SlideShare a Scribd company logo
1 of 212
Download to read offline
M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary i
Contents
1 About This Guide ......................................................................................................................1-1
1.1 Purpose..........................................................................................................................................................1-2
1.2 Intended Users...............................................................................................................................................1-2
1.3 Organization..................................................................................................................................................1-2
1.4 Reference ......................................................................................................................................................1-3
2 Introduction to M2000...............................................................................................................2-1
2.1 Introduction to the M2000 System................................................................................................................2-2
2.2 Logging in to the M2000 Client....................................................................................................................2-2
2.3 Setting Properties of the M2000 Client.........................................................................................................2-3
2.3.1 Setting Properties of the System ..........................................................................................................2-3
2.3.2 Customizing Toolbar............................................................................................................................2-5
3 NE Connection............................................................................................................................3-1
3.1 Connecting NEs to the M2000......................................................................................................................3-2
3.2 Monitoring Connection Status of NEs ..........................................................................................................3-2
3.2.1 Introduction to Connection Status of NEs............................................................................................3-2
3.2.2 Monitoring NE Status in the Topology View.......................................................................................3-3
3.2.3 Monitoring NE Status through the System Monitor Browser..............................................................3-3
4 Topology Management.............................................................................................................4-1
4.1 Terminologies Related to Topology Management.........................................................................................4-2
4.1.1 Topology View.....................................................................................................................................4-2
4.1.2 Network Elements................................................................................................................................4-2
4.1.3 Subnets.................................................................................................................................................4-3
4.1.4 Group NEs ...........................................................................................................................................4-3
4.1.5 Links ....................................................................................................................................................4-3
4.1.6 Topology Objects.................................................................................................................................4-4
4.1.7 Templates for Creating Physical NEs in Batches.................................................................................4-5
4.2 Creating NEs.................................................................................................................................................4-6
4.2.1 Creating Physical NEs .........................................................................................................................4-6
4.2.2 Creating Virtual NEs............................................................................................................................4-8
4.2.3 Creating NE Batch Script Files in CSV Format...................................................................................4-9
4.2.4 Creating NE Batch Script Files in INI Format...................................................................................4-10
1 About This Guide
M2000
Operator Guide
ii Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.2.5 Creating Physical NEs in Batches......................................................................................................4-10
4.3 Deleting NEs...............................................................................................................................................4-12
4.3.1 Deleting Physical NEs .......................................................................................................................4-12
4.3.2 Deleting Virtual NEs..........................................................................................................................4-12
4.3.3 Deleting Group NEs...........................................................................................................................4-13
4.4 Creating Subnets .........................................................................................................................................4-14
4.5 Deleting Subnets .........................................................................................................................................4-15
4.6 Creating Links.............................................................................................................................................4-16
4.6.1 Creating Physical Links .....................................................................................................................4-16
4.6.2 Creating Virtual Links........................................................................................................................4-17
4.7 Moving NEs ................................................................................................................................................4-17
4.7.1 Moving NEs to a Group NE...............................................................................................................4-17
4.7.2 Moving NEs to another Subnet..........................................................................................................4-19
4.7.3 Moving NEs on the Same Subnet ......................................................................................................4-20
4.8 Filtering NEs in the Topology View............................................................................................................4-21
4.9 Customizing Topology Tips ........................................................................................................................4-21
4.10 Switching Background Maps ....................................................................................................................4-22
5 Alarm Management...................................................................................................................5-1
5.1 Introduction to Alarms ..................................................................................................................................5-3
5.1.1 Alarm Categories .................................................................................................................................5-3
5.1.2 Alarm Severity Levels..........................................................................................................................5-3
5.1.3 Alarm Types.........................................................................................................................................5-3
5.2 Alarm Statuses...............................................................................................................................................5-4
5.2.1 Acknowledged Alarms.........................................................................................................................5-4
5.2.2 Cleared Alarms.....................................................................................................................................5-4
5.2.3 Relationship Between Alarm Categories and Alarm Statuses..............................................................5-4
5.3 Alarm Processing Procedures........................................................................................................................5-5
5.3.1 Overview..............................................................................................................................................5-5
5.3.2 Reporting Alarms.................................................................................................................................5-6
5.3.3 Saving Alarms......................................................................................................................................5-6
5.3.4 Displaying Alarms ...............................................................................................................................5-7
5.3.5 Changing Alarm Status ........................................................................................................................5-7
5.4 Querying and Browsing Alarms....................................................................................................................5-7
5.4.1 Querying Current Fault Alarms............................................................................................................5-7
5.4.2 Querying Event Alarms........................................................................................................................5-8
5.4.3 Querying History Fault Alarms............................................................................................................5-9
5.4.4 Querying Shielded Alarms...................................................................................................................5-9
5.4.5 Browsing Real-Time Fault Alarms ....................................................................................................5-10
5.4.6 Browsing Real-Time Event Alarms ...................................................................................................5-11
5.4.7 Querying Alarm Explanation .............................................................................................................5-12
5.4.8 Querying Correlated Alarms ..............................................................................................................5-13
M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary iii
5.4.9 Setting the Alarm Displaying Columns..............................................................................................5-14
5.5 Collecting Alarm Statistics..........................................................................................................................5-15
5.5.1 Collecting Instant Statistics................................................................................................................5-15
5.5.2 Collecting Real-Time Statistics..........................................................................................................5-17
5.6 Acknowledging and Unacknowledging Alarms ..........................................................................................5-18
5.6.1 Acknowledging Alarms Manually......................................................................................................5-18
5.6.2 Acknowledging Alarms Automatically ..............................................................................................5-18
5.6.3 Unacknowledging Alarms..................................................................................................................5-20
5.7 Creating User Defined Alarms ....................................................................................................................5-20
5.8 Displacing Alarms to a File.........................................................................................................................5-21
5.8.1 Displacing Event Alarms ...................................................................................................................5-21
5.8.2 Displacing History Fault Alarms........................................................................................................5-23
5.9 Synchronizing Alarms.................................................................................................................................5-24
5.9.1 Synchronizing Alarms Manually........................................................................................................5-24
5.9.2 Synchronizing Alarms Automatically ................................................................................................5-25
5.10 Redefining the Alarm Severity Level........................................................................................................5-25
5.11 Setting Alarm Correlation Rules ...............................................................................................................5-27
5.11.1 Overview..........................................................................................................................................5-27
5.11.2 Setting Alarm Correlation Rules for Intermittent Fault Alarms .......................................................5-27
5.11.3 Setting Alarm Correlation Rules for Repeated Event Alarms ..........................................................5-29
5.12 Managing the Alarm Knowledge Library..................................................................................................5-30
5.12.1 Overview..........................................................................................................................................5-30
5.12.2 Modifying Alarm Knowledge Directly ............................................................................................5-30
5.12.3 Modifying Alarm Knowledge Through a File..................................................................................5-31
5.13 Operating the Alarm Board .......................................................................................................................5-32
5.13.1 Overview..........................................................................................................................................5-32
5.13.2 Setting the Display of the Alarm Board ...........................................................................................5-32
5.13.3 Setting the Alarm Sound ..................................................................................................................5-33
5.13.4 Starting or Stopping the Alarm Sound .............................................................................................5-34
5.13.5 Setting the Alarm Color ...................................................................................................................5-35
5.13.6 Starting or Stopping the Alarm Flash...............................................................................................5-36
5.14 Operating the Alarm Box ..........................................................................................................................5-36
5.14.1 Overview..........................................................................................................................................5-36
5.14.2 Setting the Alarm Box Filter ............................................................................................................5-36
5.14.3 Stopping Alarm Sounds of the Alarm Box.......................................................................................5-38
5.14.4 Stopping the Alarm Box...................................................................................................................5-39
5.14.5 Resetting the Alarm Box..................................................................................................................5-39
5.15 Setting the Alarm Notification by SMS.....................................................................................................5-40
5.16 Setting the Alarm Notification by PhoneNo. or PagerNo..........................................................................5-41
5.17 Setting the Alarm Notification by Email...................................................................................................5-42
6 Performance Management .......................................................................................................6-1
1 About This Guide
M2000
Operator Guide
iv Huawei Technologies Proprietary Issue 02 (2006-10-31)
6.1 Terminologies Related to Performance Management....................................................................................6-3
6.1.1 Meausrement Counter..........................................................................................................................6-3
6.1.2 Function Set and Function Subset........................................................................................................6-3
6.1.3 Measurement Object ............................................................................................................................6-4
6.1.4 Measurement Period ............................................................................................................................6-5
6.2 Performance Measurement Process...............................................................................................................6-5
6.2.1 Overview..............................................................................................................................................6-5
6.2.2 Reporting Performance Data................................................................................................................6-6
6.2.3 Saving Performance Data into the Database........................................................................................6-7
6.2.4 Viewing of Performance Data..............................................................................................................6-7
6.3 Querying Performance Measurement Results...............................................................................................6-7
6.3.1 Overview Performance Counters.........................................................................................................6-7
6.3.2 Querying Results of Periodic Performance Measurements..................................................................6-7
6.3.3 Querying Results of Real-Time Performance Measurements ............................................................6-11
6.3.4 Setting Query Condition Templates ...................................................................................................6-13
6.3.5 Applying Query Condition Templates................................................................................................6-14
6.4 Saving Performance Measurement Results to a File...................................................................................6-15
6.5 Saving Performance Measurement Results to a File Automatically............................................................6-16
6.6 Browsing Files Storing Performance Measurement Results .......................................................................6-17
6.7 Synchronizing Performance Data................................................................................................................6-17
6.7.1 Synchronizing Performance Data Manually ......................................................................................6-17
6.7.2 Synchronizing Performance Data Automatically...............................................................................6-19
6.8 Managing Performance Measurement.........................................................................................................6-19
6.8.1 Subscribing to Performance Measurement Results............................................................................6-19
6.8.2 Checking Reliability of Performance Measurement Results..............................................................6-21
6.8.3 Collecting the Missing Performance Measurement Results...............................................................6-23
6.8.4 Suspending the Collection of Performance Measurement Results.....................................................6-24
6.9 Setting Extended Performance Counters.....................................................................................................6-25
6.9.1 Starting the Measurement of Extended Performance Counters..........................................................6-25
6.9.2 Stopping the Measurement of Extended Performance Counters........................................................6-26
6.10 Setting Measurement Objects....................................................................................................................6-27
6.10.1 Adding Measurement Objects..........................................................................................................6-27
6.10.2 Deleting Measurement Objects........................................................................................................6-29
6.11 Setting Thresholds for Collecting Performance Measurement Results .....................................................6-30
6.12 Managing User Defined Counters.............................................................................................................6-31
6.12.1 Creating User Defined Counters......................................................................................................6-31
6.12.2 Modifying User Defined Coudnters.................................................................................................6-33
6.13 Managing Performance Monitoring ..........................................................................................................6-33
6.13.1 Overview..........................................................................................................................................6-33
6.13.2 Creating Performance Monitoring Tasks .........................................................................................6-33
6.13.3 Starting Performance Monitoring.....................................................................................................6-36
6.13.4 Filtering Monitoring Results............................................................................................................6-37
M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary v
6.13.5 Setting Monitoring Thresholds ........................................................................................................6-38
6.13.6 Exporting Data from the Current Monitoring Table.........................................................................6-39
6.13.7 Viewing the Current Monitoring Chart ............................................................................................6-40
6.13.8 Viewing the Trend Chart..................................................................................................................6-42
6.13.9 Setting Attributes for the Monitoring Chart.....................................................................................6-43
6.13.10 Exporting Monitoring Results........................................................................................................6-44
6.14 Managing Thresholds for Real-Time Counters .........................................................................................6-45
6.14.1 Overview..........................................................................................................................................6-45
6.14.2 Adding Monitoring Thresholds........................................................................................................6-46
6.14.3 Modifying Monitoring Thresholds...................................................................................................6-47
6.14.4 Deleting Monitoring Thresholds......................................................................................................6-48
7 Configuration Management.....................................................................................................7-1
7.1 Querying NE Configuration..........................................................................................................................7-2
7.1.1 Configuration Types.............................................................................................................................7-2
7.1.2 Querying NE Configuration.................................................................................................................7-2
7.1.3 Querying the Basic NE Configuration .................................................................................................7-3
7.2 Synchronizing NE Configuration..................................................................................................................7-4
7.2.1 Synchronizing NE Configuration Manually ........................................................................................7-4
7.2.2 Synchronizing NE Configuration Automatically .................................................................................7-5
7.2.3 Synchronizing NE Configuration Periodically ....................................................................................7-6
7.3 Exporting NE Configuration .........................................................................................................................7-6
7.3.1 Exporting NE Configuration Manually................................................................................................7-6
7.3.2 Exporting NE Confiugration Periodically............................................................................................7-7
7.4 Saving NE Configuration to a File................................................................................................................7-8
7.5 Setting NE Type Privilege Rules...................................................................................................................7-9
7.6 Applying NE Type Privilege Rules .............................................................................................................7-10
7.7 Managing NE Users ....................................................................................................................................7-11
7.7.1 Overview of NE Users.......................................................................................................................7-11
7.7.2 Principles for NE User Authorization ................................................................................................7-11
7.7.3 Creating NE Users .............................................................................................................................7-11
7.7.4 Modifying Privileges for NE Users....................................................................................................7-12
7.7.5 Deleting NE User Accounts...............................................................................................................7-14
7.8 Monitoring Operations of M2000 Users and NE Users ..............................................................................7-15
7.8.1 Overview of User Logs and NE Logs................................................................................................7-15
7.8.2 Synchronizing NE Logs.....................................................................................................................7-15
7.8.3 Querying NE Logs.............................................................................................................................7-17
7.8.4 Monitoring NE User Login on LMTs ................................................................................................7-18
7.8.5 Monitoring Operations and Sessions of NE Users.............................................................................7-19
7.9 Management of Enhanced Maintenance for NEs........................................................................................7-19
7.9.1 Overview............................................................................................................................................7-19
7.9.2 Upgrading Enhanced Maintenance for NEs.......................................................................................7-20
1 About This Guide
M2000
Operator Guide
vi Huawei Technologies Proprietary Issue 02 (2006-10-31)
7.9.3 Equipment Management ....................................................................................................................7-21
7.9.4 Monitoring Management....................................................................................................................7-22
7.9.5 Tracing Management .........................................................................................................................7-24
7.10 Executing NE MML Commands...............................................................................................................7-25
7.10.1 Overview of MML Commands........................................................................................................7-25
7.10.2 Viewing the MML Command Window............................................................................................7-25
7.10.3 Executing One MML Command......................................................................................................7-26
7.10.4 Setting the MML Command Script..................................................................................................7-27
7.10.5 Executing Multiple MML Commands .............................................................................................7-29
7.10.6 Executing MML Commands Periodically........................................................................................7-30
7.10.7 Saving MML Command Results......................................................................................................7-30
8 NE Software and License Management.................................................................................8-1
8.1 Checking the NE Software............................................................................................................................8-2
8.1.1 Checking NE Software Packages on the M2000 .................................................................................8-2
8.1.2 Checking the Running NE Software....................................................................................................8-3
8.2 Setting the File Server...................................................................................................................................8-4
8.2.1 Purpose of and Principles for Setting the File Server ..........................................................................8-4
8.2.2 Setting the NE File Server ...................................................................................................................8-4
8.3 Upgrading the NE Software ..........................................................................................................................8-5
8.3.1 Procedure for Upgrading the NE Software ..........................................................................................8-5
8.3.2 Copying the NE Software to the M2000 Client ...................................................................................8-6
8.3.3 Uploading the NE Software from the M2000 Client to the M2000 Server..........................................8-7
8.3.4 Downloading the NE Software to a Board of an NE ...........................................................................8-8
8.3.5 Operating the NE Software................................................................................................................8-10
8.3.6 Downloading NE Software Patches to a Board of an NE ..................................................................8-11
8.3.7 Operating Patches ..............................................................................................................................8-12
8.3.8 Monitoring the Software Upgrade Progress.......................................................................................8-13
8.3.9 Falling Back the Software Version.....................................................................................................8-14
8.4 Upgrading the NodeB Software and Patches ..............................................................................................8-14
8.4.1 NodeB Upgrade Policies....................................................................................................................8-14
8.4.2 Upgrading One NodeB.......................................................................................................................8-15
8.4.3 Upgrading Multiple NodeBs..............................................................................................................8-17
8.5 Managing the Software License..................................................................................................................8-17
8.5.1 Overview............................................................................................................................................8-17
8.5.2 Checking the License Allocated to NodeBs.......................................................................................8-18
8.5.3 Modifying the License Allocated to NodeBs.....................................................................................8-19
8.5.4 Allocating the RAN License ..............................................................................................................8-20
8.5.5 Synchronizing the License Allocated to NodeBs...............................................................................8-20
8.5.6 Deleting the RAN License.................................................................................................................8-21
8.5.7 Uploading the License from the Client to the Folder on the Server...................................................8-22
9 Backup Managemnet.................................................................................................................9-1
M2000
Operator Guide Contents
Issue 02 (2006-10-31) Huawei Technologies Proprietary vii
9.1 Overview of the NE Data..............................................................................................................................9-2
9.2 Backing Up NE Data.....................................................................................................................................9-4
9.2.1 Backup Modes .....................................................................................................................................9-4
9.2.2 Backing Up NE Data Periodically .......................................................................................................9-4
9.2.3 Backing Up NE Data Manually ...........................................................................................................9-5
9.3 Browsing the NE Backup Progress ...............................................................................................................9-6
9.4 Checking NE Backup Files ...........................................................................................................................9-7
9.5 Restoring the NE Data...................................................................................................................................9-7
10 Troubleshooting.....................................................................................................................10-1
10.1 Client Login Failures.................................................................................................................................10-2
10.1.1 Prompt "Login failed. Confirm that your user name and password are case sensitive and correct."
....................................................................................................................................................................10-2
10.1.2 Prompt "Invalid user account." ........................................................................................................10-2
10.1.3 Prompt "Invalid login duration."......................................................................................................10-2
10.1.4 Prompt Message "Invalid password." ..............................................................................................10-3
10.1.5 Prompt Message "The password has expired. Please change your password! " ..............................10-3
10.1.6 Prompt Message "Maintenance Mode."...........................................................................................10-3
10.1.7 Prompt Message "The User Has Reached the Maximum Login Attempts. The User Account Has
Been Locked, and It Can Be Unlocked in 1 Minute.".................................................................................10-4
10.1.8 Prompt Message "The Server Doesn’t Exist or Service Is Not Running.".......................................10-4
10.1.9 Prompt Message "Exceed Maximum Sessions." ing........................................................................10-5
10.1.10 Prompt Message "Loading Module Failed, System Will Exit.".....................................................10-5
10.1.11 Prompt Message "Failed to Log in to the Server after the Auto Client Upgrade or Running
Exception"...................................................................................................................................................10-5
10.2 Client Running Faults................................................................................................................................10-6
10.2.1 Abortion of the M2000 Client..........................................................................................................10-6
10.2.2 Failure to Run the M2000 Client .....................................................................................................10-6
10.2.3 Abnormal Display of M2000 Client Interface..................................................................................10-7
10.2.4 The Bulb on the GUI Is On and Off Intermittently..........................................................................10-7
10.3 Topology Management Faults...................................................................................................................10-8
10.3.1 Failure to Refresh the Topology View..............................................................................................10-8
10.3.2 Failure to Discover NodeBs Automatically .....................................................................................10-9
10.3.3 Conflicted Names for the Created Topology Objects.......................................................................10-9
10.4 Alarm Management Faults ........................................................................................................................10-9
10.4.1 Time Delay of Alarm Message Real-Time Printing.........................................................................10-9
10.4.2 Failure to Receive Alarm Emails in Real-Time .............................................................................10-10
10.4.3 Failure to Receive Alarm SMSs in Real-Time...............................................................................10-10
10.4.4 Unknown NE Names During the Alarm Query .............................................................................10-10
1 About This Guide
M2000
Operator Guide
viii Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figures
Figure 2-1 M2000 client interface (Physical Topology window)......................................................................2-3
Figure 2-2 Output Window tab in the System Setting dialog box ..................................................................2-4
Figure 2-3 Terminal tab in the System Setting dialog box...............................................................................2-5
Figure 2-4 Customize Toolbar dialog box ........................................................................................................2-6
Figure 3-1 Monitoring the NE statuses through the system monitor browser....................................................3-4
Figure 4-1 An example of CSV templates..........................................................................................................4-5
Figure 4-2 Create NE dialog box ......................................................................................................................4-7
Figure 4-3 Progress of creating physical NEs ....................................................................................................4-8
Figure 4-4 Creating physical NEs in batches ...................................................................................................4-11
Figure 4-5 Creating physical subnets ...............................................................................................................4-15
Figure 4-6 NE Property dialog box.................................................................................................................4-18
Figure 4-7 Modify Physical Subnet dialog box..............................................................................................4-20
Figure 5-1 Process by which a fault alarm changes to a history fault alarm ......................................................5-5
Figure 5-2 Procedure for processing M2000 alarms ..........................................................................................5-6
Figure 5-3 Querying current fault alarms...........................................................................................................5-8
Figure 5-4 Browsing alarms.............................................................................................................................5-11
Figure 5-5 Alarm details...................................................................................................................................5-13
Figure 5-6 Selecting the columns to be displayed in the alarm list ..................................................................5-15
Figure 5-7 Alarm statistics table.......................................................................................................................5-16
Figure 5-8 Alarm statistics pie chart.................................................................................................................5-17
Figure 5-9 Setting conditions for auto acknowledgement................................................................................5-19
Figure 5-10 Auto displacement ........................................................................................................................5-22
Figure 5-11 Manual displacement ....................................................................................................................5-23
Figure 5-12 Redefining the alarm severity (level)............................................................................................5-26
Figure 5-13 Setting correlation for intermittent fault alarms............................................................................5-28
Figure 5-14 Modifying the alarm knowledge...................................................................................................5-31
M2000
Operator Guide Figures
Issue 02 (2006-10-31) Huawei Technologies Proprietary ix
Figure 5-15 Setting the alarm sounds...............................................................................................................5-34
Figure 5-16 Setting the alarm board.................................................................................................................5-35
Figure 5-17 Setting the alarm box filter ...........................................................................................................5-38
Figure 5-18 Setting the remote alarm notification by SMS..............................................................................5-40
Figure 6-1 Levels of measurement counters.......................................................................................................6-4
Figure 6-2 Process of performance measurement of the M2000 system............................................................6-6
Figure 6-3 Selecting the measurement unit and objects .....................................................................................6-9
Figure 6-4 Selecting measurement counters.....................................................................................................6-10
Figure 6-5 Selecting the query period and time................................................................................................6-11
Figure 6-6 Entering a name for the query condition template..........................................................................6-14
Figure 6-7 Synchronizing performance measurement results manually...........................................................6-18
Figure 6-8 Subscribing measurement results....................................................................................................6-20
Figure 6-9 Subscribing results for real-time measurements .............................................................................6-21
Figure 6-10 Please select time segment dialog box........................................................................................6-22
Figure 6-11 Setting extended counters .............................................................................................................6-26
Figure 6-12 Selecting measurement objects.....................................................................................................6-28
Figure 6-13 Adding an alarm threshold for collecting performance measurement results...............................6-31
Figure 6-14 Creating user defined counters .....................................................................................................6-32
Figure 6-15 Setting monitor parameters...........................................................................................................6-35
Figure 6-16 Starting performance monitoring..................................................................................................6-36
Figure 6-17 Setting conditions for filtering monitoring results........................................................................6-38
Figure 6-18 Setting a threshold ........................................................................................................................6-39
Figure 6-19 Setting parameters for the monitoring chart .................................................................................6-41
Figure 6-20 Setting parameters for the trend chart...........................................................................................6-43
Figure 6-21 Setting attributes for the monitoring chart....................................................................................6-44
Figure 6-22 Adding monitoring thresholds ......................................................................................................6-47
Figure 7-1 Querying NE configuration through the MIT browser .....................................................................7-3
Figure 7-2 NE Report dialog box......................................................................................................................7-4
Figure 7-3 Synchronization progress..................................................................................................................7-5
Figure 7-4 Operation Result dialog box...........................................................................................................7-9
Figure 7-5 Selectting an NE and command groups for the created NE user account.......................................7-12
Figure 7-6 Selecting an NE user.......................................................................................................................7-13
Figure 7-7 Selecting command groups.............................................................................................................7-14
1 About This Guide
M2000
Operator Guide
x Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 7-8 Software Browser dialog box .........................................................................................................7-16
Figure 7-9 Synchronizing NE logs automatically ............................................................................................7-17
Figure 7-10 Querying NE logs .........................................................................................................................7-18
Figure 7-11 enhanced NE maintenance............................................................................................................7-21
Figure 7-12 Device panel .................................................................................................................................7-22
Figure 7-13 Monitor Panel ...............................................................................................................................7-23
Figure 7-14 Trace panel....................................................................................................................................7-25
Figure 7-15 MML Command window............................................................................................................7-26
Figure 7-16 Selecting the script mode..............................................................................................................7-28
Figure 7-17 Create Task dialog box................................................................................................................7-29
Figure 8-1 Checking the NE version..................................................................................................................8-3
Figure 8-2 Setting the file server........................................................................................................................8-5
Figure 8-3 Procedure for upgrading the NE software ........................................................................................8-6
Figure 8-4 Selecting the file location and type...................................................................................................8-9
Figure 8-5 Selecting download software parameters........................................................................................8-10
Figure 8-6 Step 1 of 2 for upgrading one NodeB .............................................................................................8-16
Figure 8-7 Step 2 of 2 for upgrading one NodeB .............................................................................................8-16
Figure 8-8 Browsing the license of the current NodeB ....................................................................................8-18
Figure 9-1 Creating a periodic NE backup task..................................................................................................9-5
Figure 10-1 The connection fails between the client and the server.................................................................10-7
M2000
Operator Guide Tables
Issue 02 (2006-10-31) Huawei Technologies Proprietary xi
Tables
Table 3-1 Icons indicating NE connection status................................................................................................3-2
Table 4-1 Descriptions of two link types............................................................................................................4-4
Table 6-1 Exporting the monitoring data..........................................................................................................6-44
Table 8-1 File servers available for the NEs.......................................................................................................8-4
Table 9-1 NE backup data...................................................................................................................................9-2
M2000
Operator Guide 1 About This Guide
Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-1
1 About This Guide
About This Chapter
The following table lists the contents of this chapter.
Title Description
1.1 Purpose Introduces the purpose of this guide.
1.2 Intended Users Introduces the intended users of this guide.
1.3 Organization Introduces the organization of this guide.
1.4 Reference Introduces the reference of this guide.
1 About This Guide
M2000
Operator Guide
1-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
1.1 Purpose
This guide describes how to operate and maintain the network equipment. It includes the
following content:
! Monitoring network performance
! Monitoring network alarms
! Managing network configuration information
! Upgrading the network element (NE) software
! Backing up the NE data
1.2 Intended Users
The guide is intended for the following users:
! Network engineers
! Shift operators
1.3 Organization
This guide consists of the following chapters:
! 1 "About This Guide" introduces the purpose, intended users, and organization of this
guide.
! 2 "Introduction to M2000" describes the procedures for logging in to the M2000 client
and setting the client.
! 3 "NE Connection" describes the types of NEs the M2000 system manages, relevant
operation tasks, and the procedures for connecting types of network equipment.
! 4 "Topology Management" introduces topology management and describes the relevant
operation tasks and procedures.
! 5 "Alarm Management" introduces alarm management and describes relevant operation
tasks and procedures.
! 6 "Performance Management" introduces performance management and describes
relevant operation tasks and procedures.
! 7 "Configuration Management" describes the procedures for configuring and querying
NE service data.
! 8 "NE Software and License Management" describes the operation tasks and procedures
related to NE software and license management.
! 9 "Backup Managemnet" describes the operation tasks and procedures related to server
data backup and NE data backup.
! 10 "Troubleshooting" describes the handling suggestions for common faults that may
occur during operations on the client.
M2000
Operator Guide 1 About This Guide
Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-3
1.4 Reference
When you read this guide, see M2000 Online Help for more information.
M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-1
2 Introduction to M2000
About This Chapter
The following table lists the contents of this chapter.
Title Description
2.1 Introduction to the M2000
System
Introduces the M2000 system.
2.2 Logging in to the M2000
Client
Describes how to log in to the M2000 client.
2.3 Setting Properties of the
M2000 Client
Describes how to set the properties of the M2000 client.
2 Introduction to M2000
M2000
Operator Guide
2-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
2.1 Introduction to the M2000 System
iManager M2000 Mobile Element Management System (M2000 for short) is the network
management system (NMS) for Huawei mobile communications products. It works in the
widely used Client/Server mode. The M2000 system contains a set of servers and multiple
clients connected to the servers.
! The M2000 server runs on the Unix platform. The server processes and stores NE data.
! The M2000 clients run on the Windows platform. The clients provide friendly graphical
interfaces for operations and maintenance on the NEs.
2.2 Logging in to the M2000 Client
Description
Start the M2000 Client, and log in to the M2000 server.
After logging in to the M2000 client successfully, you can use the client to perform routine
operation and maintenance for the network equipment.
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before logging in to the M2000 client, ensure that:
! The M2000 client software is installed.
! The corresponding M2000 server is working properly.
! The software versions of the M2000 client and the M2000 server match.
! The M2000 client communicates normally with the M2000 server.
! You have the required user name and password.
Procedure
To log in to the M2000 client, perform the following steps:
Step 1 Choose Start > Programs > iManager M2000 Client > M2000 Client to start the M2000
client.
You can configure the path for the menu iManager M2000 Client > M2000 Client in Start >
Programs when you install the client software. The default path is iManager M2000 Client.
Step 2 In the displayed User Login dialog box, enter the server IP address to log in to the M2000
client.
M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-3
If User Login does not list the information about the specified server, click . The Server
Information dialog box is displayed.
In this dialog box, set the server information, such as the server IP and sever port.
Step 3 Enter the user name and password. Click Login.
After the connection is set up, the client obtains the required data from the server. After the
data is loaded, the Physical Topology window is displayed, as shown in Figure 2-1. The
Physical Topology window is the M2000 client interface.
Figure 2-1 M2000 client interface (Physical Topology window)
----End
2.3 Setting Properties of the M2000 Client
2.3.1 Setting Properties of the System
Description
Set the following properties of the M2000 client.
! Mode for displaying messages
! Maximum output lines
! Auto displacement
! Auto locking period
2 Introduction to M2000
M2000
Operator Guide
2-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before setting the properties of the system, ensure that you have logged in to the M2000
client.
Procedure
To set the properties of the M2000 client, perform the following steps:
Step 1 Choose System > System Setting.
The System Setting dialog box is displayed, as shown in Figure 2-2.
Figure 2-2 Output Window tab in the System Setting dialog box
Step 2 In the Output Window tab, set parameters such as Maximum Output Lines.
Step 3 Click the Terminal tab in the System Setting dialog box, as shown in Figure 2-3.
M2000
Operator Guide 2 Introduction to M2000
Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-5
Figure 2-3 Terminal tab in the System Setting dialog box
Step 4 Set the period for Automatically locked or turn off the option.
Step 5 Click OK.
----End
2.3.2 Customizing Toolbar
Description
Create the self defined toolbar in the M2000 client.
Network Equipment Supporting This Task
NEs are not involved.
Prerequisites
Before customizing the toolbar, ensure that you have logged in to the M2000 client.
Procedure
To customize the toolbar, perform the following steps:
2 Introduction to M2000
M2000
Operator Guide
2-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Step 1 Choose Tools > Customize Toolbar.
The Customize Toolbar dialog box is displayed, as shown in Figure 2-4.
Figure 2-4 Customize Toolbar dialog box
Step 2 Select the tool groups and button on the toolbar.
Step 3 Click OK.
----End
M2000
Operator Guide 3 NE Connection
Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-1
3 NE Connection
About This Chapter
The following table lists the contents of this chapter.
Title Description
3.1 Connecting NEs to the
M2000
Introduces how to connect the NEs to the M2000.
3.2 Monitoring Connection
Status of NEs
Describes how to monitor the connection statuses of the
NEs in the topology view or through the system monitor
browser.
3 NE Connection
M2000
Operator Guide
3-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
3.1 Connecting NEs to the M2000
After the NEs are connected to the M2000, you can operate or maintain the NEs through the
M2000 system.
Debug the NEs and ensure that they work well before you connect them to the M2000 system.
For details, see the M2000 Commissioning Guide.
3.2 Monitoring Connection Status of NEs
3.2.1 Introduction to Connection Status of NEs
In the topology view, the connection statuses of the NEs are shown by NE icon and NE status
icon. The NE status icon is displayed at the top left of the NE icon. Multiple NE icons
displayed at the same time indicate that the NE is in several connection statuses.
When the NE and the M2000 are connected, the NE icon and NE status icon is displayed in
the topology view. You can operate and maintain the NE through the M2000.
When the NE is processing synchronization or disconnected with the M2000, the NE status
icons are displayed at the top left corner of the NE icon, as shown in Table 3-1.
Table 3-1 Icons indicating NE connection status
Icon Meaning Description
Synchronization
processing
The M2000 extracts the NE configuration from the NE. The
data is synchronized when the NE is connected or reconnected
to the M2000.
Connection
down
The M2000 server is disconnected with the NE.
The O&M (operation and maintenance) path between the NE
and the M2000 does not work smoothly, or errors occur to
some TCP or UDP ports.
NE not match The NE is not matched.
The O&M path between the NE and the M2000 works well.
You cannot, however, operate or maintain the NE through the
M2000 because the NE is not installed with the right version of
the mediation package.
Forbid Connect The NE is prohibited from being connected to the M2000
server.
Unknown type The current system does not support the NE type.
FourStates The NE state contains four or more states.
M2000
Operator Guide 3 NE Connection
Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-3
3.2.2 Monitoring NE Status in the Topology View
Description
Monitor the status of the NEs in the topology view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before monitoring the status of an NE, ensure that you have logged in to the M2000 client.
Procedure
To monitor the status of an NE in the topology view, perform the following steps:
Step 1 Click the Tree tab on the left of the topology view.
Step 2 Select the subnet with the NE.
Step 3 Select the NE.
The NE status is shown in the topology view on the right of the topology view. Here are two
examples,
! shows that the NE HLR36 is in the Connected status.
! shows that the NE MGW is in the Connection down status.
For the NEs in the Connection down status, contact the department concerned immediately.
----End
3.2.3 Monitoring NE Status through the System Monitor Browser
Description
View the connection status of NEs through the system monitor browser.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before monitoring NE status through the system monitor browser, ensure that you have
logged in to the M2000 client.
3 NE Connection
M2000
Operator Guide
3-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Procedure
To monitor NE status through the system monitor browser, perform the following steps:
Step 1 Choose Tools > System Monitor > Monitor Browser.
The System Monitor Browser dialog box is displayed.
Step 2 Click the NE Monitor tab.
The status of each NE is displayed, as shown in Figure 3-1.
Figure 3-1 Monitoring the NE statuses through the system monitor browser
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-1
4 Topology Management
About This Chapter
The following table lists the contents of this chapter.
Title Description
4.1 Terminologies Related to
Topology Management
Introduces the glossary related to topology management.
4.2 Creating NEs Describes how to create the NEs in the topology view and
in batches.
4.3 Deleting NEs Describes how to delete the NEs and the group NEs in the
topology view.
4.4 Creating Subnets Describes how to create the subnets in the topology view.
4.5 Deleting Subnets Describes how to delete the subnets in the topology view.
4.6 Creating Links Describes how to create the links in the topology view.
4.7 Moving NEs Describes how to move the NEs in the topology view.
4.8 Filtering NEs in the
Topology View
Describes how to filter the NEs in the topology view.
4.9 Customizing Topology
Tips
Describes how to customize the topology tips.
4.10 Switching Background
Maps
Describes how to switch the background maps of the
topology views.
4 Topology Management
M2000
Operator Guide
4-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.1 Terminologies Related to Topology Management
4.1.1 Topology View
Meaning
The topology view is the mapping of the communication network (managed through the
M2000 system) on the M2000. The topology view shows the equipment and the connection
between the equipment in the form of view and tree. It also provides entry points for the
operations related to the configuration, alarm, and performance management through the
client.
The M2000 topology view consists of two parts: tree and view.
! The navigation tree on the left shows all the involved topology objects, such as NEs,
subnets, and the hierarchical architecture between these objects.
! The topology view on the right shows all the topology objects in the current network and
the location-related relationship between these objects.
The system synchronizes the navigation tree and the topology view automatically.
Examples
The displayed window after you log in the M2000 client is a topology view.
4.1.2 Network Elements
Meaning
Topology management uses NEs to identify the communication equipment in the network.
! Physical NE
Physical NEs are the communication devices that can be managed by the M2000.
! Virtual NE
The third-party communication equipment in the entire communication network. The
M2000 cannot manage the equipment. Virtual NEs help complete the structure of the
communication network.
In the topology view, the physical NE and virtual NE are distinguished by different icon
colors. For example, the physical NE HLR is displayed as in the topology view, while
the virtual NE HLR is displayed as .
The equipment type corresponds to the NE type. The NE types are identified by different icons. You can
view the icons by clicking the Legend tab in the left of the window.
Examples
Some examples of NEs are as follows:
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-3
! Huawei BTS3812A sets up a physical connection with the M2000; thus it is a physical
NE.
! The third-party equipment MOTOROLA HLR is a virtual NE.
! The M2000 itself is a special NE. The M2000 is displayed as OMC in the topology view.
4.1.3 Subnets
Meaning
To manage NEs more efficiently, the huge M2000 network can be divided into several smaller
networks based on certain principles, such as by region. These smaller networks are called
subnets in the topology.
Examples
An example of subnets is as follows:
If the M2000 can manage all the NEs in the provinces A, B and C, these NEs can be divided
into three subnets by region (herein province).
The three subnets can also be divided into smaller subnets by city or county. In other words, a
subnet can be nested in another subnet.
4.1.4 Group NEs
Meaning
Some NEs in the communication network form a certain hierarchical architecture. The Group
NE is an NE that works as both an NE and a subnet.
Examples
Some examples of group NEs are as follows:
! An RNC is a group NE. It manages NodeB NEs.
! An MSC Server is a group NE. It manages MGW NEs.
4.1.5 Links
Meaning
The topology view uses links to identify the physical or logical connections between the
communication equipment. There are two types of links, physical and virtual, as shown in
Table 4-1.
4 Topology Management
M2000
Operator Guide
4-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Table 4-1 Descriptions of two link types
Link
type
Description
It refers to the signaling connections between two physical NEs.
M2000 supports six types of physical links: MTP3, MTP3B, DATALINK,
M3UA, H248, and BICCSCTP.
MTP3
MTP3B
MTP3 and MTP3B can only be created manually.
! The NE at one side of the link must be a physical MGW.
! The NE at the other side of the link can be a physical MSC
Server, or a virtual RNC or MSC Server.
DATALINK
M3UA
H248
Physical
link
BICCSCTP
These three types are created by the system automatically.
! DATALINK links can be created between a physical CG and
a physical GGSN80 or SGSN.
! H248 and M3UA links can only be created between a
physical MGW and MSC Server.
! BICCSCTP links can only be created between a physical
MSC Server.
Virtual
link
! Virtual link refers to the logical communication connections between two
NEs.
! Virtual links can only be created manually. You can modify or delete virtual
links.
Examples
Some examples of the links are as follows:
! The links between physical MGW and virtual MSC Server are physical links created by
the manually.
! The links between virtual MSC Server and virtual HLR are virtual links created
manually.
4.1.6 Topology Objects
Meaning
NEs, subnets, and group NEs are topology objects.
Examples
Some examples of topology objects are as follows:
! Huawei communication equipment BTS3812 that communicates with the M2000 is a
topological object.
! The manually created virtual link is a topological object.
! The manually created subnet C is a topological object.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-5
4.1.7 Templates for Creating Physical NEs in Batches
Meaning
To create NEs in batches on the M2000 client, you must create a script file manually and
perform the creation in bathes through executing the script.
Templates for creating physical NEs in batches are the standard templates provided by the
M2000 client. You only need to export the template, and then enter the information of the NEs
to be created. Two formats of templates are available: INI and CSV.
Templates for creating physical NEs in batches are the standard templates provided by the
M2000 client. Two formats of templates are available: INI and CSV.
Templates in the CSV Format
The templates in the CSV format apply only to the NEs in WCDMA networks.
Use the Microsoft Excel to edit the templates in the CSV format. All the NEs apply the same
parameter group, as shown in Figure 4-1.
Figure 4-1 An example of CSV templates
Templates in the INI Format
The templates in the INI format apply to create all types of NEs in batches except virtual NEs.
Use the notepad to edit the templates in the INI format. Different from the CSV templates, the
INI templates apply different parameter groups. To create multiple NEs of the same class, the
corresponding parameter groups should be provided accordingly.
The following examples show the parameter groups for some typical NEs.
Example 1: RNC
[RNC]
Name =
Vendor =
Physical Location =
District =
IP address =
Description =
Pos X =
Pos Y =
Position =
Coordination =
4 Topology Management
M2000
Operator Guide
4-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Example 2: BSC
[BSC]
Name =
Vendor =
Physical Location =
District =
IP address =
Description =
Username =
Password =
Pos X =
Pos Y =
Position =
Coordination =
For the parameters of the INI templates, see M2000 Online Help.
4.2 Creating NEs
4.2.1 Creating Physical NEs
Description
Create physical NEs in the topology view.
After you create an NE successfully, the M2000 synchronizes the NE to obtain the NE
configuration data.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a physical NE, ensure that:
! You have logged in to the M2000 client.
! The mediation software for the NE to be created is installed.
! You have obtained the NE information, such as the NE name, IP address, NE version,
and district information.
Procedure
To create a physical NE in the topology view, perform the following steps:
Step 1 Right-click in the topology view, and select Create NE on the displayed menu.
The Create NE dialog box is displayed, as shown in Figure 4-2.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-7
Figure 4-2 Create NE dialog box
Step 2 Select the physical NE category in the Select Category drop-down list.
Step 3 Select the NE type in the Select NE Type drop-down list.
Step 4 Click Next.
Step 5 Select the district.
Enter the information such as the NE name and IP address.
Step 6 Click Finish.
The prompt dialog box Create NE displays the progress of the NE creation.
For example, the progress of creating the BSC NE is as shown in Figure 4-3.
4 Topology Management
M2000
Operator Guide
4-8 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 4-3 Progress of creating physical NEs
The icon for this NE is displayed in the topology view while the system displays the
synchronization progress . The progress bar closes automatically after 100% is displayed.
You can operate and maintain the NE through the M2000 client.
----End
4.2.2 Creating Virtual NEs
Description
Create virtual NEs in the physical topology.
After you create a virtual NE successfully, the icon for this NE is displayed in the topology
view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a virtual NE, ensure that:
! You have logged in to the M2000 client.
! You have obtained the information about the NE, such as the NE name, IP address, and
district information.
Procedure
To create a virtual NE in the topology view, perform the following steps:
Step 1 Right-click in the topology view, and select Create NE on the displayed menu.
The Create NE dialog box is displayed, as shown in Figure 4-2.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-9
Step 2 Select Virtual NEs in the Select Category drop-down list.
Step 3 Select an NE type in the Select NE Type drop-down list.
Step 4 Click Next.
Step 5 Select the district of the NE. Enter the information such as the NE name and IP address.
Step 6 Click Finish.
The prompt dialog box Create NE displays the progress of the NE creation. After the NE is
successfully created, the icon is displayed in the topology view.
----End
4.2.3 Creating NE Batch Script Files in CSV Format
Description
Create an NE batch file in the CSV format. The NE batch file is used for creating NEs in
batches.
Network Equipment Supporting This Task
Physical NEs in WCDMA networks.
Prerequisites
Before creating an NE batch file in the CSV format, ensure that:
! You have obtained the information about the NE Type, IP address, NE version and
district.
! The version Excel97 or higher is installed and runs normally.
Procedure
To create an NE batch file in the CSV format, perform the following steps:
Step 1 Choose Configuration > Exports NE Attributes Template > CSV File Format to view
Export NE Info template (CSV file format) dialog box.
Step 2 Click . Save the template.
Step 3 Open the template file, and enter the information of each NE, such as the NE type, NE name,
NE version, and district.
Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For
details, see part 4.2.1 "Creating Physical NEs."
Step 4 Save the file.
----End
4 Topology Management
M2000
Operator Guide
4-10 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.2.4 Creating NE Batch Script Files in INI Format
Description
Create an NE batch file in the INI format. The NE batch file is used for creating NEs in
batches.
Network Equipment Supporting This Task
All NEs equipment except the virtual NEs.
Prerequisites
You have obtained the NE information such as the NE Type, IP address, NE version and
district.
Procedure
To create an NE batch file in the INI format, perform the following steps:
Step 1 Choose Configuration > Exports NE Attributes Template > INI File Format to view
Export NE Info template (INI file format) dialog box.
Step 2 Select the NE type. Click , and save the template.
Step 3 Open the template file, and enter the information of each NE, such the NE type, NE name, NE
version and district.
Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For
details, see part 4.2.1 "Creating Physical NEs."
Step 4 Save the file.
----End
4.2.5 Creating Physical NEs in Batches
Description
By creating physical NEs in batches, you can add multiple physical NEs in the same subnet
into the topology view in batches at a time.
The M2000 obtains the information about these NEs created from the batch files, and then
synchronizes these NEs to obtain the configuration data.
Network Equipment Supporting This Task
! This task applies to creating physical NEs in WCDMA networks when the script file is in
the CSV format.
! This task applies to creating all NEs except virtual NEs when the script file is in the INI
format.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-11
Prerequisites
Before creating physical NEs in batches, ensure that:
! You have logged in to the M2000 client.
! The mediation software of the NE to be created is installed.
! The NE batch script files are created. For details, see part 4.2.3 "Creating NE Batch
Script Files in CSV Format" and part 4.2.4 "Creating NE Batch Script Files in INI
Format"
Procedure
To create multiple physical NEs in batches, perform the following steps:
Step 1 Right-click in the topology view, and select Create Physical NEs in batch on the displayed
menu.
The Create Physical NEs in batch dialog box is displayed, as shown in Figure 4-4.
Figure 4-4 Creating physical NEs in batches
Step 2 Click . Select a file for creating NEs in batches.
Step 3 Click Verify. Check the script file configuration.
Step 4 Click OK.
The NE is created in the topology view.
Click Cancel to cancel the creating operation.
4 Topology Management
M2000
Operator Guide
4-12 Huawei Technologies Proprietary Issue 02 (2006-10-31)
----End
4.3 Deleting NEs
4.3.1 Deleting Physical NEs
Description
Delete physical NEs from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a physical NE, ensure that:
! You have logged in to the M2000 client.
! The physical NE exists in the M2000, and it is not a group NE.
Procedure
To delete a physical NE from the topology view, perform the following steps:
Step 1 Select a physical NE in the topology view.
Step 2 Right-click the NE, and select Delete on the displayed menu.
Step 3 Click Yes in the displayed Confirm dialog box.
The deletion progress is displayed in percentage. When 100% is displayed, the physical links
of the physical NE are deleted automatically.
----End
4.3.2 Deleting Virtual NEs
Description
Delete virtual NEs from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a virtual NE, ensure that:
! You have logged in to the M2000 client.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-13
! The virtual NE exists in the M2000.
Procedure
To delete a virtual NE from the topology view, perform the following steps:
Step 1 Select the virtual NE in the topology view.
Step 2 Right-click the NE, and select Delete on the displayed menu.
Step 3 Click Yes in the displayed Confirm dialog box to delete the virtual NE.
If the virtual NE contains sub-NEs, the sub-NEs are displayed in the upper physical topology after you
delete the virtual NE.
----End
4.3.3 Deleting Group NEs
Description
Delete group NEs from the physical topology.
Network Equipment Supporting This Task
BSC, MGW, RNC and MSC Server.
Prerequisites
Before deleting a group NE from the physical topology, ensure that:
! You have logged in to the M2000 client.
! The group NE to be deleted exists in the M2000.
Procedure
To delete the group NE, perform the following steps:
Step 1 Select the group NE to be deleted in the topological view.
Step 2 Right-click the group NE, and select Delete on the displayed menu.
Step 3 Click Yes in the Confirm prompt dialog box to delete the group NE from the current view.
If the group NE contains other NEs, it exists as a virtual NE. In this case, the icon becomes a virtual
icon.
----End
4 Topology Management
M2000
Operator Guide
4-14 Huawei Technologies Proprietary Issue 02 (2006-10-31)
4.4 Creating Subnets
Description
Create subnets in the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a subnet in the physical topology, ensure that:
! You have logged in to the M2000 client.
! The topological view and the network architecture are well planned.
! Procedure
To create a subnet, perform the following steps:
Step 1 Right-click in the topology view, and select Create Physical Subnet on the displayed menu.
The dialog box Create Physical Subnet is displayed, as shown in Figure 4-5.
Step 2 Click the Basic Attribute tab. Set the subnet attributes.
Step 3 Click the Background Selection tab. Set the background.
Step 4 Click the Objects Selection tab. Select the NEs and subnets to be displayed under this subnet.
Step 5 Click OK.
After the creation, you can view the icon of this subnet in the topology view. Double-click the
icon to view the NEs and subnets under this subnet.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-15
Figure 4-5 Creating physical subnets
----End
4.5 Deleting Subnets
Description
Delete subnets from the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before deleting a subnet, ensure that:
! You have logged in to the M2000 client.
! The subnet exists in the M2000.
Procedure
To delete a subnet from the topology view, perform the following steps:
Step 1 Select the subnet in the topology view.
4 Topology Management
M2000
Operator Guide
4-16 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Step 2 Right-click the subnet, and select Delete on the displayed menu.
The Confirm dialog box is displayed.
Step 3 Click Yes in the Confirm prompt dialog box.
NEs and subnets under this subnet, if any, are displayed in the upper physical topology after you delete
this subnet.
----End
4.6 Creating Links
4.6.1 Creating Physical Links
Description
Create physical links in the topology view manually.
Network Equipment Supporting This Task
MGW and MSC Server.
Prerequisites
Before creating a physical link in the topology view, ensure that:
! You have logged in to the M2000 client.
! The topology view and the network architecture are well planned.
Procedure
To create a physical link, perform the following steps:
Step 1 Right-click in the topology view, and select Create Link on the displayed menu.
The Create Link dialog box is displayed.
Step 2 Select the link type in the Create Link dialog box.
Step 3 Click . Select the NE for link side A and side Z.
In the End A MO and End Z MO areas, select the configuration for the two ends of the link.
Click to add the configuration to the list on the right.
! To set up multiple links, repeat the above steps.
! To reselect the NEs, click Reset.
Step 4 Click Create or Close.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-17
The prompt dialog box Create Link displays the progress of the link creation. After the
creation, a link is displayed between the two NEs.
----End
4.6.2 Creating Virtual Links
Description
Create virtual links in the topology view.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before creating a virtual link in the topology view, ensure that:
! You have logged in to the M2000 client.
! The topology view and the network architecture are well planned.
Procedure
To create a virtual link, perform the following steps:
Step 1 Right-click in the topology view, and select Create Virtual Link on the displayed menu.
The Create Virtual Link dialog box is displayed.
Step 2 Enter the name of the virtual link.
Step 3 Select the NEs in the end A and end Z of the link.
Step 4 Click OK.
After the creation, a link is displayed between the two NEs.
----End
4.7 Moving NEs
4.7.1 Moving NEs to a Group NE
Description
Move one or more NEs to a group NE in the topology view.
Network Equipment Supporting This Task
Move the NodeB to the RNC and the MGW to the MSC Server.
4 Topology Management
M2000
Operator Guide
4-18 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Prerequisites
Before moving an NE to a group NE, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the same subnet as the group NE.
Procedure
To move an NE to a group NE, perform the following steps:
Step 1 Select the target group NE in the topology view.
Step 2 Right-click the NE, and select Property on the displayed menu.
The NE Property dialog box is displayed, as shown in Figure 4-6.
Figure 4-6 NE Property dialog box
Step 3 Click the Object Selection tab.
Step 4 Select the NE to be moved to the group NE in the Available Objects list, and click .
The NE is added to the Selected Objects list.
Step 5 Click OK.
Double-click the group NE icon to view the group NE and the NEs under it.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-19
----End
4.7.2 Moving NEs to another Subnet
Description
Move one or more NEs to another subnet in the physical topology.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before moving an NE to another subnet, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the same network layer as the target subnet.
Procedure
To move an NE to another subnet, perform the following steps:
Step 1 Select the target subnet in the topology view.
Step 2 Right-click the NE, and select Modify on the displayed menu.
The Modify Physical Subnet dialog box is displayed, as shown in Figure 4-7.
4 Topology Management
M2000
Operator Guide
4-20 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 4-7 Modify Physical Subnet dialog box
Step 3 Click the Objects Selection tab.
Step 4 Select the NE to be moved to the subnet in the Available Objects list, and click .
The NE is added to the Selected Objects list.
Step 5 Click OK.
Double-click the group NE icon to view all the NEs under this subnet.
----End
4.7.3 Moving NEs on the Same Subnet
Description
Move an NE to other locations in the same subnet in the topology view.
This operation changes only the location of the NE in the topology view. The actual geographical
location and physical connections of the NE is not concerned.
Network Equipment Supporting This Task
All manageable network equipment.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-21
Prerequisites
Before moving an NE in the same subnet, ensure that:
! You have logged in to the M2000 client.
! The NE exists in the M2000.
Procedure
To move an NE in the same subnet, perform the following steps:
Step 1 Select the NE in the topology view.
Step 2 Drag it to the required location.
Step 3 Click in the toolbar in the middle part to save the new location of the NE.
----End
4.8 Filtering NEs in the Topology View
Description
Set the filtering conditions as required, so that it shows only certain objects, such as the
background, NE, subnet, and link name.
Network Equipment Supporting This Task
All manageable network equipment.
Prerequisites
Before filtering NEs, ensure that you have logged in to the M2000 client.
Procedure
To filter NEs in the topology view, perform the following steps:
Step 1 Click the Filter tab in the left pane of the topology view.
Step 2 Select the objects to be displayed in the navigation tree.
The objects that are not selected are not displayed in the topology view.
----End
4.9 Customizing Topology Tips
Description
Topology tips are the prompt information displayed after the mouse pointer rests on an object
for several seconds.
4 Topology Management
M2000
Operator Guide
4-22 Huawei Technologies Proprietary Issue 02 (2006-10-31)
You can customize the counter items as prompt information as required. The counter items are
classified into three types by NE, Link and District.
Network Equipment Supporting This Task
No NEs are involved.
Prerequisites
Before customizing topology tips, ensure that you have logged in to the M2000 client.
Procedure
To customize topology tips, perform the following steps:
Step 1 Choose Tools > Customize Topology Tips.
The Customize Topology Tips dialog box is displayed.
The system displays the counter item (activated or to be set) of the first NE in the navigation
tree by default.
Step 2 Select a counter in the navigation tree.
Step 3 Set the counter item in the right of the dialog box.
Step 4 Click OK or Apply.
----End
4.10 Switching Background Maps
Description
Two views, topology view and map view, are available in the M2000.
! You can only switch the background maps of the topology views.
! The background of the topology view is Empty map by default. In other words, the topology view
has no background maps.
The file format that can serve as the background map of the topology view in the M2000
includes: GIF, IVL, JPEG, JPG, MIF, and SHP.
Network Equipment Supporting This Task
No NEs are involved.
Prerequisites
Before setting the background map of the topology view, ensure that:
! You have logged in to the M2000 client.
! The electronic maps exist in the M2000 client.
M2000
Operator Guide 4 Topology Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-23
Procedure
To switch electronic maps in the M2000 client, perform the following steps:
Step 1 Right-click in the topology view, and select Set BackGround on the displayed menu.
The Set BackGround dialog box is displayed.
Step 2 Click Select, and select the electronic map file.
Step 3 Click OK.
After that, the electronic map selected becomes the background of the topology view.
----End
M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-1
5 Alarm Management
About This Chapter
The following table lists the contents of this chapter.
Title Description
5.1 Introduction to Alarms Introduces the alarm categories, alarm severity levels and
the alarm types.
5.2 Alarm Statuses Introduces the alarm statuses.
5.3 Alarm Processing
Procedures
Introduces the alarm processing procedures.
5.4 Querying and Browsing
Alarms
Describes how to query and browse the alarms.
5.5 Collecting Alarm Statistics Describes how to collecting the alarm statistics.
5.6 Acknowledging and
Unacknowledging Alarms
Describes how to acknowledge and un acknowledge the
alarms.
5.7 Creating User Defined
Alarms
Describes how to create a user defined alarm.
5.8 Displacing Alarms to a
File
Describes how to displace the alarms to a file.
5.9 Synchronizing Alarms Describes how to synchronize the alarms manually and
automatically.
5.10 Redefining the Alarm
Severity Level
Describes how to redefine the alarm severity levels.
5.11 Setting Alarm Correlation
Rules
Describes how to set the alarm correlation rules.
5.12 Managing the Alarm
Knowledge Library
Describes how to manage the alarm knowledge library.
5 Alarm Management
M2000
Operator Guide
5-2 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Title Description
5.13 Operating the Alarm
Board
Describes how to operate the alarm board.
5.14 Operating the Alarm Box Describes how to operate the alarm box.
5.15 Setting the Alarm
Notification by SMS
Describes how to set the alarm notification by SMS.
5.16 Setting the Alarm
Notification by PhoneNo. or
PagerNo.
Describes how to set the alarm notification by phoneNo.
or pagerNo..
5.17 Setting the Alarm
Notification by Email
Describes how to set the alarm notification by Email.
M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-3
5.1 Introduction to Alarms
5.1.1 Alarm Categories
Alarms can be categorized based on two principles:
! By alarm content: event alarms and fault alarms
! By alarm handling and clearance: history fault alarms and shielded alarms
These four categories of alarms are described as follows:
! Fault alarms, such as a board fault alarm, are generated when faults occur to hardware
devices or exceptions occur to key functions. Fault alarms are more severe than event
alarms. Fault alarms can be cleared.
! Event alarms, such as a congestion alarm, are occasionally generated during the
equipment operation. The event alarms indicate only the equipment status at a certain
point of time. The system generates some event alarms periodically. Event alarms do not
need manual handling.
! History fault alarms refer to the cleared and acknowledged fault alarms.
! Shielded alarms are generated during a short period of time. The alarms matching the
correlation rules set on the M2000 client are shielded alarms, and they are stored in the
M2000 shielding library. Shielded alarms can only be fault or event alarms.
5.1.2 Alarm Severity Levels
Alarm severity level indicates how severe a generated alarm is. Sorted in the descending order,
alarms have four severity levels: critical, major, minor, and warning .
! Critical alarms, such as the power circuit fault alarm or the output clock fault alarm,
affect the whole system operation. Critical alarms require immediate handling.
! Major alarms, such as alarms about disconnected fibers or physical line faults, occur
only to boards or lines. If not handled timely, these alarms may affect the services.
! Minor alarms, such as the alarm for bit errors in some physical lines, refer to common
status alarms that indicate the working status of boards or lines.
! Warning alarms indicate status changes or events which do not affect the system
performance or subscriber services, but may interest the operator. Some warning alarms
prompt when the equipment returns to normality.
5.1.3 Alarm Types
Based on the alarm source, the following types of alarms are available:
! Power alarms: related to the power supply system
! Environment alarms: related to the equipment environment, such as the temperature,
humidity, and connection control
! Signaling alarms: related to communication signaling
! Trunk alarms: related to trunk circuits
! Hardware alarms: related to boards such as the clock and CPU
! Software alarms: related to the software
5 Alarm Management
M2000
Operator Guide
5-4 Huawei Technologies Proprietary Issue 02 (2006-10-31)
! Running alarms: related to and generated during the system operation
! Communication alarms: related to the communication system
! QoS alarms: related to the service quality
! Processing error alarms: related to exceptions
5.2 Alarm Statuses
5.2.1 Acknowledged Alarms
The alarm acknowledgement function helps to identify alarms. After you acknowledge an
alarm manually, the M2000 displays the alarm as acknowledged. In this way, you can easily
distinguish between the alarms processed manually and those to be processed.
This status, however, only indicates that the alarm is currently acknowledged. It does not
indicate that the alarm is cleared.
5.2.2 Cleared Alarms
Alarm clearance applies only to fault alarms. When a fault alarm is cleared, the NE returns to
normality and reports the alarm clearance information to the M2000. For those alarms that
cannot be cleared automatically, the M2000 system supports manual clearance.
5.2.3 Relationship Between Alarm Categories and Alarm Statuses
Fault Alarms Changing to History Fault Alarms
Fault alarms can be in the following four statuses:
! Uncleared and unacknowledged
! Uncleared and acknowledged
! Cleared and unacknowledged
! Cleared and acknowledged
For an acknowledged and cleared alarm, the M2000 moves the alarm from the current fault
alarm library to the history fault alarm library. Accordingly, the alarm changes to a history
fault alarm.
For an unacknowledged or uncleared alarm, the alarm remains in the current fault alarm
library as a current fault alarm.
Figure 5-1 shows how a current fault alarm changes to a history fault alarm.
M2000
Operator Guide 5 Alarm Management
Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-5
Figure 5-1 Process by which a fault alarm changes to a history fault alarm
Event Alarms
Event alarms can be in two statuses: acknowledged and unacknowledged. They do not change
to other alarms.
5.3 Alarm Processing Procedures
5.3.1 Overview
Figure 5-2 shows how the M2000 system processes alarms.
5 Alarm Management
M2000
Operator Guide
5-6 Huawei Technologies Proprietary Issue 02 (2006-10-31)
Figure 5-2 Procedure for processing M2000 alarms
After receiving alarms from an NE or the M2000 itself, the M2000 shields the alarms,
redefines the alarm severity levels, or correlates the alarms before saving the alarms in the
alarm library.
You can query the alarm information and acknowledge the alarms on the M2000 client.
5.3.2 Reporting Alarms
When an alarm is generated, the NE reports the alarm to the M2000 through the MML
command line interface, the binary interface, or the SNMP Trap (the IP networking
equipment), between the NE and the M2000.
5.3.3 Saving Alarms
After receiving an alarm, the M2000 processes the alarm, and then either saves the alarm in
the relevant alarm library or discards the alarm as follows:
Step 1 The M2000 checks if the alarm belongs to the shielded alarms defined on the M2000. If the
alarm belongs to the shielded alarms, the M2000 discards the alarm.
Step 2 The M2000 checks if the alarm is defined with another severity (level) on the M2000. If the
alarm is defined with another severity (level), the M2000 redefines the severities (levels) of
the alarm.
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide
M2000 operation-guide

More Related Content

What's hot

Bts3900 Site Maintenance Guide(V200 01)
Bts3900 Site Maintenance Guide(V200 01)Bts3900 Site Maintenance Guide(V200 01)
Bts3900 Site Maintenance Guide(V200 01)Atif Mahmood
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionRabih Kanaan,PMP
 
Lte x2 ap_3gpp_36423-pdf
Lte x2 ap_3gpp_36423-pdfLte x2 ap_3gpp_36423-pdf
Lte x2 ap_3gpp_36423-pdfsaint_40s
 
Huawei BTS 3900 Hardware Structure
Huawei BTS 3900 Hardware StructureHuawei BTS 3900 Hardware Structure
Huawei BTS 3900 Hardware Structureibrahimnabil17
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enVugar Ali
 
Zte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guideZte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guideAlfri Dinata
 
08 gsm bss network kpi (immediate assignment success rate) optimization manual
08 gsm bss network kpi (immediate assignment success rate) optimization manual08 gsm bss network kpi (immediate assignment success rate) optimization manual
08 gsm bss network kpi (immediate assignment success rate) optimization manualtharinduwije
 
Lte radio netwok planning
Lte   radio netwok planning Lte   radio netwok planning
Lte radio netwok planning tharinduwije
 
TDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B NetworkTDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B NetworkRay KHASTUR
 
Subrack and cabinet numbering rules
Subrack and cabinet numbering rulesSubrack and cabinet numbering rules
Subrack and cabinet numbering rulesKhawla Boulaares
 
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...tharinduwije
 
Huawei umts o&m planning and configuration
Huawei umts o&m planning and configurationHuawei umts o&m planning and configuration
Huawei umts o&m planning and configurationTerra Sacrifice
 
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...16 gsm bss network kpi (inter rat handover success rate) optimization manual[...
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...tharinduwije
 
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doctharinduwije
 
Genex assistant operation guide (lte)
Genex assistant operation guide (lte)Genex assistant operation guide (lte)
Genex assistant operation guide (lte)Roel Gabon
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimizationshagahod
 
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)Cell management (e ran3.0 05)
Cell management (e ran3.0 05)Danilo Silvestri
 

What's hot (20)

Bts3900 Site Maintenance Guide(V200 01)
Bts3900 Site Maintenance Guide(V200 01)Bts3900 Site Maintenance Guide(V200 01)
Bts3900 Site Maintenance Guide(V200 01)
 
Handover 3g
Handover 3gHandover 3g
Handover 3g
 
ZTE-umts-congestion-control-feature-guide-v8-5-2011312
ZTE-umts-congestion-control-feature-guide-v8-5-2011312ZTE-umts-congestion-control-feature-guide-v8-5-2011312
ZTE-umts-congestion-control-feature-guide-v8-5-2011312
 
Huawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production descriptionHuawei hss9860 v900 r008c20 production description
Huawei hss9860 v900 r008c20 production description
 
Lte x2 ap_3gpp_36423-pdf
Lte x2 ap_3gpp_36423-pdfLte x2 ap_3gpp_36423-pdf
Lte x2 ap_3gpp_36423-pdf
 
Huawei BTS 3900 Hardware Structure
Huawei BTS 3900 Hardware StructureHuawei BTS 3900 Hardware Structure
Huawei BTS 3900 Hardware Structure
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
 
Zte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guideZte umts load-monitoring and expansion guide
Zte umts load-monitoring and expansion guide
 
08 gsm bss network kpi (immediate assignment success rate) optimization manual
08 gsm bss network kpi (immediate assignment success rate) optimization manual08 gsm bss network kpi (immediate assignment success rate) optimization manual
08 gsm bss network kpi (immediate assignment success rate) optimization manual
 
Lte radio netwok planning
Lte   radio netwok planning Lte   radio netwok planning
Lte radio netwok planning
 
TDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B NetworkTDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B Network
 
Subrack and cabinet numbering rules
Subrack and cabinet numbering rulesSubrack and cabinet numbering rules
Subrack and cabinet numbering rules
 
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
 
Huawei umts o&m planning and configuration
Huawei umts o&m planning and configurationHuawei umts o&m planning and configuration
Huawei umts o&m planning and configuration
 
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...16 gsm bss network kpi (inter rat handover success rate) optimization manual[...
16 gsm bss network kpi (inter rat handover success rate) optimization manual[...
 
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc
10 gsm bss network kpi (uplink downlink balance) optimization manual[1].doc
 
Genex assistant operation guide (lte)
Genex assistant operation guide (lte)Genex assistant operation guide (lte)
Genex assistant operation guide (lte)
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization
 
ZTE BTS Manual
ZTE BTS ManualZTE BTS Manual
ZTE BTS Manual
 
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)Cell management (e ran3.0 05)
Cell management (e ran3.0 05)
 

Similar to M2000 operation-guide

47396377 m2000-operation-guide
47396377 m2000-operation-guide47396377 m2000-operation-guide
47396377 m2000-operation-guidemahrane trabelsi
 
End to-end e-business transaction management made easy sg246080
End to-end e-business transaction management made easy sg246080End to-end e-business transaction management made easy sg246080
End to-end e-business transaction management made easy sg246080Banking at Ho Chi Minh city
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Banking at Ho Chi Minh city
 
Integration guide for ibm tivoli service request manager v7.1 sg247580
Integration guide for ibm tivoli service request manager v7.1 sg247580Integration guide for ibm tivoli service request manager v7.1 sg247580
Integration guide for ibm tivoli service request manager v7.1 sg247580Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...Banking at Ho Chi Minh city
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Mehul Sanghavi
 
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...Banking at Ho Chi Minh city
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Advantec Distribution
 
Developing workflows and automation packages for ibm tivoli intelligent orche...
Developing workflows and automation packages for ibm tivoli intelligent orche...Developing workflows and automation packages for ibm tivoli intelligent orche...
Developing workflows and automation packages for ibm tivoli intelligent orche...Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli business service manager v4.1.1 impleme...
Certification guide series ibm tivoli business service manager v4.1.1 impleme...Certification guide series ibm tivoli business service manager v4.1.1 impleme...
Certification guide series ibm tivoli business service manager v4.1.1 impleme...Banking at Ho Chi Minh city
 
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...Banking at Ho Chi Minh city
 
Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Banking at Ho Chi Minh city
 
Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Banking at Ho Chi Minh city
 
Managing storage management tivoli enterprise integration with tivoli storage...
Managing storage management tivoli enterprise integration with tivoli storage...Managing storage management tivoli enterprise integration with tivoli storage...
Managing storage management tivoli enterprise integration with tivoli storage...Banking at Ho Chi Minh city
 
Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Banking at Ho Chi Minh city
 
Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Banking at Ho Chi Minh city
 

Similar to M2000 operation-guide (20)

47396377 m2000-operation-guide
47396377 m2000-operation-guide47396377 m2000-operation-guide
47396377 m2000-operation-guide
 
2226 v3 rev_a
2226 v3 rev_a2226 v3 rev_a
2226 v3 rev_a
 
End to-end e-business transaction management made easy sg246080
End to-end e-business transaction management made easy sg246080End to-end e-business transaction management made easy sg246080
End to-end e-business transaction management made easy sg246080
 
Pmp ptp solutions_userguideissue1
Pmp ptp solutions_userguideissue1Pmp ptp solutions_userguideissue1
Pmp ptp solutions_userguideissue1
 
Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867Tme 10 cookbook for aix systems management and networking sg244867
Tme 10 cookbook for aix systems management and networking sg244867
 
Integration guide for ibm tivoli service request manager v7.1 sg247580
Integration guide for ibm tivoli service request manager v7.1 sg247580Integration guide for ibm tivoli service request manager v7.1 sg247580
Integration guide for ibm tivoli service request manager v7.1 sg247580
 
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4
 
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...
Automated provisioning using ibm tivoli intelligent orchestrator and enterpri...
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
 
Developing workflows and automation packages for ibm tivoli intelligent orche...
Developing workflows and automation packages for ibm tivoli intelligent orche...Developing workflows and automation packages for ibm tivoli intelligent orche...
Developing workflows and automation packages for ibm tivoli intelligent orche...
 
Certification guide series ibm tivoli business service manager v4.1.1 impleme...
Certification guide series ibm tivoli business service manager v4.1.1 impleme...Certification guide series ibm tivoli business service manager v4.1.1 impleme...
Certification guide series ibm tivoli business service manager v4.1.1 impleme...
 
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
 
Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194
 
Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194Ibm total storage productivity center v3.1 the next generation sg247194
Ibm total storage productivity center v3.1 the next generation sg247194
 
Managing storage management tivoli enterprise integration with tivoli storage...
Managing storage management tivoli enterprise integration with tivoli storage...Managing storage management tivoli enterprise integration with tivoli storage...
Managing storage management tivoli enterprise integration with tivoli storage...
 
Tec implementation examples sg245216
Tec implementation examples sg245216Tec implementation examples sg245216
Tec implementation examples sg245216
 
Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490
 
Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490Ibm total storage productivity center v2.3 getting started sg246490
Ibm total storage productivity center v2.3 getting started sg246490
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
 

More from Virak Sou

Presentation
PresentationPresentation
PresentationVirak Sou
 
2 drive test analysis ver1
2 drive test analysis ver12 drive test analysis ver1
2 drive test analysis ver1Virak Sou
 
Smart antenna algorithm and application
Smart antenna algorithm and applicationSmart antenna algorithm and application
Smart antenna algorithm and applicationVirak Sou
 
Ibwave propagation quick start guide
Ibwave propagation   quick start guideIbwave propagation   quick start guide
Ibwave propagation quick start guideVirak Sou
 
how to reduce Poilot pollution in 3G
how to reduce Poilot pollution in 3Ghow to reduce Poilot pollution in 3G
how to reduce Poilot pollution in 3GVirak Sou
 
Compare report 2 tx4rx 04102013
Compare report 2 tx4rx 04102013Compare report 2 tx4rx 04102013
Compare report 2 tx4rx 04102013Virak Sou
 
3G cluster optimization guide
3G cluster optimization guide3G cluster optimization guide
3G cluster optimization guideVirak Sou
 
Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Virak Sou
 
MIMO system (potential candidate for 4G system)
MIMO system (potential candidate for 4G system)MIMO system (potential candidate for 4G system)
MIMO system (potential candidate for 4G system)Virak Sou
 
using query with MI
using query with MIusing query with MI
using query with MIVirak Sou
 
4G amercias_mimo_smart_antennas_wp_2013jul
4G amercias_mimo_smart_antennas_wp_2013jul4G amercias_mimo_smart_antennas_wp_2013jul
4G amercias_mimo_smart_antennas_wp_2013julVirak Sou
 
Test case node b upgrade
Test case node b upgradeTest case node b upgrade
Test case node b upgradeVirak Sou
 
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysis
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysisAis 3 g_2100m_hz_ne_b1 udn11 overshoot analysis
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysisVirak Sou
 
Ssv template
Ssv templateSsv template
Ssv templateVirak Sou
 

More from Virak Sou (19)

Presentation
PresentationPresentation
Presentation
 
2 drive test analysis ver1
2 drive test analysis ver12 drive test analysis ver1
2 drive test analysis ver1
 
Smart antenna algorithm and application
Smart antenna algorithm and applicationSmart antenna algorithm and application
Smart antenna algorithm and application
 
Mb ug
Mb ugMb ug
Mb ug
 
Slide 11516
Slide 11516Slide 11516
Slide 11516
 
Ibwave propagation quick start guide
Ibwave propagation   quick start guideIbwave propagation   quick start guide
Ibwave propagation quick start guide
 
Mimo
MimoMimo
Mimo
 
how to reduce Poilot pollution in 3G
how to reduce Poilot pollution in 3Ghow to reduce Poilot pollution in 3G
how to reduce Poilot pollution in 3G
 
Mimo
MimoMimo
Mimo
 
Compare report 2 tx4rx 04102013
Compare report 2 tx4rx 04102013Compare report 2 tx4rx 04102013
Compare report 2 tx4rx 04102013
 
3G cluster optimization guide
3G cluster optimization guide3G cluster optimization guide
3G cluster optimization guide
 
Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01Dc hspatechnology-120919125703-phpapp01
Dc hspatechnology-120919125703-phpapp01
 
MIMO system (potential candidate for 4G system)
MIMO system (potential candidate for 4G system)MIMO system (potential candidate for 4G system)
MIMO system (potential candidate for 4G system)
 
using query with MI
using query with MIusing query with MI
using query with MI
 
4G amercias_mimo_smart_antennas_wp_2013jul
4G amercias_mimo_smart_antennas_wp_2013jul4G amercias_mimo_smart_antennas_wp_2013jul
4G amercias_mimo_smart_antennas_wp_2013jul
 
Test case node b upgrade
Test case node b upgradeTest case node b upgrade
Test case node b upgrade
 
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysis
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysisAis 3 g_2100m_hz_ne_b1 udn11 overshoot analysis
Ais 3 g_2100m_hz_ne_b1 udn11 overshoot analysis
 
Cqi basics
Cqi basicsCqi basics
Cqi basics
 
Ssv template
Ssv templateSsv template
Ssv template
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

M2000 operation-guide

  • 1. M2000 Operator Guide Contents Issue 02 (2006-10-31) Huawei Technologies Proprietary i Contents 1 About This Guide ......................................................................................................................1-1 1.1 Purpose..........................................................................................................................................................1-2 1.2 Intended Users...............................................................................................................................................1-2 1.3 Organization..................................................................................................................................................1-2 1.4 Reference ......................................................................................................................................................1-3 2 Introduction to M2000...............................................................................................................2-1 2.1 Introduction to the M2000 System................................................................................................................2-2 2.2 Logging in to the M2000 Client....................................................................................................................2-2 2.3 Setting Properties of the M2000 Client.........................................................................................................2-3 2.3.1 Setting Properties of the System ..........................................................................................................2-3 2.3.2 Customizing Toolbar............................................................................................................................2-5 3 NE Connection............................................................................................................................3-1 3.1 Connecting NEs to the M2000......................................................................................................................3-2 3.2 Monitoring Connection Status of NEs ..........................................................................................................3-2 3.2.1 Introduction to Connection Status of NEs............................................................................................3-2 3.2.2 Monitoring NE Status in the Topology View.......................................................................................3-3 3.2.3 Monitoring NE Status through the System Monitor Browser..............................................................3-3 4 Topology Management.............................................................................................................4-1 4.1 Terminologies Related to Topology Management.........................................................................................4-2 4.1.1 Topology View.....................................................................................................................................4-2 4.1.2 Network Elements................................................................................................................................4-2 4.1.3 Subnets.................................................................................................................................................4-3 4.1.4 Group NEs ...........................................................................................................................................4-3 4.1.5 Links ....................................................................................................................................................4-3 4.1.6 Topology Objects.................................................................................................................................4-4 4.1.7 Templates for Creating Physical NEs in Batches.................................................................................4-5 4.2 Creating NEs.................................................................................................................................................4-6 4.2.1 Creating Physical NEs .........................................................................................................................4-6 4.2.2 Creating Virtual NEs............................................................................................................................4-8 4.2.3 Creating NE Batch Script Files in CSV Format...................................................................................4-9 4.2.4 Creating NE Batch Script Files in INI Format...................................................................................4-10
  • 2. 1 About This Guide M2000 Operator Guide ii Huawei Technologies Proprietary Issue 02 (2006-10-31) 4.2.5 Creating Physical NEs in Batches......................................................................................................4-10 4.3 Deleting NEs...............................................................................................................................................4-12 4.3.1 Deleting Physical NEs .......................................................................................................................4-12 4.3.2 Deleting Virtual NEs..........................................................................................................................4-12 4.3.3 Deleting Group NEs...........................................................................................................................4-13 4.4 Creating Subnets .........................................................................................................................................4-14 4.5 Deleting Subnets .........................................................................................................................................4-15 4.6 Creating Links.............................................................................................................................................4-16 4.6.1 Creating Physical Links .....................................................................................................................4-16 4.6.2 Creating Virtual Links........................................................................................................................4-17 4.7 Moving NEs ................................................................................................................................................4-17 4.7.1 Moving NEs to a Group NE...............................................................................................................4-17 4.7.2 Moving NEs to another Subnet..........................................................................................................4-19 4.7.3 Moving NEs on the Same Subnet ......................................................................................................4-20 4.8 Filtering NEs in the Topology View............................................................................................................4-21 4.9 Customizing Topology Tips ........................................................................................................................4-21 4.10 Switching Background Maps ....................................................................................................................4-22 5 Alarm Management...................................................................................................................5-1 5.1 Introduction to Alarms ..................................................................................................................................5-3 5.1.1 Alarm Categories .................................................................................................................................5-3 5.1.2 Alarm Severity Levels..........................................................................................................................5-3 5.1.3 Alarm Types.........................................................................................................................................5-3 5.2 Alarm Statuses...............................................................................................................................................5-4 5.2.1 Acknowledged Alarms.........................................................................................................................5-4 5.2.2 Cleared Alarms.....................................................................................................................................5-4 5.2.3 Relationship Between Alarm Categories and Alarm Statuses..............................................................5-4 5.3 Alarm Processing Procedures........................................................................................................................5-5 5.3.1 Overview..............................................................................................................................................5-5 5.3.2 Reporting Alarms.................................................................................................................................5-6 5.3.3 Saving Alarms......................................................................................................................................5-6 5.3.4 Displaying Alarms ...............................................................................................................................5-7 5.3.5 Changing Alarm Status ........................................................................................................................5-7 5.4 Querying and Browsing Alarms....................................................................................................................5-7 5.4.1 Querying Current Fault Alarms............................................................................................................5-7 5.4.2 Querying Event Alarms........................................................................................................................5-8 5.4.3 Querying History Fault Alarms............................................................................................................5-9 5.4.4 Querying Shielded Alarms...................................................................................................................5-9 5.4.5 Browsing Real-Time Fault Alarms ....................................................................................................5-10 5.4.6 Browsing Real-Time Event Alarms ...................................................................................................5-11 5.4.7 Querying Alarm Explanation .............................................................................................................5-12 5.4.8 Querying Correlated Alarms ..............................................................................................................5-13
  • 3. M2000 Operator Guide Contents Issue 02 (2006-10-31) Huawei Technologies Proprietary iii 5.4.9 Setting the Alarm Displaying Columns..............................................................................................5-14 5.5 Collecting Alarm Statistics..........................................................................................................................5-15 5.5.1 Collecting Instant Statistics................................................................................................................5-15 5.5.2 Collecting Real-Time Statistics..........................................................................................................5-17 5.6 Acknowledging and Unacknowledging Alarms ..........................................................................................5-18 5.6.1 Acknowledging Alarms Manually......................................................................................................5-18 5.6.2 Acknowledging Alarms Automatically ..............................................................................................5-18 5.6.3 Unacknowledging Alarms..................................................................................................................5-20 5.7 Creating User Defined Alarms ....................................................................................................................5-20 5.8 Displacing Alarms to a File.........................................................................................................................5-21 5.8.1 Displacing Event Alarms ...................................................................................................................5-21 5.8.2 Displacing History Fault Alarms........................................................................................................5-23 5.9 Synchronizing Alarms.................................................................................................................................5-24 5.9.1 Synchronizing Alarms Manually........................................................................................................5-24 5.9.2 Synchronizing Alarms Automatically ................................................................................................5-25 5.10 Redefining the Alarm Severity Level........................................................................................................5-25 5.11 Setting Alarm Correlation Rules ...............................................................................................................5-27 5.11.1 Overview..........................................................................................................................................5-27 5.11.2 Setting Alarm Correlation Rules for Intermittent Fault Alarms .......................................................5-27 5.11.3 Setting Alarm Correlation Rules for Repeated Event Alarms ..........................................................5-29 5.12 Managing the Alarm Knowledge Library..................................................................................................5-30 5.12.1 Overview..........................................................................................................................................5-30 5.12.2 Modifying Alarm Knowledge Directly ............................................................................................5-30 5.12.3 Modifying Alarm Knowledge Through a File..................................................................................5-31 5.13 Operating the Alarm Board .......................................................................................................................5-32 5.13.1 Overview..........................................................................................................................................5-32 5.13.2 Setting the Display of the Alarm Board ...........................................................................................5-32 5.13.3 Setting the Alarm Sound ..................................................................................................................5-33 5.13.4 Starting or Stopping the Alarm Sound .............................................................................................5-34 5.13.5 Setting the Alarm Color ...................................................................................................................5-35 5.13.6 Starting or Stopping the Alarm Flash...............................................................................................5-36 5.14 Operating the Alarm Box ..........................................................................................................................5-36 5.14.1 Overview..........................................................................................................................................5-36 5.14.2 Setting the Alarm Box Filter ............................................................................................................5-36 5.14.3 Stopping Alarm Sounds of the Alarm Box.......................................................................................5-38 5.14.4 Stopping the Alarm Box...................................................................................................................5-39 5.14.5 Resetting the Alarm Box..................................................................................................................5-39 5.15 Setting the Alarm Notification by SMS.....................................................................................................5-40 5.16 Setting the Alarm Notification by PhoneNo. or PagerNo..........................................................................5-41 5.17 Setting the Alarm Notification by Email...................................................................................................5-42 6 Performance Management .......................................................................................................6-1
  • 4. 1 About This Guide M2000 Operator Guide iv Huawei Technologies Proprietary Issue 02 (2006-10-31) 6.1 Terminologies Related to Performance Management....................................................................................6-3 6.1.1 Meausrement Counter..........................................................................................................................6-3 6.1.2 Function Set and Function Subset........................................................................................................6-3 6.1.3 Measurement Object ............................................................................................................................6-4 6.1.4 Measurement Period ............................................................................................................................6-5 6.2 Performance Measurement Process...............................................................................................................6-5 6.2.1 Overview..............................................................................................................................................6-5 6.2.2 Reporting Performance Data................................................................................................................6-6 6.2.3 Saving Performance Data into the Database........................................................................................6-7 6.2.4 Viewing of Performance Data..............................................................................................................6-7 6.3 Querying Performance Measurement Results...............................................................................................6-7 6.3.1 Overview Performance Counters.........................................................................................................6-7 6.3.2 Querying Results of Periodic Performance Measurements..................................................................6-7 6.3.3 Querying Results of Real-Time Performance Measurements ............................................................6-11 6.3.4 Setting Query Condition Templates ...................................................................................................6-13 6.3.5 Applying Query Condition Templates................................................................................................6-14 6.4 Saving Performance Measurement Results to a File...................................................................................6-15 6.5 Saving Performance Measurement Results to a File Automatically............................................................6-16 6.6 Browsing Files Storing Performance Measurement Results .......................................................................6-17 6.7 Synchronizing Performance Data................................................................................................................6-17 6.7.1 Synchronizing Performance Data Manually ......................................................................................6-17 6.7.2 Synchronizing Performance Data Automatically...............................................................................6-19 6.8 Managing Performance Measurement.........................................................................................................6-19 6.8.1 Subscribing to Performance Measurement Results............................................................................6-19 6.8.2 Checking Reliability of Performance Measurement Results..............................................................6-21 6.8.3 Collecting the Missing Performance Measurement Results...............................................................6-23 6.8.4 Suspending the Collection of Performance Measurement Results.....................................................6-24 6.9 Setting Extended Performance Counters.....................................................................................................6-25 6.9.1 Starting the Measurement of Extended Performance Counters..........................................................6-25 6.9.2 Stopping the Measurement of Extended Performance Counters........................................................6-26 6.10 Setting Measurement Objects....................................................................................................................6-27 6.10.1 Adding Measurement Objects..........................................................................................................6-27 6.10.2 Deleting Measurement Objects........................................................................................................6-29 6.11 Setting Thresholds for Collecting Performance Measurement Results .....................................................6-30 6.12 Managing User Defined Counters.............................................................................................................6-31 6.12.1 Creating User Defined Counters......................................................................................................6-31 6.12.2 Modifying User Defined Coudnters.................................................................................................6-33 6.13 Managing Performance Monitoring ..........................................................................................................6-33 6.13.1 Overview..........................................................................................................................................6-33 6.13.2 Creating Performance Monitoring Tasks .........................................................................................6-33 6.13.3 Starting Performance Monitoring.....................................................................................................6-36 6.13.4 Filtering Monitoring Results............................................................................................................6-37
  • 5. M2000 Operator Guide Contents Issue 02 (2006-10-31) Huawei Technologies Proprietary v 6.13.5 Setting Monitoring Thresholds ........................................................................................................6-38 6.13.6 Exporting Data from the Current Monitoring Table.........................................................................6-39 6.13.7 Viewing the Current Monitoring Chart ............................................................................................6-40 6.13.8 Viewing the Trend Chart..................................................................................................................6-42 6.13.9 Setting Attributes for the Monitoring Chart.....................................................................................6-43 6.13.10 Exporting Monitoring Results........................................................................................................6-44 6.14 Managing Thresholds for Real-Time Counters .........................................................................................6-45 6.14.1 Overview..........................................................................................................................................6-45 6.14.2 Adding Monitoring Thresholds........................................................................................................6-46 6.14.3 Modifying Monitoring Thresholds...................................................................................................6-47 6.14.4 Deleting Monitoring Thresholds......................................................................................................6-48 7 Configuration Management.....................................................................................................7-1 7.1 Querying NE Configuration..........................................................................................................................7-2 7.1.1 Configuration Types.............................................................................................................................7-2 7.1.2 Querying NE Configuration.................................................................................................................7-2 7.1.3 Querying the Basic NE Configuration .................................................................................................7-3 7.2 Synchronizing NE Configuration..................................................................................................................7-4 7.2.1 Synchronizing NE Configuration Manually ........................................................................................7-4 7.2.2 Synchronizing NE Configuration Automatically .................................................................................7-5 7.2.3 Synchronizing NE Configuration Periodically ....................................................................................7-6 7.3 Exporting NE Configuration .........................................................................................................................7-6 7.3.1 Exporting NE Configuration Manually................................................................................................7-6 7.3.2 Exporting NE Confiugration Periodically............................................................................................7-7 7.4 Saving NE Configuration to a File................................................................................................................7-8 7.5 Setting NE Type Privilege Rules...................................................................................................................7-9 7.6 Applying NE Type Privilege Rules .............................................................................................................7-10 7.7 Managing NE Users ....................................................................................................................................7-11 7.7.1 Overview of NE Users.......................................................................................................................7-11 7.7.2 Principles for NE User Authorization ................................................................................................7-11 7.7.3 Creating NE Users .............................................................................................................................7-11 7.7.4 Modifying Privileges for NE Users....................................................................................................7-12 7.7.5 Deleting NE User Accounts...............................................................................................................7-14 7.8 Monitoring Operations of M2000 Users and NE Users ..............................................................................7-15 7.8.1 Overview of User Logs and NE Logs................................................................................................7-15 7.8.2 Synchronizing NE Logs.....................................................................................................................7-15 7.8.3 Querying NE Logs.............................................................................................................................7-17 7.8.4 Monitoring NE User Login on LMTs ................................................................................................7-18 7.8.5 Monitoring Operations and Sessions of NE Users.............................................................................7-19 7.9 Management of Enhanced Maintenance for NEs........................................................................................7-19 7.9.1 Overview............................................................................................................................................7-19 7.9.2 Upgrading Enhanced Maintenance for NEs.......................................................................................7-20
  • 6. 1 About This Guide M2000 Operator Guide vi Huawei Technologies Proprietary Issue 02 (2006-10-31) 7.9.3 Equipment Management ....................................................................................................................7-21 7.9.4 Monitoring Management....................................................................................................................7-22 7.9.5 Tracing Management .........................................................................................................................7-24 7.10 Executing NE MML Commands...............................................................................................................7-25 7.10.1 Overview of MML Commands........................................................................................................7-25 7.10.2 Viewing the MML Command Window............................................................................................7-25 7.10.3 Executing One MML Command......................................................................................................7-26 7.10.4 Setting the MML Command Script..................................................................................................7-27 7.10.5 Executing Multiple MML Commands .............................................................................................7-29 7.10.6 Executing MML Commands Periodically........................................................................................7-30 7.10.7 Saving MML Command Results......................................................................................................7-30 8 NE Software and License Management.................................................................................8-1 8.1 Checking the NE Software............................................................................................................................8-2 8.1.1 Checking NE Software Packages on the M2000 .................................................................................8-2 8.1.2 Checking the Running NE Software....................................................................................................8-3 8.2 Setting the File Server...................................................................................................................................8-4 8.2.1 Purpose of and Principles for Setting the File Server ..........................................................................8-4 8.2.2 Setting the NE File Server ...................................................................................................................8-4 8.3 Upgrading the NE Software ..........................................................................................................................8-5 8.3.1 Procedure for Upgrading the NE Software ..........................................................................................8-5 8.3.2 Copying the NE Software to the M2000 Client ...................................................................................8-6 8.3.3 Uploading the NE Software from the M2000 Client to the M2000 Server..........................................8-7 8.3.4 Downloading the NE Software to a Board of an NE ...........................................................................8-8 8.3.5 Operating the NE Software................................................................................................................8-10 8.3.6 Downloading NE Software Patches to a Board of an NE ..................................................................8-11 8.3.7 Operating Patches ..............................................................................................................................8-12 8.3.8 Monitoring the Software Upgrade Progress.......................................................................................8-13 8.3.9 Falling Back the Software Version.....................................................................................................8-14 8.4 Upgrading the NodeB Software and Patches ..............................................................................................8-14 8.4.1 NodeB Upgrade Policies....................................................................................................................8-14 8.4.2 Upgrading One NodeB.......................................................................................................................8-15 8.4.3 Upgrading Multiple NodeBs..............................................................................................................8-17 8.5 Managing the Software License..................................................................................................................8-17 8.5.1 Overview............................................................................................................................................8-17 8.5.2 Checking the License Allocated to NodeBs.......................................................................................8-18 8.5.3 Modifying the License Allocated to NodeBs.....................................................................................8-19 8.5.4 Allocating the RAN License ..............................................................................................................8-20 8.5.5 Synchronizing the License Allocated to NodeBs...............................................................................8-20 8.5.6 Deleting the RAN License.................................................................................................................8-21 8.5.7 Uploading the License from the Client to the Folder on the Server...................................................8-22 9 Backup Managemnet.................................................................................................................9-1
  • 7. M2000 Operator Guide Contents Issue 02 (2006-10-31) Huawei Technologies Proprietary vii 9.1 Overview of the NE Data..............................................................................................................................9-2 9.2 Backing Up NE Data.....................................................................................................................................9-4 9.2.1 Backup Modes .....................................................................................................................................9-4 9.2.2 Backing Up NE Data Periodically .......................................................................................................9-4 9.2.3 Backing Up NE Data Manually ...........................................................................................................9-5 9.3 Browsing the NE Backup Progress ...............................................................................................................9-6 9.4 Checking NE Backup Files ...........................................................................................................................9-7 9.5 Restoring the NE Data...................................................................................................................................9-7 10 Troubleshooting.....................................................................................................................10-1 10.1 Client Login Failures.................................................................................................................................10-2 10.1.1 Prompt "Login failed. Confirm that your user name and password are case sensitive and correct." ....................................................................................................................................................................10-2 10.1.2 Prompt "Invalid user account." ........................................................................................................10-2 10.1.3 Prompt "Invalid login duration."......................................................................................................10-2 10.1.4 Prompt Message "Invalid password." ..............................................................................................10-3 10.1.5 Prompt Message "The password has expired. Please change your password! " ..............................10-3 10.1.6 Prompt Message "Maintenance Mode."...........................................................................................10-3 10.1.7 Prompt Message "The User Has Reached the Maximum Login Attempts. The User Account Has Been Locked, and It Can Be Unlocked in 1 Minute.".................................................................................10-4 10.1.8 Prompt Message "The Server Doesn’t Exist or Service Is Not Running.".......................................10-4 10.1.9 Prompt Message "Exceed Maximum Sessions." ing........................................................................10-5 10.1.10 Prompt Message "Loading Module Failed, System Will Exit.".....................................................10-5 10.1.11 Prompt Message "Failed to Log in to the Server after the Auto Client Upgrade or Running Exception"...................................................................................................................................................10-5 10.2 Client Running Faults................................................................................................................................10-6 10.2.1 Abortion of the M2000 Client..........................................................................................................10-6 10.2.2 Failure to Run the M2000 Client .....................................................................................................10-6 10.2.3 Abnormal Display of M2000 Client Interface..................................................................................10-7 10.2.4 The Bulb on the GUI Is On and Off Intermittently..........................................................................10-7 10.3 Topology Management Faults...................................................................................................................10-8 10.3.1 Failure to Refresh the Topology View..............................................................................................10-8 10.3.2 Failure to Discover NodeBs Automatically .....................................................................................10-9 10.3.3 Conflicted Names for the Created Topology Objects.......................................................................10-9 10.4 Alarm Management Faults ........................................................................................................................10-9 10.4.1 Time Delay of Alarm Message Real-Time Printing.........................................................................10-9 10.4.2 Failure to Receive Alarm Emails in Real-Time .............................................................................10-10 10.4.3 Failure to Receive Alarm SMSs in Real-Time...............................................................................10-10 10.4.4 Unknown NE Names During the Alarm Query .............................................................................10-10
  • 8. 1 About This Guide M2000 Operator Guide viii Huawei Technologies Proprietary Issue 02 (2006-10-31) Figures Figure 2-1 M2000 client interface (Physical Topology window)......................................................................2-3 Figure 2-2 Output Window tab in the System Setting dialog box ..................................................................2-4 Figure 2-3 Terminal tab in the System Setting dialog box...............................................................................2-5 Figure 2-4 Customize Toolbar dialog box ........................................................................................................2-6 Figure 3-1 Monitoring the NE statuses through the system monitor browser....................................................3-4 Figure 4-1 An example of CSV templates..........................................................................................................4-5 Figure 4-2 Create NE dialog box ......................................................................................................................4-7 Figure 4-3 Progress of creating physical NEs ....................................................................................................4-8 Figure 4-4 Creating physical NEs in batches ...................................................................................................4-11 Figure 4-5 Creating physical subnets ...............................................................................................................4-15 Figure 4-6 NE Property dialog box.................................................................................................................4-18 Figure 4-7 Modify Physical Subnet dialog box..............................................................................................4-20 Figure 5-1 Process by which a fault alarm changes to a history fault alarm ......................................................5-5 Figure 5-2 Procedure for processing M2000 alarms ..........................................................................................5-6 Figure 5-3 Querying current fault alarms...........................................................................................................5-8 Figure 5-4 Browsing alarms.............................................................................................................................5-11 Figure 5-5 Alarm details...................................................................................................................................5-13 Figure 5-6 Selecting the columns to be displayed in the alarm list ..................................................................5-15 Figure 5-7 Alarm statistics table.......................................................................................................................5-16 Figure 5-8 Alarm statistics pie chart.................................................................................................................5-17 Figure 5-9 Setting conditions for auto acknowledgement................................................................................5-19 Figure 5-10 Auto displacement ........................................................................................................................5-22 Figure 5-11 Manual displacement ....................................................................................................................5-23 Figure 5-12 Redefining the alarm severity (level)............................................................................................5-26 Figure 5-13 Setting correlation for intermittent fault alarms............................................................................5-28 Figure 5-14 Modifying the alarm knowledge...................................................................................................5-31
  • 9. M2000 Operator Guide Figures Issue 02 (2006-10-31) Huawei Technologies Proprietary ix Figure 5-15 Setting the alarm sounds...............................................................................................................5-34 Figure 5-16 Setting the alarm board.................................................................................................................5-35 Figure 5-17 Setting the alarm box filter ...........................................................................................................5-38 Figure 5-18 Setting the remote alarm notification by SMS..............................................................................5-40 Figure 6-1 Levels of measurement counters.......................................................................................................6-4 Figure 6-2 Process of performance measurement of the M2000 system............................................................6-6 Figure 6-3 Selecting the measurement unit and objects .....................................................................................6-9 Figure 6-4 Selecting measurement counters.....................................................................................................6-10 Figure 6-5 Selecting the query period and time................................................................................................6-11 Figure 6-6 Entering a name for the query condition template..........................................................................6-14 Figure 6-7 Synchronizing performance measurement results manually...........................................................6-18 Figure 6-8 Subscribing measurement results....................................................................................................6-20 Figure 6-9 Subscribing results for real-time measurements .............................................................................6-21 Figure 6-10 Please select time segment dialog box........................................................................................6-22 Figure 6-11 Setting extended counters .............................................................................................................6-26 Figure 6-12 Selecting measurement objects.....................................................................................................6-28 Figure 6-13 Adding an alarm threshold for collecting performance measurement results...............................6-31 Figure 6-14 Creating user defined counters .....................................................................................................6-32 Figure 6-15 Setting monitor parameters...........................................................................................................6-35 Figure 6-16 Starting performance monitoring..................................................................................................6-36 Figure 6-17 Setting conditions for filtering monitoring results........................................................................6-38 Figure 6-18 Setting a threshold ........................................................................................................................6-39 Figure 6-19 Setting parameters for the monitoring chart .................................................................................6-41 Figure 6-20 Setting parameters for the trend chart...........................................................................................6-43 Figure 6-21 Setting attributes for the monitoring chart....................................................................................6-44 Figure 6-22 Adding monitoring thresholds ......................................................................................................6-47 Figure 7-1 Querying NE configuration through the MIT browser .....................................................................7-3 Figure 7-2 NE Report dialog box......................................................................................................................7-4 Figure 7-3 Synchronization progress..................................................................................................................7-5 Figure 7-4 Operation Result dialog box...........................................................................................................7-9 Figure 7-5 Selectting an NE and command groups for the created NE user account.......................................7-12 Figure 7-6 Selecting an NE user.......................................................................................................................7-13 Figure 7-7 Selecting command groups.............................................................................................................7-14
  • 10. 1 About This Guide M2000 Operator Guide x Huawei Technologies Proprietary Issue 02 (2006-10-31) Figure 7-8 Software Browser dialog box .........................................................................................................7-16 Figure 7-9 Synchronizing NE logs automatically ............................................................................................7-17 Figure 7-10 Querying NE logs .........................................................................................................................7-18 Figure 7-11 enhanced NE maintenance............................................................................................................7-21 Figure 7-12 Device panel .................................................................................................................................7-22 Figure 7-13 Monitor Panel ...............................................................................................................................7-23 Figure 7-14 Trace panel....................................................................................................................................7-25 Figure 7-15 MML Command window............................................................................................................7-26 Figure 7-16 Selecting the script mode..............................................................................................................7-28 Figure 7-17 Create Task dialog box................................................................................................................7-29 Figure 8-1 Checking the NE version..................................................................................................................8-3 Figure 8-2 Setting the file server........................................................................................................................8-5 Figure 8-3 Procedure for upgrading the NE software ........................................................................................8-6 Figure 8-4 Selecting the file location and type...................................................................................................8-9 Figure 8-5 Selecting download software parameters........................................................................................8-10 Figure 8-6 Step 1 of 2 for upgrading one NodeB .............................................................................................8-16 Figure 8-7 Step 2 of 2 for upgrading one NodeB .............................................................................................8-16 Figure 8-8 Browsing the license of the current NodeB ....................................................................................8-18 Figure 9-1 Creating a periodic NE backup task..................................................................................................9-5 Figure 10-1 The connection fails between the client and the server.................................................................10-7
  • 11. M2000 Operator Guide Tables Issue 02 (2006-10-31) Huawei Technologies Proprietary xi Tables Table 3-1 Icons indicating NE connection status................................................................................................3-2 Table 4-1 Descriptions of two link types............................................................................................................4-4 Table 6-1 Exporting the monitoring data..........................................................................................................6-44 Table 8-1 File servers available for the NEs.......................................................................................................8-4 Table 9-1 NE backup data...................................................................................................................................9-2
  • 12. M2000 Operator Guide 1 About This Guide Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-1 1 About This Guide About This Chapter The following table lists the contents of this chapter. Title Description 1.1 Purpose Introduces the purpose of this guide. 1.2 Intended Users Introduces the intended users of this guide. 1.3 Organization Introduces the organization of this guide. 1.4 Reference Introduces the reference of this guide.
  • 13. 1 About This Guide M2000 Operator Guide 1-2 Huawei Technologies Proprietary Issue 02 (2006-10-31) 1.1 Purpose This guide describes how to operate and maintain the network equipment. It includes the following content: ! Monitoring network performance ! Monitoring network alarms ! Managing network configuration information ! Upgrading the network element (NE) software ! Backing up the NE data 1.2 Intended Users The guide is intended for the following users: ! Network engineers ! Shift operators 1.3 Organization This guide consists of the following chapters: ! 1 "About This Guide" introduces the purpose, intended users, and organization of this guide. ! 2 "Introduction to M2000" describes the procedures for logging in to the M2000 client and setting the client. ! 3 "NE Connection" describes the types of NEs the M2000 system manages, relevant operation tasks, and the procedures for connecting types of network equipment. ! 4 "Topology Management" introduces topology management and describes the relevant operation tasks and procedures. ! 5 "Alarm Management" introduces alarm management and describes relevant operation tasks and procedures. ! 6 "Performance Management" introduces performance management and describes relevant operation tasks and procedures. ! 7 "Configuration Management" describes the procedures for configuring and querying NE service data. ! 8 "NE Software and License Management" describes the operation tasks and procedures related to NE software and license management. ! 9 "Backup Managemnet" describes the operation tasks and procedures related to server data backup and NE data backup. ! 10 "Troubleshooting" describes the handling suggestions for common faults that may occur during operations on the client.
  • 14. M2000 Operator Guide 1 About This Guide Issue 02 (2006-10-31) Huawei Technologies Proprietary 1-3 1.4 Reference When you read this guide, see M2000 Online Help for more information.
  • 15. M2000 Operator Guide 2 Introduction to M2000 Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-1 2 Introduction to M2000 About This Chapter The following table lists the contents of this chapter. Title Description 2.1 Introduction to the M2000 System Introduces the M2000 system. 2.2 Logging in to the M2000 Client Describes how to log in to the M2000 client. 2.3 Setting Properties of the M2000 Client Describes how to set the properties of the M2000 client.
  • 16. 2 Introduction to M2000 M2000 Operator Guide 2-2 Huawei Technologies Proprietary Issue 02 (2006-10-31) 2.1 Introduction to the M2000 System iManager M2000 Mobile Element Management System (M2000 for short) is the network management system (NMS) for Huawei mobile communications products. It works in the widely used Client/Server mode. The M2000 system contains a set of servers and multiple clients connected to the servers. ! The M2000 server runs on the Unix platform. The server processes and stores NE data. ! The M2000 clients run on the Windows platform. The clients provide friendly graphical interfaces for operations and maintenance on the NEs. 2.2 Logging in to the M2000 Client Description Start the M2000 Client, and log in to the M2000 server. After logging in to the M2000 client successfully, you can use the client to perform routine operation and maintenance for the network equipment. Network Equipment Supporting This Task NEs are not involved. Prerequisites Before logging in to the M2000 client, ensure that: ! The M2000 client software is installed. ! The corresponding M2000 server is working properly. ! The software versions of the M2000 client and the M2000 server match. ! The M2000 client communicates normally with the M2000 server. ! You have the required user name and password. Procedure To log in to the M2000 client, perform the following steps: Step 1 Choose Start > Programs > iManager M2000 Client > M2000 Client to start the M2000 client. You can configure the path for the menu iManager M2000 Client > M2000 Client in Start > Programs when you install the client software. The default path is iManager M2000 Client. Step 2 In the displayed User Login dialog box, enter the server IP address to log in to the M2000 client.
  • 17. M2000 Operator Guide 2 Introduction to M2000 Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-3 If User Login does not list the information about the specified server, click . The Server Information dialog box is displayed. In this dialog box, set the server information, such as the server IP and sever port. Step 3 Enter the user name and password. Click Login. After the connection is set up, the client obtains the required data from the server. After the data is loaded, the Physical Topology window is displayed, as shown in Figure 2-1. The Physical Topology window is the M2000 client interface. Figure 2-1 M2000 client interface (Physical Topology window) ----End 2.3 Setting Properties of the M2000 Client 2.3.1 Setting Properties of the System Description Set the following properties of the M2000 client. ! Mode for displaying messages ! Maximum output lines ! Auto displacement ! Auto locking period
  • 18. 2 Introduction to M2000 M2000 Operator Guide 2-4 Huawei Technologies Proprietary Issue 02 (2006-10-31) Network Equipment Supporting This Task NEs are not involved. Prerequisites Before setting the properties of the system, ensure that you have logged in to the M2000 client. Procedure To set the properties of the M2000 client, perform the following steps: Step 1 Choose System > System Setting. The System Setting dialog box is displayed, as shown in Figure 2-2. Figure 2-2 Output Window tab in the System Setting dialog box Step 2 In the Output Window tab, set parameters such as Maximum Output Lines. Step 3 Click the Terminal tab in the System Setting dialog box, as shown in Figure 2-3.
  • 19. M2000 Operator Guide 2 Introduction to M2000 Issue 02 (2006-10-31) Huawei Technologies Proprietary 2-5 Figure 2-3 Terminal tab in the System Setting dialog box Step 4 Set the period for Automatically locked or turn off the option. Step 5 Click OK. ----End 2.3.2 Customizing Toolbar Description Create the self defined toolbar in the M2000 client. Network Equipment Supporting This Task NEs are not involved. Prerequisites Before customizing the toolbar, ensure that you have logged in to the M2000 client. Procedure To customize the toolbar, perform the following steps:
  • 20. 2 Introduction to M2000 M2000 Operator Guide 2-6 Huawei Technologies Proprietary Issue 02 (2006-10-31) Step 1 Choose Tools > Customize Toolbar. The Customize Toolbar dialog box is displayed, as shown in Figure 2-4. Figure 2-4 Customize Toolbar dialog box Step 2 Select the tool groups and button on the toolbar. Step 3 Click OK. ----End
  • 21. M2000 Operator Guide 3 NE Connection Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-1 3 NE Connection About This Chapter The following table lists the contents of this chapter. Title Description 3.1 Connecting NEs to the M2000 Introduces how to connect the NEs to the M2000. 3.2 Monitoring Connection Status of NEs Describes how to monitor the connection statuses of the NEs in the topology view or through the system monitor browser.
  • 22. 3 NE Connection M2000 Operator Guide 3-2 Huawei Technologies Proprietary Issue 02 (2006-10-31) 3.1 Connecting NEs to the M2000 After the NEs are connected to the M2000, you can operate or maintain the NEs through the M2000 system. Debug the NEs and ensure that they work well before you connect them to the M2000 system. For details, see the M2000 Commissioning Guide. 3.2 Monitoring Connection Status of NEs 3.2.1 Introduction to Connection Status of NEs In the topology view, the connection statuses of the NEs are shown by NE icon and NE status icon. The NE status icon is displayed at the top left of the NE icon. Multiple NE icons displayed at the same time indicate that the NE is in several connection statuses. When the NE and the M2000 are connected, the NE icon and NE status icon is displayed in the topology view. You can operate and maintain the NE through the M2000. When the NE is processing synchronization or disconnected with the M2000, the NE status icons are displayed at the top left corner of the NE icon, as shown in Table 3-1. Table 3-1 Icons indicating NE connection status Icon Meaning Description Synchronization processing The M2000 extracts the NE configuration from the NE. The data is synchronized when the NE is connected or reconnected to the M2000. Connection down The M2000 server is disconnected with the NE. The O&M (operation and maintenance) path between the NE and the M2000 does not work smoothly, or errors occur to some TCP or UDP ports. NE not match The NE is not matched. The O&M path between the NE and the M2000 works well. You cannot, however, operate or maintain the NE through the M2000 because the NE is not installed with the right version of the mediation package. Forbid Connect The NE is prohibited from being connected to the M2000 server. Unknown type The current system does not support the NE type. FourStates The NE state contains four or more states.
  • 23. M2000 Operator Guide 3 NE Connection Issue 02 (2006-10-31) Huawei Technologies Proprietary 3-3 3.2.2 Monitoring NE Status in the Topology View Description Monitor the status of the NEs in the topology view. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before monitoring the status of an NE, ensure that you have logged in to the M2000 client. Procedure To monitor the status of an NE in the topology view, perform the following steps: Step 1 Click the Tree tab on the left of the topology view. Step 2 Select the subnet with the NE. Step 3 Select the NE. The NE status is shown in the topology view on the right of the topology view. Here are two examples, ! shows that the NE HLR36 is in the Connected status. ! shows that the NE MGW is in the Connection down status. For the NEs in the Connection down status, contact the department concerned immediately. ----End 3.2.3 Monitoring NE Status through the System Monitor Browser Description View the connection status of NEs through the system monitor browser. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before monitoring NE status through the system monitor browser, ensure that you have logged in to the M2000 client.
  • 24. 3 NE Connection M2000 Operator Guide 3-4 Huawei Technologies Proprietary Issue 02 (2006-10-31) Procedure To monitor NE status through the system monitor browser, perform the following steps: Step 1 Choose Tools > System Monitor > Monitor Browser. The System Monitor Browser dialog box is displayed. Step 2 Click the NE Monitor tab. The status of each NE is displayed, as shown in Figure 3-1. Figure 3-1 Monitoring the NE statuses through the system monitor browser
  • 25. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-1 4 Topology Management About This Chapter The following table lists the contents of this chapter. Title Description 4.1 Terminologies Related to Topology Management Introduces the glossary related to topology management. 4.2 Creating NEs Describes how to create the NEs in the topology view and in batches. 4.3 Deleting NEs Describes how to delete the NEs and the group NEs in the topology view. 4.4 Creating Subnets Describes how to create the subnets in the topology view. 4.5 Deleting Subnets Describes how to delete the subnets in the topology view. 4.6 Creating Links Describes how to create the links in the topology view. 4.7 Moving NEs Describes how to move the NEs in the topology view. 4.8 Filtering NEs in the Topology View Describes how to filter the NEs in the topology view. 4.9 Customizing Topology Tips Describes how to customize the topology tips. 4.10 Switching Background Maps Describes how to switch the background maps of the topology views.
  • 26. 4 Topology Management M2000 Operator Guide 4-2 Huawei Technologies Proprietary Issue 02 (2006-10-31) 4.1 Terminologies Related to Topology Management 4.1.1 Topology View Meaning The topology view is the mapping of the communication network (managed through the M2000 system) on the M2000. The topology view shows the equipment and the connection between the equipment in the form of view and tree. It also provides entry points for the operations related to the configuration, alarm, and performance management through the client. The M2000 topology view consists of two parts: tree and view. ! The navigation tree on the left shows all the involved topology objects, such as NEs, subnets, and the hierarchical architecture between these objects. ! The topology view on the right shows all the topology objects in the current network and the location-related relationship between these objects. The system synchronizes the navigation tree and the topology view automatically. Examples The displayed window after you log in the M2000 client is a topology view. 4.1.2 Network Elements Meaning Topology management uses NEs to identify the communication equipment in the network. ! Physical NE Physical NEs are the communication devices that can be managed by the M2000. ! Virtual NE The third-party communication equipment in the entire communication network. The M2000 cannot manage the equipment. Virtual NEs help complete the structure of the communication network. In the topology view, the physical NE and virtual NE are distinguished by different icon colors. For example, the physical NE HLR is displayed as in the topology view, while the virtual NE HLR is displayed as . The equipment type corresponds to the NE type. The NE types are identified by different icons. You can view the icons by clicking the Legend tab in the left of the window. Examples Some examples of NEs are as follows:
  • 27. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-3 ! Huawei BTS3812A sets up a physical connection with the M2000; thus it is a physical NE. ! The third-party equipment MOTOROLA HLR is a virtual NE. ! The M2000 itself is a special NE. The M2000 is displayed as OMC in the topology view. 4.1.3 Subnets Meaning To manage NEs more efficiently, the huge M2000 network can be divided into several smaller networks based on certain principles, such as by region. These smaller networks are called subnets in the topology. Examples An example of subnets is as follows: If the M2000 can manage all the NEs in the provinces A, B and C, these NEs can be divided into three subnets by region (herein province). The three subnets can also be divided into smaller subnets by city or county. In other words, a subnet can be nested in another subnet. 4.1.4 Group NEs Meaning Some NEs in the communication network form a certain hierarchical architecture. The Group NE is an NE that works as both an NE and a subnet. Examples Some examples of group NEs are as follows: ! An RNC is a group NE. It manages NodeB NEs. ! An MSC Server is a group NE. It manages MGW NEs. 4.1.5 Links Meaning The topology view uses links to identify the physical or logical connections between the communication equipment. There are two types of links, physical and virtual, as shown in Table 4-1.
  • 28. 4 Topology Management M2000 Operator Guide 4-4 Huawei Technologies Proprietary Issue 02 (2006-10-31) Table 4-1 Descriptions of two link types Link type Description It refers to the signaling connections between two physical NEs. M2000 supports six types of physical links: MTP3, MTP3B, DATALINK, M3UA, H248, and BICCSCTP. MTP3 MTP3B MTP3 and MTP3B can only be created manually. ! The NE at one side of the link must be a physical MGW. ! The NE at the other side of the link can be a physical MSC Server, or a virtual RNC or MSC Server. DATALINK M3UA H248 Physical link BICCSCTP These three types are created by the system automatically. ! DATALINK links can be created between a physical CG and a physical GGSN80 or SGSN. ! H248 and M3UA links can only be created between a physical MGW and MSC Server. ! BICCSCTP links can only be created between a physical MSC Server. Virtual link ! Virtual link refers to the logical communication connections between two NEs. ! Virtual links can only be created manually. You can modify or delete virtual links. Examples Some examples of the links are as follows: ! The links between physical MGW and virtual MSC Server are physical links created by the manually. ! The links between virtual MSC Server and virtual HLR are virtual links created manually. 4.1.6 Topology Objects Meaning NEs, subnets, and group NEs are topology objects. Examples Some examples of topology objects are as follows: ! Huawei communication equipment BTS3812 that communicates with the M2000 is a topological object. ! The manually created virtual link is a topological object. ! The manually created subnet C is a topological object.
  • 29. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-5 4.1.7 Templates for Creating Physical NEs in Batches Meaning To create NEs in batches on the M2000 client, you must create a script file manually and perform the creation in bathes through executing the script. Templates for creating physical NEs in batches are the standard templates provided by the M2000 client. You only need to export the template, and then enter the information of the NEs to be created. Two formats of templates are available: INI and CSV. Templates for creating physical NEs in batches are the standard templates provided by the M2000 client. Two formats of templates are available: INI and CSV. Templates in the CSV Format The templates in the CSV format apply only to the NEs in WCDMA networks. Use the Microsoft Excel to edit the templates in the CSV format. All the NEs apply the same parameter group, as shown in Figure 4-1. Figure 4-1 An example of CSV templates Templates in the INI Format The templates in the INI format apply to create all types of NEs in batches except virtual NEs. Use the notepad to edit the templates in the INI format. Different from the CSV templates, the INI templates apply different parameter groups. To create multiple NEs of the same class, the corresponding parameter groups should be provided accordingly. The following examples show the parameter groups for some typical NEs. Example 1: RNC [RNC] Name = Vendor = Physical Location = District = IP address = Description = Pos X = Pos Y = Position = Coordination =
  • 30. 4 Topology Management M2000 Operator Guide 4-6 Huawei Technologies Proprietary Issue 02 (2006-10-31) Example 2: BSC [BSC] Name = Vendor = Physical Location = District = IP address = Description = Username = Password = Pos X = Pos Y = Position = Coordination = For the parameters of the INI templates, see M2000 Online Help. 4.2 Creating NEs 4.2.1 Creating Physical NEs Description Create physical NEs in the topology view. After you create an NE successfully, the M2000 synchronizes the NE to obtain the NE configuration data. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before creating a physical NE, ensure that: ! You have logged in to the M2000 client. ! The mediation software for the NE to be created is installed. ! You have obtained the NE information, such as the NE name, IP address, NE version, and district information. Procedure To create a physical NE in the topology view, perform the following steps: Step 1 Right-click in the topology view, and select Create NE on the displayed menu. The Create NE dialog box is displayed, as shown in Figure 4-2.
  • 31. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-7 Figure 4-2 Create NE dialog box Step 2 Select the physical NE category in the Select Category drop-down list. Step 3 Select the NE type in the Select NE Type drop-down list. Step 4 Click Next. Step 5 Select the district. Enter the information such as the NE name and IP address. Step 6 Click Finish. The prompt dialog box Create NE displays the progress of the NE creation. For example, the progress of creating the BSC NE is as shown in Figure 4-3.
  • 32. 4 Topology Management M2000 Operator Guide 4-8 Huawei Technologies Proprietary Issue 02 (2006-10-31) Figure 4-3 Progress of creating physical NEs The icon for this NE is displayed in the topology view while the system displays the synchronization progress . The progress bar closes automatically after 100% is displayed. You can operate and maintain the NE through the M2000 client. ----End 4.2.2 Creating Virtual NEs Description Create virtual NEs in the physical topology. After you create a virtual NE successfully, the icon for this NE is displayed in the topology view. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before creating a virtual NE, ensure that: ! You have logged in to the M2000 client. ! You have obtained the information about the NE, such as the NE name, IP address, and district information. Procedure To create a virtual NE in the topology view, perform the following steps: Step 1 Right-click in the topology view, and select Create NE on the displayed menu. The Create NE dialog box is displayed, as shown in Figure 4-2.
  • 33. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-9 Step 2 Select Virtual NEs in the Select Category drop-down list. Step 3 Select an NE type in the Select NE Type drop-down list. Step 4 Click Next. Step 5 Select the district of the NE. Enter the information such as the NE name and IP address. Step 6 Click Finish. The prompt dialog box Create NE displays the progress of the NE creation. After the NE is successfully created, the icon is displayed in the topology view. ----End 4.2.3 Creating NE Batch Script Files in CSV Format Description Create an NE batch file in the CSV format. The NE batch file is used for creating NEs in batches. Network Equipment Supporting This Task Physical NEs in WCDMA networks. Prerequisites Before creating an NE batch file in the CSV format, ensure that: ! You have obtained the information about the NE Type, IP address, NE version and district. ! The version Excel97 or higher is installed and runs normally. Procedure To create an NE batch file in the CSV format, perform the following steps: Step 1 Choose Configuration > Exports NE Attributes Template > CSV File Format to view Export NE Info template (CSV file format) dialog box. Step 2 Click . Save the template. Step 3 Open the template file, and enter the information of each NE, such as the NE type, NE name, NE version, and district. Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For details, see part 4.2.1 "Creating Physical NEs." Step 4 Save the file. ----End
  • 34. 4 Topology Management M2000 Operator Guide 4-10 Huawei Technologies Proprietary Issue 02 (2006-10-31) 4.2.4 Creating NE Batch Script Files in INI Format Description Create an NE batch file in the INI format. The NE batch file is used for creating NEs in batches. Network Equipment Supporting This Task All NEs equipment except the virtual NEs. Prerequisites You have obtained the NE information such as the NE Type, IP address, NE version and district. Procedure To create an NE batch file in the INI format, perform the following steps: Step 1 Choose Configuration > Exports NE Attributes Template > INI File Format to view Export NE Info template (INI file format) dialog box. Step 2 Select the NE type. Click , and save the template. Step 3 Open the template file, and enter the information of each NE, such the NE type, NE name, NE version and district. Obtaining the NE type from the drop-down list in the Create NE dialog box is recommended. For details, see part 4.2.1 "Creating Physical NEs." Step 4 Save the file. ----End 4.2.5 Creating Physical NEs in Batches Description By creating physical NEs in batches, you can add multiple physical NEs in the same subnet into the topology view in batches at a time. The M2000 obtains the information about these NEs created from the batch files, and then synchronizes these NEs to obtain the configuration data. Network Equipment Supporting This Task ! This task applies to creating physical NEs in WCDMA networks when the script file is in the CSV format. ! This task applies to creating all NEs except virtual NEs when the script file is in the INI format.
  • 35. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-11 Prerequisites Before creating physical NEs in batches, ensure that: ! You have logged in to the M2000 client. ! The mediation software of the NE to be created is installed. ! The NE batch script files are created. For details, see part 4.2.3 "Creating NE Batch Script Files in CSV Format" and part 4.2.4 "Creating NE Batch Script Files in INI Format" Procedure To create multiple physical NEs in batches, perform the following steps: Step 1 Right-click in the topology view, and select Create Physical NEs in batch on the displayed menu. The Create Physical NEs in batch dialog box is displayed, as shown in Figure 4-4. Figure 4-4 Creating physical NEs in batches Step 2 Click . Select a file for creating NEs in batches. Step 3 Click Verify. Check the script file configuration. Step 4 Click OK. The NE is created in the topology view. Click Cancel to cancel the creating operation.
  • 36. 4 Topology Management M2000 Operator Guide 4-12 Huawei Technologies Proprietary Issue 02 (2006-10-31) ----End 4.3 Deleting NEs 4.3.1 Deleting Physical NEs Description Delete physical NEs from the physical topology. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before deleting a physical NE, ensure that: ! You have logged in to the M2000 client. ! The physical NE exists in the M2000, and it is not a group NE. Procedure To delete a physical NE from the topology view, perform the following steps: Step 1 Select a physical NE in the topology view. Step 2 Right-click the NE, and select Delete on the displayed menu. Step 3 Click Yes in the displayed Confirm dialog box. The deletion progress is displayed in percentage. When 100% is displayed, the physical links of the physical NE are deleted automatically. ----End 4.3.2 Deleting Virtual NEs Description Delete virtual NEs from the physical topology. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before deleting a virtual NE, ensure that: ! You have logged in to the M2000 client.
  • 37. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-13 ! The virtual NE exists in the M2000. Procedure To delete a virtual NE from the topology view, perform the following steps: Step 1 Select the virtual NE in the topology view. Step 2 Right-click the NE, and select Delete on the displayed menu. Step 3 Click Yes in the displayed Confirm dialog box to delete the virtual NE. If the virtual NE contains sub-NEs, the sub-NEs are displayed in the upper physical topology after you delete the virtual NE. ----End 4.3.3 Deleting Group NEs Description Delete group NEs from the physical topology. Network Equipment Supporting This Task BSC, MGW, RNC and MSC Server. Prerequisites Before deleting a group NE from the physical topology, ensure that: ! You have logged in to the M2000 client. ! The group NE to be deleted exists in the M2000. Procedure To delete the group NE, perform the following steps: Step 1 Select the group NE to be deleted in the topological view. Step 2 Right-click the group NE, and select Delete on the displayed menu. Step 3 Click Yes in the Confirm prompt dialog box to delete the group NE from the current view. If the group NE contains other NEs, it exists as a virtual NE. In this case, the icon becomes a virtual icon. ----End
  • 38. 4 Topology Management M2000 Operator Guide 4-14 Huawei Technologies Proprietary Issue 02 (2006-10-31) 4.4 Creating Subnets Description Create subnets in the physical topology. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before creating a subnet in the physical topology, ensure that: ! You have logged in to the M2000 client. ! The topological view and the network architecture are well planned. ! Procedure To create a subnet, perform the following steps: Step 1 Right-click in the topology view, and select Create Physical Subnet on the displayed menu. The dialog box Create Physical Subnet is displayed, as shown in Figure 4-5. Step 2 Click the Basic Attribute tab. Set the subnet attributes. Step 3 Click the Background Selection tab. Set the background. Step 4 Click the Objects Selection tab. Select the NEs and subnets to be displayed under this subnet. Step 5 Click OK. After the creation, you can view the icon of this subnet in the topology view. Double-click the icon to view the NEs and subnets under this subnet.
  • 39. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-15 Figure 4-5 Creating physical subnets ----End 4.5 Deleting Subnets Description Delete subnets from the physical topology. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before deleting a subnet, ensure that: ! You have logged in to the M2000 client. ! The subnet exists in the M2000. Procedure To delete a subnet from the topology view, perform the following steps: Step 1 Select the subnet in the topology view.
  • 40. 4 Topology Management M2000 Operator Guide 4-16 Huawei Technologies Proprietary Issue 02 (2006-10-31) Step 2 Right-click the subnet, and select Delete on the displayed menu. The Confirm dialog box is displayed. Step 3 Click Yes in the Confirm prompt dialog box. NEs and subnets under this subnet, if any, are displayed in the upper physical topology after you delete this subnet. ----End 4.6 Creating Links 4.6.1 Creating Physical Links Description Create physical links in the topology view manually. Network Equipment Supporting This Task MGW and MSC Server. Prerequisites Before creating a physical link in the topology view, ensure that: ! You have logged in to the M2000 client. ! The topology view and the network architecture are well planned. Procedure To create a physical link, perform the following steps: Step 1 Right-click in the topology view, and select Create Link on the displayed menu. The Create Link dialog box is displayed. Step 2 Select the link type in the Create Link dialog box. Step 3 Click . Select the NE for link side A and side Z. In the End A MO and End Z MO areas, select the configuration for the two ends of the link. Click to add the configuration to the list on the right. ! To set up multiple links, repeat the above steps. ! To reselect the NEs, click Reset. Step 4 Click Create or Close.
  • 41. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-17 The prompt dialog box Create Link displays the progress of the link creation. After the creation, a link is displayed between the two NEs. ----End 4.6.2 Creating Virtual Links Description Create virtual links in the topology view. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before creating a virtual link in the topology view, ensure that: ! You have logged in to the M2000 client. ! The topology view and the network architecture are well planned. Procedure To create a virtual link, perform the following steps: Step 1 Right-click in the topology view, and select Create Virtual Link on the displayed menu. The Create Virtual Link dialog box is displayed. Step 2 Enter the name of the virtual link. Step 3 Select the NEs in the end A and end Z of the link. Step 4 Click OK. After the creation, a link is displayed between the two NEs. ----End 4.7 Moving NEs 4.7.1 Moving NEs to a Group NE Description Move one or more NEs to a group NE in the topology view. Network Equipment Supporting This Task Move the NodeB to the RNC and the MGW to the MSC Server.
  • 42. 4 Topology Management M2000 Operator Guide 4-18 Huawei Technologies Proprietary Issue 02 (2006-10-31) Prerequisites Before moving an NE to a group NE, ensure that: ! You have logged in to the M2000 client. ! The NE exists in the same subnet as the group NE. Procedure To move an NE to a group NE, perform the following steps: Step 1 Select the target group NE in the topology view. Step 2 Right-click the NE, and select Property on the displayed menu. The NE Property dialog box is displayed, as shown in Figure 4-6. Figure 4-6 NE Property dialog box Step 3 Click the Object Selection tab. Step 4 Select the NE to be moved to the group NE in the Available Objects list, and click . The NE is added to the Selected Objects list. Step 5 Click OK. Double-click the group NE icon to view the group NE and the NEs under it.
  • 43. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-19 ----End 4.7.2 Moving NEs to another Subnet Description Move one or more NEs to another subnet in the physical topology. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before moving an NE to another subnet, ensure that: ! You have logged in to the M2000 client. ! The NE exists in the same network layer as the target subnet. Procedure To move an NE to another subnet, perform the following steps: Step 1 Select the target subnet in the topology view. Step 2 Right-click the NE, and select Modify on the displayed menu. The Modify Physical Subnet dialog box is displayed, as shown in Figure 4-7.
  • 44. 4 Topology Management M2000 Operator Guide 4-20 Huawei Technologies Proprietary Issue 02 (2006-10-31) Figure 4-7 Modify Physical Subnet dialog box Step 3 Click the Objects Selection tab. Step 4 Select the NE to be moved to the subnet in the Available Objects list, and click . The NE is added to the Selected Objects list. Step 5 Click OK. Double-click the group NE icon to view all the NEs under this subnet. ----End 4.7.3 Moving NEs on the Same Subnet Description Move an NE to other locations in the same subnet in the topology view. This operation changes only the location of the NE in the topology view. The actual geographical location and physical connections of the NE is not concerned. Network Equipment Supporting This Task All manageable network equipment.
  • 45. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-21 Prerequisites Before moving an NE in the same subnet, ensure that: ! You have logged in to the M2000 client. ! The NE exists in the M2000. Procedure To move an NE in the same subnet, perform the following steps: Step 1 Select the NE in the topology view. Step 2 Drag it to the required location. Step 3 Click in the toolbar in the middle part to save the new location of the NE. ----End 4.8 Filtering NEs in the Topology View Description Set the filtering conditions as required, so that it shows only certain objects, such as the background, NE, subnet, and link name. Network Equipment Supporting This Task All manageable network equipment. Prerequisites Before filtering NEs, ensure that you have logged in to the M2000 client. Procedure To filter NEs in the topology view, perform the following steps: Step 1 Click the Filter tab in the left pane of the topology view. Step 2 Select the objects to be displayed in the navigation tree. The objects that are not selected are not displayed in the topology view. ----End 4.9 Customizing Topology Tips Description Topology tips are the prompt information displayed after the mouse pointer rests on an object for several seconds.
  • 46. 4 Topology Management M2000 Operator Guide 4-22 Huawei Technologies Proprietary Issue 02 (2006-10-31) You can customize the counter items as prompt information as required. The counter items are classified into three types by NE, Link and District. Network Equipment Supporting This Task No NEs are involved. Prerequisites Before customizing topology tips, ensure that you have logged in to the M2000 client. Procedure To customize topology tips, perform the following steps: Step 1 Choose Tools > Customize Topology Tips. The Customize Topology Tips dialog box is displayed. The system displays the counter item (activated or to be set) of the first NE in the navigation tree by default. Step 2 Select a counter in the navigation tree. Step 3 Set the counter item in the right of the dialog box. Step 4 Click OK or Apply. ----End 4.10 Switching Background Maps Description Two views, topology view and map view, are available in the M2000. ! You can only switch the background maps of the topology views. ! The background of the topology view is Empty map by default. In other words, the topology view has no background maps. The file format that can serve as the background map of the topology view in the M2000 includes: GIF, IVL, JPEG, JPG, MIF, and SHP. Network Equipment Supporting This Task No NEs are involved. Prerequisites Before setting the background map of the topology view, ensure that: ! You have logged in to the M2000 client. ! The electronic maps exist in the M2000 client.
  • 47. M2000 Operator Guide 4 Topology Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 4-23 Procedure To switch electronic maps in the M2000 client, perform the following steps: Step 1 Right-click in the topology view, and select Set BackGround on the displayed menu. The Set BackGround dialog box is displayed. Step 2 Click Select, and select the electronic map file. Step 3 Click OK. After that, the electronic map selected becomes the background of the topology view. ----End
  • 48. M2000 Operator Guide 5 Alarm Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-1 5 Alarm Management About This Chapter The following table lists the contents of this chapter. Title Description 5.1 Introduction to Alarms Introduces the alarm categories, alarm severity levels and the alarm types. 5.2 Alarm Statuses Introduces the alarm statuses. 5.3 Alarm Processing Procedures Introduces the alarm processing procedures. 5.4 Querying and Browsing Alarms Describes how to query and browse the alarms. 5.5 Collecting Alarm Statistics Describes how to collecting the alarm statistics. 5.6 Acknowledging and Unacknowledging Alarms Describes how to acknowledge and un acknowledge the alarms. 5.7 Creating User Defined Alarms Describes how to create a user defined alarm. 5.8 Displacing Alarms to a File Describes how to displace the alarms to a file. 5.9 Synchronizing Alarms Describes how to synchronize the alarms manually and automatically. 5.10 Redefining the Alarm Severity Level Describes how to redefine the alarm severity levels. 5.11 Setting Alarm Correlation Rules Describes how to set the alarm correlation rules. 5.12 Managing the Alarm Knowledge Library Describes how to manage the alarm knowledge library.
  • 49. 5 Alarm Management M2000 Operator Guide 5-2 Huawei Technologies Proprietary Issue 02 (2006-10-31) Title Description 5.13 Operating the Alarm Board Describes how to operate the alarm board. 5.14 Operating the Alarm Box Describes how to operate the alarm box. 5.15 Setting the Alarm Notification by SMS Describes how to set the alarm notification by SMS. 5.16 Setting the Alarm Notification by PhoneNo. or PagerNo. Describes how to set the alarm notification by phoneNo. or pagerNo.. 5.17 Setting the Alarm Notification by Email Describes how to set the alarm notification by Email.
  • 50. M2000 Operator Guide 5 Alarm Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-3 5.1 Introduction to Alarms 5.1.1 Alarm Categories Alarms can be categorized based on two principles: ! By alarm content: event alarms and fault alarms ! By alarm handling and clearance: history fault alarms and shielded alarms These four categories of alarms are described as follows: ! Fault alarms, such as a board fault alarm, are generated when faults occur to hardware devices or exceptions occur to key functions. Fault alarms are more severe than event alarms. Fault alarms can be cleared. ! Event alarms, such as a congestion alarm, are occasionally generated during the equipment operation. The event alarms indicate only the equipment status at a certain point of time. The system generates some event alarms periodically. Event alarms do not need manual handling. ! History fault alarms refer to the cleared and acknowledged fault alarms. ! Shielded alarms are generated during a short period of time. The alarms matching the correlation rules set on the M2000 client are shielded alarms, and they are stored in the M2000 shielding library. Shielded alarms can only be fault or event alarms. 5.1.2 Alarm Severity Levels Alarm severity level indicates how severe a generated alarm is. Sorted in the descending order, alarms have four severity levels: critical, major, minor, and warning . ! Critical alarms, such as the power circuit fault alarm or the output clock fault alarm, affect the whole system operation. Critical alarms require immediate handling. ! Major alarms, such as alarms about disconnected fibers or physical line faults, occur only to boards or lines. If not handled timely, these alarms may affect the services. ! Minor alarms, such as the alarm for bit errors in some physical lines, refer to common status alarms that indicate the working status of boards or lines. ! Warning alarms indicate status changes or events which do not affect the system performance or subscriber services, but may interest the operator. Some warning alarms prompt when the equipment returns to normality. 5.1.3 Alarm Types Based on the alarm source, the following types of alarms are available: ! Power alarms: related to the power supply system ! Environment alarms: related to the equipment environment, such as the temperature, humidity, and connection control ! Signaling alarms: related to communication signaling ! Trunk alarms: related to trunk circuits ! Hardware alarms: related to boards such as the clock and CPU ! Software alarms: related to the software
  • 51. 5 Alarm Management M2000 Operator Guide 5-4 Huawei Technologies Proprietary Issue 02 (2006-10-31) ! Running alarms: related to and generated during the system operation ! Communication alarms: related to the communication system ! QoS alarms: related to the service quality ! Processing error alarms: related to exceptions 5.2 Alarm Statuses 5.2.1 Acknowledged Alarms The alarm acknowledgement function helps to identify alarms. After you acknowledge an alarm manually, the M2000 displays the alarm as acknowledged. In this way, you can easily distinguish between the alarms processed manually and those to be processed. This status, however, only indicates that the alarm is currently acknowledged. It does not indicate that the alarm is cleared. 5.2.2 Cleared Alarms Alarm clearance applies only to fault alarms. When a fault alarm is cleared, the NE returns to normality and reports the alarm clearance information to the M2000. For those alarms that cannot be cleared automatically, the M2000 system supports manual clearance. 5.2.3 Relationship Between Alarm Categories and Alarm Statuses Fault Alarms Changing to History Fault Alarms Fault alarms can be in the following four statuses: ! Uncleared and unacknowledged ! Uncleared and acknowledged ! Cleared and unacknowledged ! Cleared and acknowledged For an acknowledged and cleared alarm, the M2000 moves the alarm from the current fault alarm library to the history fault alarm library. Accordingly, the alarm changes to a history fault alarm. For an unacknowledged or uncleared alarm, the alarm remains in the current fault alarm library as a current fault alarm. Figure 5-1 shows how a current fault alarm changes to a history fault alarm.
  • 52. M2000 Operator Guide 5 Alarm Management Issue 02 (2006-10-31) Huawei Technologies Proprietary 5-5 Figure 5-1 Process by which a fault alarm changes to a history fault alarm Event Alarms Event alarms can be in two statuses: acknowledged and unacknowledged. They do not change to other alarms. 5.3 Alarm Processing Procedures 5.3.1 Overview Figure 5-2 shows how the M2000 system processes alarms.
  • 53. 5 Alarm Management M2000 Operator Guide 5-6 Huawei Technologies Proprietary Issue 02 (2006-10-31) Figure 5-2 Procedure for processing M2000 alarms After receiving alarms from an NE or the M2000 itself, the M2000 shields the alarms, redefines the alarm severity levels, or correlates the alarms before saving the alarms in the alarm library. You can query the alarm information and acknowledge the alarms on the M2000 client. 5.3.2 Reporting Alarms When an alarm is generated, the NE reports the alarm to the M2000 through the MML command line interface, the binary interface, or the SNMP Trap (the IP networking equipment), between the NE and the M2000. 5.3.3 Saving Alarms After receiving an alarm, the M2000 processes the alarm, and then either saves the alarm in the relevant alarm library or discards the alarm as follows: Step 1 The M2000 checks if the alarm belongs to the shielded alarms defined on the M2000. If the alarm belongs to the shielded alarms, the M2000 discards the alarm. Step 2 The M2000 checks if the alarm is defined with another severity (level) on the M2000. If the alarm is defined with another severity (level), the M2000 redefines the severities (levels) of the alarm.