE creation. After the NE is
successfully created, the icon is displayed in the topology view.
----End
4.2.3 Creating NE Batch Script Files in CSV Format
Description
Create an NE batch file in the CSV format. The NE batch file is used for creating NEs in
batches.
Network Equipment Supporting This Task
Physical NEs in WCDMA networks.
Prerequisites
Before creating an NE batch file in the CSV format, ensure that:
! You have obtained the information about the NE Type, IP address, NE version and
district.
! The version Excel97 or higher is installed and runs normally.
Procedure
To create an NE batch file in the CSV format, perform the following steps:
Step 1 Choose Configuration > Exports NE Attributes Template > CSV File Format to view
Export NE Info template (CSV file format) dialog box.
Step 2 Click . Save the template.
Step 3 Open the template file, and enter the information of each NE, such as the NE type, NE name,
NE version, and district.
Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For
details, see part 4.2.1 "Creating Physical NEs."
Step 4 Save the file.
----End
34. 4 Topology Management
M2000
Operator Guide
4-10 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.2.4 Creating NE Batch Script Files in INI Format
Description
Create an NE batch file in the INI format. The NE batch file is used for creating NEs in
batches.
Network Equipment Supporting This Task
All NEs equipment except the virtual NEs.
Prerequisites
You have obtained the NE information such as the NE Type, IP address, NE version and
district.
Procedure
To create an NE batch file in the INI format, perform the following steps:
Step 1 Choose Configuration > Exports NE Attributes Template > INI File Format to view
Export NE Info template (INI file format) dialog box.
Step 2 Select the NE type. Click , and save the template.
Step 3 Open the template file, and enter the information of each NE, such the NE type, NE name, NE
version and district.
Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For
details, see part 4.2.1 "Creating Physical NEs."
Step 4 Save the file.
----End
4.2.5 Creating Physical NEs in Batches
Description
By creating physical NEs in batches, you can add multiple physical NEs in the same subnet
into the topology view in batches at a time.
The M2000 obtains the information about these NEs created from the batch files, and then
synchronizes these NEs to obtain the configuration data.
Network Equipment Supporting This Task
! This task applies to creating physical NEs in WCDMA networks when the script file is in
the CSV format.
! This task applies to creating all NEs except virtual NEs when the script file is in the INI
format.
35. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-11
Prerequisites
Before creating physical NEs in batches, ensure that:
! You have logged in to the M2000 client.
! The mediation software of the NE to be created is installed.
! The NE batch script files are created. For details, see part 4.2.3 "Creating NE Batch
Script Files in CSV Format" and part 4.2.4 "Creating NE Batch Script Files in INI
Format"
Procedure
To create multiple physical NEs in batches, perform the following steps:
Step 1 Right-click in the topology view, and select Create Physical NEs in batch on the displayed
menu.
The Create Physical NEs in batch dialog box is displayed, as shown in Figure 4-4.
Figure 4-4 Creating physical NEs in batches
Step 2 Click . Select a file for creating NEs in batches.
Step 3 Click Verify. Check the script file configuration.
Step 4 Click OK.
The NE is created in the topology view.
Click Cancel to cancel the creating operation.
36. 4 Topology Management
M2000
Operator Guide
4-12 Huawei Technologies Proprietary Issue 02 (2006-10-31)
----End
4.3 Deleting NEs
4.3.1 Deleting Physical NEs
Description
Delete physical NEs from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a physical NE, ensure that:
! You have logged in to the M2000 client.
! The physical NE exists in the M2000, and it is not a group NE.
Procedure
To delete a physical NE from the topology view, perform the following steps:
Step 1 Select a physical NE in the topology view.
Step 2 Right-click the NE, and select Delete on the displayed menu.
Step 3 Click Yes in the displayed Confirm dialog box.
The deletion progress is displayed in percentage. When 100% is displayed, the physical links
of the physical NE are deleted automatically.
----End
4.3.2 Deleting Virtual NEs
Description
Delete virtual NEs from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a virtual NE, ensure that:
! You have logged in to the M2000 client.
37. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-13
! The virtual NE exists in the M2000.
Procedure
To delete a virtual NE from the topology view, perform the following steps:
Step 1 Select the virtual NE in the topology view.
Step 2 Right-click the NE, and select Delete on the displayed menu.
Step 3 Click Yes in the displayed Confirm dialog box to delete the virtual NE.
If the virtual NE contains sub-NEs, the sub-NEs are displayed in the upper physical topology after you
delete the virtual NE.
----End
4.3.3 Deleting Group NEs
Description
Delete group NEs from the physical topology.
Network Equipment Supporting This Task
BSC, MGW, RNC and MSC Server.
Prerequisites
Before deleting a group NE from the physical topology, ensure that:
! You have logged in to the M2000 client.
! The group NE to be deleted exists in the M2000.
Procedure
To delete the group NE, perform the following steps:
Step 1 Select the group NE to be deleted in the topological view.
Step 2 Right-click the group NE, and select Delete on the displayed menu.
Step 3 Click Yes in the Confirm prompt dialog box to delete the group NE from the current view.
If the group NE contains other NEs, it exists as a virtual NE. In this case, the icon becomes a virtual
icon.
----End
38. 4 Topology Management
M2000
Operator Guide
4-14 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.4 Creating Subnets
Description
Create subnets in the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a subnet in the physical topology, ensure that:
! You have logged in to the M2000 client.
! The topological view and the network architecture are well planned.
! Procedure
To create a subnet, perform the following steps:
Step 1 Right-click in the topology view, and select Create Physical Subnet on the displayed menu.
The dialog box Create Physical Subnet is displayed, as shown in Figure 4-5.
Step 2 Click the Basic Attribute tab. Set the subnet attributes.
Step 3 Click the Background Selection tab. Set the background.
Step 4 Click the Objects Selection tab. Select the NEs and subnets to be displayed under this subnet.
Step 5 Click OK.
After the creation, you can view the icon of this subnet in the topology view. Double-click the
icon to view the NEs and subnets under this subnet.
39. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-15
Figure 4-5 Creating physical subnets
----End
4.5 Deleting Subnets
Description
Delete subnets from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a subnet, ensure that:
! You have logged in to the M2000 client.
! The subnet exists in the M2000.
Procedure
To delete a subnet from the topology view, perform the following steps:
Step 1 Select the subnet in the topology view.
40. 4 Topology Management
M2000
Operator Guide
4-16 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Step 2 Right-click the subnet, and select Delete on the displayed menu.
The Confirm dialog box is displayed.
Step 3 Click Yes in the Confirm prompt dialog box.
NEs and subnets under this subnet, if any, are displayed in the upper physical topology after you delete
this subnet.
----End
4.6 Creating Links
4.6.1 Creating Physical Links
Description
Create physical links in the topology view manually.
Network Equipment Supporting This Task
MGW and MSC Server.
Prerequisites
Before creating a physical link in the topology view, ensure that:
! You have logged in to the M2000 client.
! The topology view and the network architecture are well planned.
Procedure
To create a physical link, perform the following steps:
Step 1 Right-click in the topology view, and select Create Link on the displayed menu.
The Create Link dialog box is displayed.
Step 2 Select the link type in the Create Link dialog box.
Step 3 Click . Select the NE for link side A and side Z.
In the End A MO and End Z MO areas, select the configuration for the two ends of the link.
Click to add the configuration to the list on the right.
! To set up multiple links, repeat the above steps.
! To reselect the NEs, click Reset.
Step 4 Click Create or Close.
41. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-17
The prompt dialog box Create Link displays the progress of the link creation. After the
creation, a link is displayed between the two NEs.
----End
4.6.2 Creating Virtual Links
Description
Create virtual links in the topology view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a virtual link in the topology view, ensure that:
! You have logged in to the M2000 client.
! The topology view and the network architecture are well planned.
Procedure
To create a virtual link, perform the following steps:
Step 1 Right-click in the topology view, and select Create Virtual Link on the displayed menu.
The Create Virtual Link dialog box is displayed.
Step 2 Enter the name of the virtual link.
Step 3 Select the NEs in the end A and end Z of the link.
Step 4 Click OK.
After the creation, a link is displayed between the two NEs.
----End
4.7 Moving NEs
4.7.1 Moving NEs to a Group NE
Description
Move one or more NEs to a group NE in the topology view.
Network Equipment Supporting This Task
Move the NodeB to the RNC and the MGW to the MSC Server.
42. 4 Topology Management
M2000
Operator Guide
4-18 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Prerequisites
Before moving an NE to a group NE, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the same subnet as the group NE.
Procedure
To move an NE to a group NE, perform the following steps:
Step 1 Select the target group NE in the topology view.
Step 2 Right-click the NE, and select Property on the displayed menu.
The NE Property dialog box is displayed, as shown in Figure 4-6.
Figure 4-6 NE Property dialog box
Step 3 Click the Object Selection tab.
Step 4 Select the NE to be moved to the group NE in the Available Objects list, and click .
The NE is added to the Selected Objects list.
Step 5 Click OK.
Double-click the group NE icon to view the group NE and the NEs under it.
43. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-19
----End
4.7.2 Moving NEs to another Subnet
Description
Move one or more NEs to another subnet in the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before moving an NE to another subnet, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the same network layer as the target subnet.
Procedure
To move an NE to another subnet, perform the following steps:
Step 1 Select the target subnet in the topology view.
Step 2 Right-click the NE, and select Modify on the displayed menu.
The Modify Physical Subnet dialog box is displayed, as shown in Figure 4-7.
44. 4 Topology Management
M2000
Operator Guide
4-20 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 4-7 Modify Physical Subnet dialog box
Step 3 Click the Objects Selection tab.
Step 4 Select the NE to be moved to the subnet in the Available Objects list, and click .
The NE is added to the Selected Objects list.
Step 5 Click OK.
Double-click the group NE icon to view all the NEs under this subnet.
----End
4.7.3 Moving NEs on the Same Subnet
Description
Move an NE to other locations in the same subnet in the topology view.
This operation changes only the location of the NE in the topology view. The actual geographical
location and physical connections of the NE is not concerned.
Network Equipment Supporting This Task
All manageable network equipment.
45. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-21
Prerequisites
Before moving an NE in the same subnet, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the M2000.
Procedure
To move an NE in the same subnet, perform the following steps:
Step 1 Select the NE in the topology view.
Step 2 Drag it to the required location.
Step 3 Click in the toolbar in the middle part to save the new location of the NE.
----End
4.8 Filtering NEs in the Topology View
Description
Set the filtering conditions as required, so that it shows only certain objects, such as the
background, NE, subnet, and link name.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before filtering NEs, ensure that you have logged in to the M2000 client.
Procedure
To filter NEs in the topology view, perform the following steps:
Step 1 Click the Filter tab in the left pane of the topology view.
Step 2 Select the objects to be displayed in the navigation tree.
The objects that are not selected are not displayed in the topology view.
----End
4.9 Customizing Topology Tips
Description
Topology tips are the prompt information displayed after the mouse pointer rests on an object
for several seconds.
46. 4 Topology Management
M2000
Operator Guide
4-22 Huawei Technologies Proprietary Issue 02 (2006-10-31)
You can customize the counter items as prompt information as required. The counter items are
classified into three types by NE, Link and District.
Network Equipment Supporting This Task
No NEs are involved.
Prerequisites
Before customizing topology tips, ensure that you have logged in to the M2000 client.
Procedure
To customize topology tips, perform the following steps:
Step 1 Choose Tools > Customize Topology Tips.
The Customize Topology Tips dialog box is displayed.
The system displays the counter item (activated or to be set) of the first NE in the navigation
tree by default.
Step 2 Select a counter in the navigation tree.
Step 3 Set the counter item in the right of the dialog box.
Step 4 Click OK or Apply.
----End
4.10 Switching Background Maps
Description
Two views, topology view and map view, are available in the M2000.
! You can only switch the background maps of the topology views.
! The background of the topology view is Empty map by default. In other words, the topology view
has no background maps.
The file format that can serve as the background map of the topology view in the M2000
includes: GIF, IVL, JPEG, JPG, MIF, and SHP.
Network Equipment Supporting This Task
No NEs are involved.
Prerequisites
Before setting the background map of the topology view, ensure that:
! You have logged in to the M2000 client.
! The electronic maps exist in the M2000 client.
47. M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-23
Procedure
To switch electronic maps in the M2000 client, perform the following steps:
Step 1 Right-click in the topology view, and select Set BackGround on the displayed menu.
The Set BackGround dialog box is displayed.
Step 2 Click Select, and select the electronic map file.
Step 3 Click OK.
After that, the electronic map selected becomes the background of the topology view.
----End
48. M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-1
5 Alarm Management
About This Chapter
The following table lists the contents of this chapter.
Title Description
5.1 Introduction to Alarms Introduces the alarm categories, alarm severity levels and
the alarm types.
5.2 Alarm Statuses Introduces the alarm statuses.
5.3 Alarm Processing
Procedures
Introduces the alarm processing procedures.
5.4 Querying and Browsing
Alarms
Describes how to query and browse the alarms.
5.5 Collecting Alarm Statistics Describes how to collecting the alarm statistics.
5.6 Acknowledging and
Unacknowledging Alarms
Describes how to acknowledge and un acknowledge the
alarms.
5.7 Creating User Defined
Alarms
Describes how to create a user defined alarm.
5.8 Displacing Alarms to a
File
Describes how to displace the alarms to a file.
5.9 Synchronizing Alarms Describes how to synchronize the alarms manually and
automatically.
5.10 Redefining the Alarm
Severity Level
Describes how to redefine the alarm severity levels.
5.11 Setting Alarm Correlation
Rules
Describes how to set the alarm correlation rules.
5.12 Managing the Alarm
Knowledge Library
Describes how to manage the alarm knowledge library.
49. 5 Alarm Management
M2000
Operator Guide
5-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Title Description
5.13 Operating the Alarm
Board
Describes how to operate the alarm board.
5.14 Operating the Alarm Box Describes how to operate the alarm box.
5.15 Setting the Alarm
Notification by SMS
Describes how to set the alarm notification by SMS.
5.16 Setting the Alarm
Notification by PhoneNo. or
PagerNo.
Describes how to set the alarm notification by phoneNo.
or pagerNo..
5.17 Setting the Alarm
Notification by Email
Describes how to set the alarm notification by Email.
50. M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-3
5.1 Introduction to Alarms
5.1.1 Alarm Categories
Alarms can be categorized based on two principles:
! By alarm content: event alarms and fault alarms
! By alarm handling and clearance: history fault alarms and shielded alarms
These four categories of alarms are described as follows:
! Fault alarms, such as a board fault alarm, are generated when faults occur to hardware
devices or exceptions occur to key functions. Fault alarms are more severe than event
alarms. Fault alarms can be cleared.
! Event alarms, such as a congestion alarm, are occasionally generated during the
equipment operation. The event alarms indicate only the equipment status at a certain
point of time. The system generates some event alarms periodically. Event alarms do not
need manual handling.
! History fault alarms refer to the cleared and acknowledged fault alarms.
! Shielded alarms are generated during a short period of time. The alarms matching the
correlation rules set on the M2000 client are shielded alarms, and they are stored in the
M2000 shielding library. Shielded alarms can only be fault or event alarms.
5.1.2 Alarm Severity Levels
Alarm severity level indicates how severe a generated alarm is. Sorted in the descending order,
alarms have four severity levels: critical, major, minor, and warning .
! Critical alarms, such as the power circuit fault alarm or the output clock fault alarm,
affect the whole system operation. Critical alarms require immediate handling.
! Major alarms, such as alarms about disconnected fibers or physical line faults, occur
only to boards or lines. If not handled timely, these alarms may affect the services.
! Minor alarms, such as the alarm for bit errors in some physical lines, refer to common
status alarms that indicate the working status of boards or lines.
! Warning alarms indicate status changes or events which do not affect the system
performance or subscriber services, but may interest the operator. Some warning alarms
prompt when the equipment returns to normality.
5.1.3 Alarm Types
Based on the alarm source, the following types of alarms are available:
! Power alarms: related to the power supply system
! Environment alarms: related to the equipment environment, such as the temperature,
humidity, and connection control
! Signaling alarms: related to communication signaling
! Trunk alarms: related to trunk circuits
! Hardware alarms: related to boards such as the clock and CPU
! Software alarms: related to the software
51. 5 Alarm Management
M2000
Operator Guide
5-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
! Running alarms: related to and generated during the system operation
! Communication alarms: related to the communication system
! QoS alarms: related to the service quality
! Processing error alarms: related to exceptions
5.2 Alarm Statuses
5.2.1 Acknowledged Alarms
The alarm acknowledgement function helps to identify alarms. After you acknowledge an
alarm manually, the M2000 displays the alarm as acknowledged. In this way, you can easily
distinguish between the alarms processed manually and those to be processed.
This status, however, only indicates that the alarm is currently acknowledged. It does not
indicate that the alarm is cleared.
5.2.2 Cleared Alarms
Alarm clearance applies only to fault alarms. When a fault alarm is cleared, the NE returns to
normality and reports the alarm clearance information to the M2000. For those alarms that
cannot be cleared automatically, the M2000 system supports manual clearance.
5.2.3 Relationship Between Alarm Categories and Alarm Statuses
Fault Alarms Changing to History Fault Alarms
Fault alarms can be in the following four statuses:
! Uncleared and unacknowledged
! Uncleared and acknowledged
! Cleared and unacknowledged
! Cleared and acknowledged
For an acknowledged and cleared alarm, the M2000 moves the alarm from the current fault
alarm library to the history fault alarm library. Accordingly, the alarm changes to a history
fault alarm.
For an unacknowledged or uncleared alarm, the alarm remains in the current fault alarm
library as a current fault alarm.
Figure 5-1 shows how a current fault alarm changes to a history fault alarm.
52. M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-5
Figure 5-1 Process by which a fault alarm changes to a history fault alarm
Event Alarms
Event alarms can be in two statuses: acknowledged and unacknowledged. They do not change
to other alarms.
5.3 Alarm Processing Procedures
5.3.1 Overview
Figure 5-2 shows how the M2000 system processes alarms.
53. 5 Alarm Management
M2000
Operator Guide
5-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 5-2 Procedure for processing M2000 alarms
After receiving alarms from an NE or the M2000 itself, the M2000 shields the alarms,
redefines the alarm severity levels, or correlates the alarms before saving the alarms in the
alarm library.
You can query the alarm information and acknowledge the alarms on the M2000 client.
5.3.2 Reporting Alarms
When an alarm is generated, the NE reports the alarm to the M2000 through the MML
command line interface, the binary interface, or the SNMP Trap (the IP networking
equipment), between the NE and the M2000.
5.3.3 Saving Alarms
After receiving an alarm, the M2000 processes the alarm, and then either saves the alarm in
the relevant alarm library or discards the alarm as follows:
Step 1 The M2000 checks if the alarm belongs to the shielded alarms defined on the M2000. If the
alarm belongs to the shielded alarms, the M2000 discards the alarm.
Step 2 The M2000 checks if the alarm is defined with another severity (level) on the M2000. If the
alarm is defined with another severity (level), the M2000 redefines the severities (levels) of
the alarm.