Upload
kimberly-reid-trowers
View
133
Download
2
Tags:
Embed Size (px)
Citation preview
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Internal
OMD606200HUAWEI BSC6000 Fault
Management
ISSUE 1.0
Page 2HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
The article describes concepts related
to alarms of HUAWEI BSC6000 and
mechanism of reporting alarms, and
introduces common operation functions
of alarm management with respect to
alarm operation & maintenance and
alarm box operation & maintenance
Page 3HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
References
HUAWEI BSC6000 Base Station
Controller LMT User Guide
HUAWEI BSC6000 Base Station
Controller Routine Maintenance Guide
Online Help
Page 4HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Upon completion of this course, you will
be able to:
get familiar with basic concepts of
BSC6000 alarms
understand the mechanism of
implementing BSC6000 alarms
get familiar with common
operations of BSC6000 alarm
management
Page 5HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Chapter 1 Basic ConceptsChapter 1 Basic Concepts
Chapter 2 Alarm OperationChapter 2 Alarm Operation
Chapter 3 Alarm Transfer ToolChapter 3 Alarm Transfer Tool
Page 6HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Alarm Classification
According to the generation time, alarms are classified into:
Active alarm: An active alarm is a fault alarm not recovered in the BSC6000 system
History alarm: A history alarm is an alarm generated in the BSC6000 system
History alarms consist of the following:
Fault alarms recovered
Fault alarms not recovered
Event alarms
According to the alarm nature, alarms are classified into:
Fault alarm: A fault alarm is an alarm that is reported to the network management equipment when equipment has faults or exceptions. After the faults or exceptions are processed and cleared, the alarm is cleared
Page 7HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Alarm Classification
Event alarm: An event alarm is a alarm generated to
indicate a transient state during equipment operation. Some
event alarms are generated periodically. Event alarms are
only to notify that the system is in alarm state and thus do
not require handling
Page 8HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Basic Concepts of Alarms
Alarm serial number: The
alarm serial number is
arranged on the basis of
alarm raised time. The alarm
serial number is the only
index in the alarm logs. The
alarm generated and the
alarm cleared use the same
alarm serial number
Alarm name: The alarm name
has a one-to-one mapping
with the alarm ID
Page 9HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Basic Concepts of Alarms
Alarm raised time
Recovery time
Alarm ID: An alarm ID defines a type of alarms and
represents a specific type of faults or events. Alarm ID
is the only index of alarm item, and is the main
keyword of the alarm configuration table in the
network management system
Page 10HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Basic Concepts Alarm severity: Critical Alarm, Major Alarm, Minor Alarm, Warning Alarm
Alarm severity
Definition Handling method
Critical Alarms that affect the services provided by the system
Critical alarms must be handled immediately even if they are generated outside working hours. If the equipment or resources are totally unavailable, the equipment or resources have to be recovered.
Handle the alarms immediately.
Otherwise, the system may be
unavailable.
Major Alarms that affect the quality of service
Major alarms must be handled during working hours. If the quality of services provided by certain equipment or resources decreases, the equipment or resources need to be recovered.
Handle the alarms in time.
Otherwise, some major functions may be affected.
Minor Alarms that do not affect the quality of services but may lead to more serious faults
Minor alarms need handling in proper time or further check.
Check the alarm causes and
eliminate them.
Warning Alarms indicating that there may be
faults affecting the quality of services
Learn the running status of the
system
Page 11HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Basic Concepts Classification of network management: The network management
is divided into power system, environment system, signaling
system, trunk system, hardware system, software system,
operating system, communication system, quality of services,
processing faults, and so on
Location information: Location information is the information used to
locate alarms. The location information in the alarm recovery report is the
same as that in the corresponding fault alarm report
Alarm type: Fault alarm or event alarm
Alarm Clear Flag: The sign indicates whether an alarm is cleared.
The Flag is either “not cleared” or “cleared”
Shield Flag: The Shield Flag shields the alarm information not required
Page 12HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
To Alarm Box Flag: To Alarm Box Flag controls the alarm
reporting to the alarm box
Synchronization Serial Number: The synchronization serial
number is arranged on the basis of the sending time of the
alarm report. The synchronization serial number ranges
from one to 0x7ffffffe (hexadecimal) in a cyclical order
Basic Concepts
Page 13HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Connection of Alarm Box
Connection scheme: Through the serial port, the alarm box is
connected to the LMT client
When an alarm is reported, LMT uses the Convert program to drive
the alarm box to generate an audible and visual alarm
The operator uses the LMT alarm console to control the alarm box,
for example, stopping the alarm sound and the alarm indictor
Alarm management module
GBAM
Alarm Box
Convert
LMT client
Alarm Box
Page 14HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Channel to Report Alarms of Local Subrack
Process of reporting alarms of the local subrack:
SMU generates alarms
After being screened and filtered on SMU, alarms are switched through GE and reported to GBAM
GBAM reports alarms to LMT/EMS and records the alarm log
The Convert module of LMT drives and output the alarm box
GMPS
Serviceboard
GSCU GBAMLMT
ConvertAlarm
box
GEPS
GSCUServiceboard
Page 15HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Channel to Report Alarms of Remote Subrack Process of reporting alarms of remote subrack:
The remote subrack SMU generates alarms
Alarms are screened and filtered on SMU
Alarms are switched through GE to the GEIUT of the local subrack, and
then sent through SS7 link of the Ater interface to the GEIUT board of the
central subrack
The GEIUT board of the local subrack switches alarms through GE and
reports to GBAM
GBAM finishes corresponding output (send the output to LMT/EMS and
records the alarm log)
The Covert module of LMT finishes driving and output of the alarm box
GMPS
GEIUT GSCU GBAMLMT
ConvertAlarmbox
GTCS
Serviceboard GEIUT
Page 16HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Channel to Report BTS Alarms Process of reporting BTS alarms:
Alarms generated at BTS are screened and filtered inside the BTS
Alarms are sent through OML links and sent to EIUB of the local subrack. Alarms are processed through LAPD protocol on the EIUB, switched through GE, and sent to GBAM
GBAM finishes the alarm output (reports alarms to LMT/EMS and records the alarm log)
The Convert module of LMT finishes driving and output of the alarm box
GMPS
GEIUB GSCU GBAMLMT
ConvertAlarmbox
GEPS
GEIUB GSCU
BTS
BTS
Page 17HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Chapter 1 Basic ConceptsChapter 1 Basic Concepts
Chapter 2 Alarm OperationChapter 2 Alarm Operation
Chapter 3 Alarm Transfer ToolChapter 3 Alarm Transfer Tool
Page 18HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Operations About Alarms
Management operations of alarms are as follows:
Browsing Alarms
Querying History Alarms
Querying Alarm Box Information
Controlling the Alarm Box
Maintaining the Shield Severity of the Alarm Box
Querying Alarm Configuration
Setting Alarm Display Color
Page 19HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Browsing Alarms Browsing Alarms: Query active alarms and receive real-time alarm
reports to keep the displayed active alarms corresponding with GBAM. In addition, alarms can be manually cleared. (Demonstrate)
Page 20HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying History Alarms
Query history alarms. There are two tab pages of setting conditions for history alarms:
General Option
Detailed Option
Page 21HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying History Alarms
After setting the conditions for querying history alarms, click OK to display
the query interface
Page 22HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying History Alarms Right click the selected alarm, and in the short-cut menu, make the
following operations:
Choose Query History Alarm to query history alarms again
Choose Save All Alarms to save query results of all history alarms
Choose Save Selected Alarms to save query results of selected history alarms
Page 23HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Choose Alarm Details to display the interface of detailed
information of selected alarms
Choose Set Show Columns to set the alarm information to
be displayed
Choose Filter Alarms to set alarm filtering conditions so that
selected alarms can be displayed
Querying History Alarms
Page 24HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying Alarm Box Information
Querying Alarm Box Information: Query the detailed
information of alarms in the local host or GBAM
Choose Alarm > Query Alarm Box Information. The Alarm Box
Alarm dialog box is displayed. (Demonstrate)
Page 25HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
The following operations can be made according to demands:
Choose Save All Alarms to save all the queried alarm box
information
Choose Save Selected Alarms to save the selected alarm
box information
Choose Set Show Columns to set the alarm information to
be displayed
Querying Alarm Box Information
Page 26HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
The following operations can be made according to demands:
Choose Alarm Details to display detailed content of selected
alarm box information
Choose Filter Alarms to display the Filter Alarm Condition dialog
box. Set the alarm filtering conditions, and the alarm information is
displayed according to the filtering conditions
Querying Alarm Box Information
Page 27HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Controlling Alarm Box
Controlling Alarm Box: The function is used to reset the alarm
box, turn off the alarm indicator, and stop the alarm sound
Choose Alarm > Control Alarm Box to display the Alarm Box
Control dialog box
Page 28HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Maintaining the Shield Severity of the Alarm Box
Maintaining the Shield Severity of the Alarm Box: The function is
used to query and set the shield severity of the alarm box
Choose Alarm > Maintain Alarm Box Shield Severity to display
the Maintain Alarm Box Shield Severity dialog box
Page 29HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying Alarm Configuration
Querying alarm configuration: The function is used to query
Alarm ID, Alarm Name, Alarm Type, Alarm Severity, Shield
Flag, To Alarm Box Flag, and Modification Flag. (Only super
user can query Modification Flag.)
Choose Alarm > Query Alarm Configuration to display the
Query Alarm Configuration Settings dialog box
Page 30HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Querying Alarm Configuration Right-click the alarm to be queried
In the short-cut menu, make the following operations:
Choose Query Alarm Configuration to query alarm configuration again
Choose Set To Alarm Box Flag to set To Alarm Box Flag, including Report and Not report
Choose Restore Alarm Configuration to restore the default settings of the selected alarm
Page 31HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Setting Alarm Display Color
Setting alarm display color: The function is used to set the
display colors of different kinds of alarms. Without
settings, the system default colors are used
Choose Alarm > Set Alarm Display Color to display the Set
Alarm Display Color dialog box
Page 32HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Chapter 1 Basic ConceptsChapter 1 Basic Concepts
Chapter 2 Alarm OperationChapter 2 Alarm Operation
Chapter 3 Alarm Transfer ToolChapter 3 Alarm Transfer Tool
Page 33HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Alarm Forwarding Tool
Environment required for the usage:
The serial interface cable of the alarm box is connected to
the serial interface of PC
Menu path
Start > All Programs > Huawei Local Maintenance
Terminal > LMT Version > Alarm Forward Tool
Icon in the task bar
Normal
Disconnected
Page 34HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Configuring Connection of Alarm Forwarding Tool
Double click the icon in the task bar
The configuration dialog box is displayed to show the current situation of message forwarding
Menu path to the configuration
Operate > Configure
Configure parameters
IP of the host port
▪ = GBAM IP
Serial port
▪ = the number of the serial port through which PC is connected to the alarm box
Page 35HUAWEI TECHNOLOGIES Co., Ltd. HUAWEI Confidential
Summary
The lecture introduces the following information
about HUAWEI BSC6000.
Basic concepts of alarms
Process of reporting alarms
Common operations of managing alarms
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Internal
Thank You
www.huawei.com