Operation and Maintenance of M2000 Huawei

Embed Size (px)

DESCRIPTION

Huawei

Citation preview

HSDPA

Operation and Maintenance of M2000 ClientHUAWEI TECHNOLOGIES CO., LTD.All rights reservedwww.huawei.comSecurity Level: Internal HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 2

Developed independently by Huawei Technologies Co., Ltd, the iManager M2000 V2 functions as EMS in the Huawei wireless network solution. The M2000 V2 can access a whole series of products developed by Huawei and perform centralized management on them. This slide introduces the basic operations of on the M2000 client.

PrefaceHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 3After learning this course, you will have a basic knowledge of:Basic operations on the M2000 client. Operations related to monitoring management, topology management, security management, log management, fault management, performance management, software management, data management, and configuration management.

PurposeHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 4ReferenceiManager M2000 System DescriptioniManager M2000 Administrator GuideiManager M2000 Commissioning Guide

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 5Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 6Logging In to the M2000 ClientLogging in to the M2000 serverLogging outExitingUpgrading the software on the client Automatically

Logging In to the M2000Other operationsThe diagram on the left lists some basic operations involved in M2000 client login.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 7Logging In to the M2000 ServerTo log in to the M2000 server, choose Start > All programs > iManager M2000 client > M2000 client.

Type the user name and password in the corresponding fields.Type the IP address of the M2000 server.Note: The initial user name is admin and the password is null. The user password is saved on the M2000 server. Only when the server is initially installed, the password is null. HUAWEI TECHNOLOGIES CO., LTD.All rights reserved7IP IP M2000 IPIP M2000 M2000 30 M2000 M2000 60 M2000 M2000 M2000

All program?Page 8Logging In to the M2000 Server|Main interface of the M2000 client|

Navigation treeInformation displayMenu barStatus barTool barTopology viewHUAWEI TECHNOLOGIES CO., LTD.All rights reserved8::IP M2000

Page 9Logging Out Off the M2000 ClientTo log out off the M2000 client, choose System > Logout.

Note: Logging out off the M2000 client does not mean the applications running on the M2000 client are terminated.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved9M2000

Page 10ExitingTo exit the M2000 client, choose System > Exit.

Note: Exiting the M2000 client means the applications running on the M2000 client are terminated.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 11Upgrading the Software on the M2000 Client AutomaticallyTo upgrade the software on the M2000 client automatically, perform the following steps:Step 1: Start the M2000 client.Step 2: Log in to the M2000 server. After you log in to the M2000 server, the Confirmation dialog box is displayed, click Yes.

Prerequisites:The M2000 can be automatically and correctly upgraded only when: The versions of the software on the M2000 client and on the M2000 server are of the same version sequence. The version of the software on the M2000 server is higher than that on the M2000 client.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved11VxxxRxxxCxxBxxy[SPxx]B

Page 12Upgrading the Software on the M2000 Client AutomaticallyStep 3: In the displayed Update Wizard dialog box, click Continue.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 13Other Operations

System SettingsDisplay/Hide/Customize ToolbarRegion SettingsMetrology SettingLock TerminalChange PasswordProxy Service SettingLMT Prompt SettingBroadcast MessageHUAWEI TECHNOLOGIES CO., LTD.All rights reserved13 >

Admin 8

128

LMTLMT M2000 M2000 IP LMT M2000 M2000 LMTLMT RNCNodeBASN-GWSGSNCGHLRMSC ServerMGWIWFGGSN80 LMT NodeB M2000 LMT LMT M2000 LMT LMT

LMTLMT M2000

Page 14Region Settings

Number tab pageTime tab pageDate tab pageTime Mode tab pageHUAWEI TECHNOLOGIES CO., LTD.All rights reserved14 > 0 32 3,0

/-.-(yyyy$MM$dd)dd$MMyyyyMM$dd$yyyyyyyy$MM$dd

AMPM:

Page 15Overview of Other Common OperationsSystem security settings

Single-user mode: indicates the system status during the maintenance. The single-user mode allows only one user to log in to the client and set up sessions. Multi-user mode: indicates the system status when the system is functional. The multi-user mode allows several users to log in to the client at the same time.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 16Overview of Other Common Operations

View license informationHUAWEI TECHNOLOGIES CO., LTD.All rights reserved16LicenseLicense true,

Page 17Overview of Other Common Operations

Download NE match files to the M2000 client When the version of an NE on the M2000 client is different from that on the M2000 server, download the NE match file to the M2000 client, as shown on the right. If the files related to the new version of the NE are not available, the system displays a message, indicating that the system cannot perform the upgrade operation.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved17M2000 macro macro

Page 18Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 19Overview of the M2000 Network MonitoringThe M2000 network monitoring monitors the operational status of the M2000. For instance, the monitoring management monitors the status of hard disk, database, session, or services. The M2000 monitoring management involves the following operations:Setting the server thresholdMonitoring the performance status of the server Monitoring the hard disk status of the serverMonitoring the database status of the serverMonitoring the database serving statusMonitoring the process status of the server

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 20Setting the Server ThresholdStep 1: Set the hard disk threshold.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved20:CPU (%):1 100 80(%):1 10090(:2 60 3(%): M2000 1 100 60 70 80 90(%): M2000 1 100():60 3600 60

Page 21Setting the Server ThresholdStep 2: Set the database threshold.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 22Monitoring the Performance Status of the Server

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved22:MBMBMBMBCPU MBMBMBMBMBMBMBMBIDCPU KB

M2000

Page 23Monitoring the Hard Disk Status of the Server

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 24Monitoring the Database Status of the Server

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 25Monitoring the Database Serving Status

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 26Monitoring the Process Status of the Server

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 27Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 28Topology ManagementThe topology management is used for constructing and managing the topology structure of the entire network. In this way, the networking topology and the operational status of the entire network are displayed clearly. Creating physical subnetsCreating physical NEsManaging SNMP parameter templateMonitoring NEsAdjusting the network topologyAdjusting the display of the topology viewPrinting the topology view

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 29Creating Physical Subnets

To create physical subnets, perform the following steps:Step 1: Right-click the topology view and choose Create Physical Subnet from the shortcut menu.Set backgroundCreate physical subnetsCreate topological objectsThe Create Topo Object option is used to create physical NEs, virtual NEs, IP devices, virtual links, and physical links.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 30Creating Physical SubnetsStep 2: Set the file server.

The file server is used for the file transfer between the M2000 and the NEs. An NE is used as the file server to set up connections between the M2000 and other NEs. In this way, the problem that the M2000 cannot set up direct connection with other NEs are solved.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 31Creating Physical NEs Create a single physical NE.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved31RNCMSC ServerASN-GW BSC NodeB MGW BWA BTS NodeB RNC BTS BSC BTS BSC BTS IMSOMU CSCFHSSATSRMCCF DOPRA IMSOMU

Page 32Creating Physical NEs Create multiple physical NEs.

For instance, the Search NodeB function enables you to find the NodeBs that belong to the RNC on the topology view. Similarly, you can set Search IMSOUT to create multiple physical NEs simultaneously.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved32IMSOMU IMSOMU IMSOMU CSCF HSS ATSRM CCF DOPRA

Page 33Creating Physical NEsNE attributes template

Export NE attributes templateThe NE attributes template provides standard formats for information input when NEs are created in batches. The formats consist of INI (editable in notepad) and CSV file formats (editable in Excel). After editing the NE information, enter the NE configuration script file when you create a topological object.Note The .CSV file format supports the bulk creation of NEs in the WCDMA and WiMAX network. The .INI file format supports the bulk creation of all NEs except virtual NEs. The virtual NEs cannot be created in batches. The CSCF, HSS, ATS, RM, CCF, and DOPRA cannot be created in batches.CSCF: call session control functionHSS: home subscriber serverATSgeneral telephony application serverRM: resource manager CCFcall control functionDOPRAdistributed object-oriented programmable realtime architecture

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 34Creating Physical NEsNE attributes templateExample of NE configuration information in .ini format

Example of NE configuration information in .csv formatTemplate

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 35Monitoring NEs Monitor the NE status.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 36Monitoring NEsSet NE reconnection status.When the M2000 server is disconnected from NEs, set the M2000 to re-connect NEs.The NE reconnection has two statuses: Forbidden connectionWhen the M2000 server is disconnected from an NE, the M2000 will not attempt to connect the NE. Permitted connectionWhen the M2000 server is disconnected from an NE, the M2000 attempts to re-connect the NE. By default, a new NE is in permitted connection status.Disconnection icon:Forbidden connection icon:

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 37Monitoring NEs

Reconnect NE manually.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 38Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology View

Zoom inZoom outPartially zoom inRestoreElements displayViewPrintSearchSaveHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 39Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewAdjust the NE position.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 40Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewView or modify the basic attributes of subnets.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 41Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewSearch or modify the physical links.

To search for physical links, double-click a physical link or a physical link set on the topology view.In the displayed dialog box, right-click a link and choose Link Browser.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 42Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewDelete a subnet.Delete an NE.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 43Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewCustomize the display of topology alarms.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 44Adjusting Network Topology/Adjusting Network Topology Display/Printing Topology ViewSet the topology view to start the subnet.

The subnet view refers to that displayed on the client after the topology view is displayed.If you do not plan to set the topology view manually, the default view of the subnet started by the topology view is the root subnet view.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 45Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 46M2000 Security ManagementThe M2000 security management involves the following operations:Configuring the security managementManaging OM usersManaging NE usersManaging OM and NE usersSetting FTPS parameters

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved46M2000M2000WC/GM2000

(EMS) M2000

M2000M2000Page 47Interface of Security Management

Set the NE types to be displayed.Refresh the security management interface.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 48Managing OM Users

Add an OM user group.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved48MML MMLUserMMLUser M2000nbiAdministratorsMMLUser

Page 49Managing OM UsersAuthorizing OM User Group

Assigning privileges to OM user group Assigning new device rights to OM user groupAssigning MML command rights to OM user groupThree default user groups are available on the M2000 client. They are Administrators group, Guests group, and Operators group.The Administrators group has the highest privileges. You cannot modify or copy the privileges of the Administrator group. You can, however, authorize the Guests group and the Operators group.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved49M2000 Administrators

Page 50Managing OM Users

Synchronize OM user dataAdd OM users to OM user groupBind OM user private rightsAssign MML command rights to OM usersChange passwordNote that each NE is assigned with the corresponding MML command rights. When a new NE is added, you need to re-assign the MML command rights for each user in the OM user group.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 51Managing OM UsersSet rules for NE type rights.

You can set the rules for NE type rights in a template. After setting the template, all the NEs added have the rights inherited from this template.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved511 32 0 100 M0 M4OM G+_+M+_+32

Page 52Managing NE Users

After the OM user is bound with a real NE, you can create at the NE side a user with the same name as the OM user. This user is called NE user. The NE user logs in to the NE through the LMT.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved52B/C

Page 53Monitoring OM Users and NE Users

Monitor the OM Users.Monitor the operations of OM users who are now in session status.When the M2000 server restarts or the network is disconnected and restored, click Refresh to refresh the session monitor table.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 54

Monitoring OM Users and NE UsersMonitor the sessions of the OM user on the LMT.

Note that this function is applicable only to NEs in the WCDMA network and supports only the LMT users.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved54

Page 55Monitoring OM Users and NE UsersSet the status for a non-default NE user.

By setting the status, the non-default NE user's login and operation of the MML commands on the LMT can be controlled. Non-default NE users refer to the NE local users excluding the admin and guest users.The statuses of non-default NE users can be manageable and lock.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved55LMTLMT

Page 56Monitoring OM Users and NE UsersForce OM users to exit the M2000.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 57Monitoring OM Users and NE UsersForce OM users to exit the LMT.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 58Monitoring OM Users and NE UsersUnlocking OM users.

If the times that a user enters wrong password at a time exceeds the maximum attempts, the OM user is locked for a period. Right-click the user and choose Unlock User from the shortcut menu to unlock the user.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 59Monitoring OM Users and NE UsersSet to lock an OM user automatically.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 60Setting FTPS Parameters

Encryption mode: self-adaptation mode, SSL encryption mode, and plain mode.Supported mode: refers to the FTPS connection mode, mainly including active mode and passive mode. Transmission mode: refers to the mode in which the FTPS transfers files. The transmission mode can be in ASCII mode or in text mode.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved60FTPS SSL SSL FTPS FTPS ASCII FTPS ()0 90 FTPS 211024 65535FTPS 21 1024 21 M20004 03 (2007-10-09) 4-6201024 65535 FTPS 20 1024 20 0 327651024 655351024 65535

Page 61Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 62M2000 Log ManagementTypes of logs

Types of logsOperation log Security logSystem logNE operation logNE security logRecords all the important operations performed by OM users.

Records security events occurred in the system, such as logging in to the M2000, modifying rights for OM user group, or adding OM users.

Records significant events occurred in the system.Records all the important operations performed by NE users

Records security events occurred to NEs.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved62LMT

Page 63M2000 Log ManagementLog template12Log statistics templateLog query templateNotes: Saved on the server background, the contents of a template are associated with users. For instance, the templates created by user A can be seen by user A only. The names of log templates that are of the same type and belong to the same user cannot be duplicate. If the names of log templates are duplicate, the system cannot save the template. A maximum of 40 characters are allowed for the name of the template. The following characters are not allowed: `~!@#$%^&*()\":;?,|{}[]' The template information node does not support dynamic refresh. If user A logs in to two terminals at the same time and delete or modify template 1 on terminal 1, the deletion or modification cannot be performed on terminal 2 automatically. The manual refresh provided by the system, however, enables you to refresh the template information manually.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 64M2000 Log ManagementOperations involved in the M2000 log management are as follows:Querying logsCollecting statistics on logsManaging log templatesHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 65Querying Logs

Querying operation logsQuerying system logsQuerying security logsQuerying NE operation logsQuerying NE security logsHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 66Collecting Statistics on Logs

Collecting statistics on operation logsCollecting statistics on system logs

Collecting statistics on security logsCollecting statistics on NE operation logsCollecting statistics on NE security logsHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 67Managing Log Templates

Saving a templateModifying a templateHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 68Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 69M2000 Fault ManagementFunction The M2000 reports, manages, and analyzes NE alarms in a centralized manner. The M2000 collects NE alarms to the M2000 and displays different audio and video device alarms for the maintenance personnel. In addition, the M2000 notifies the maintenance personnel of device alarms by short message or email at the time when the alarm is generated.Operations: The following operations and analysis can be performed on NE alarms at the M2000 side. Manual restore Filtering Severity redefinition Alarm relevanceIn this way, the M2000 can perform centralized analysis and processing on the device alarms generated in the current network. HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 70M2000 Fault Management

Alarm type

Fault Management

Alarm category

Alarm severity CriticalIndicates that the device or the resource cannot be used completely and needs to be restored immediately. MajorIndicates that the quality of the device or the resource is severely damaged. Corrective measures should be taken immediately. MinorIndicates that the quality of the device or the resource is slightly affected. PromptIndicates that the quality of the device or the resource may probably be affected.

Event alarmRefers to the notification generated when the system detects the events occurred. Fault alarmRefers to the notification generated when the system detects the faults occurred.

Alarms can be related to the following items:Power supply systemEnvironment systemSignaling systemRelay systemHardware systemSoftware systemOperating systemTelecommunications systemService qualityFault handlingInternal alarmHUAWEI TECHNOLOGIES CO., LTD.All rights reserved70

Page 71M2000 Fault ManagementSaving alarmsIn the alarm database, four tables are available for saving alarms. The four tables are as follows: tbl_cur_alm: saves currently generated alarms. tbl_his_alm: saves alarms generated in the past. tbl_event: saves the event alarms.tbl_mask_alm: saves the shielded alarms.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 72Mechanism for Processing Alarm Table Overflow By default, the alarm service detects whether the number of alarms in the alarm table reaches to the upper threshold every 83 seconds after it is started. The upper threshold for each alarm table is as follows:tbl_cur_alm: 100, 000tbl_his_alm: 2 million and can be modified through the M2000 client.tbl_event: 200 million and can be modified through the M2000 client. tbl_mask_alm: 200, 000

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved72Page 73Mechanism for Processing Alarm Table OverflowWhen the alarms recorded in the alarm table exceed the threshold, different alarm tables have different mechanisms to process alarm table overflow. tbl_cur_alm: sorts the alarms by alarm generation time in sequence and forcibly changes first ten thousand unacknowledged and cleared alarms to the tbl_his_alm. If the alarm table still has the problem of overflow, move the earliest unacknowleged and uncleared alarms to the tbl_his_alm. tbl_his_alm: sorts the alarms by alarm generation time in sequence and documents the 20 percent of the earliest alarms. Then, the system deletes these earliest alarms automatically.tbl_event: sorts the alarms by alarm generation time in sequence and documents the 20 percent of the earliest alarms. Then, the system deletes these earliest alarms automatically. tbl_mask_alm: deletes the earliest 100,000 alarms from the alarm table.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 74Operations Involved in the M2000 Fault Management

Browsing current fault alarmsBrowsing event alarmsQuerying current fault alarmsQuerying event alarmsQuerying history fault alarmsQuerying shielded alarmsCollecting statistics on alarmsHUAWEI TECHNOLOGIES CO., LTD.All rights reserved741000 Page 75Operations Involved in the M2000 Fault Management

Browsing current fault alarmsBrowsing event alarmsSetting alarm servicesHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 76Operations Involved in the M2000 Fault ManagementSet alarm services.

Setting remote alarm notification

Setting parameters of remote alarm notificationAcknowledging alarmsRedefining alarm severitySetting conditions for alarm filteringSetting alarm correlation analysisHUAWEI TECHNOLOGIES CO., LTD.All rights reserved76

Page 77Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 78Performance ManagementMeasurement is a process during which the value of an attribute for an NE entity (including logical entity) in a period is acquired.Category of performance measurement countersSystem counters: a kind of a default counter defined in the NE. System counters are categorized into common counters and extended counters. - Common counters: By default, the common counters are in the measurement state. The measurement can be cancelled. - Extended counters: By default, the extended counters are in the non-measurement state. Before performing any measurement on extended counters, you need to activate them first. You can enable or disable the measurement on extended counters. Custom counters: refers to the counters that are defined on the M2000 client by users. The principle for customizing counters is to perform arithmetic operations on the default counters, including common counters and extended counters, in the system. In this way, custom counters are self-defined.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved78M2000M2000

M2000M2000M2000 M2000 M2000 M2000

M2000 M2000

Page 79Performance Measurement ObjectsClass 1Refers to some significant objects of NEs. By default, objects belonging to class 1 are in the measurement state. The measurement on class 1 objects can be cancelled. For instance, the Iu interface of the RNC belongs to class 1.Class 2By default, the objects belonging to class 2 are in the non-measurement state. You need to first activate these objects before performing any measurement on them. You can enable or cancel the measurement on these objects. For instance, the neighbors of the RNC belongs to class 2.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved79M2000lM2000M2000 M2000 M2000M2000

Page 80Performance Measurement ObjectsClass 3Refers to those objects created manually by users in the Setting Performance Measurement Object dialog box. You need to first activate these objects before performing any measurement on them. You can add, modify, or delete the Class 3 objects. In addition, you can also enable or cancel any measurement on class 3 objects. For instance, the IMSI number of the SGSN belongs to class 3. The RNC does not have class 3 objects.

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved80M2000lM2000M2000 M2000 M2000M2000

Page 81Performance Measurement Periods The measurement periods vary according to the measurement objects. The following measurement periods are available: 5 minutes, 15 minutes, 30 minutes, 60 minutes, or 24 hours. Note that the measurement whose periods are 5 minutes or 15 minutes are called real-time measurement, or short-period measurement. Only some of the NEs support the real-time measurement. Caution: The measurement periods for all the NEs of the same type must be same.HUAWEI TECHNOLOGIES CO., LTD.All rights reserved81M2000 5 15 30 60 24

Page 82Performance Measurement Results and Counter ThresholdPerformance measurement results refer to the values of measurement counters of NE measurement objects.Performance counter threshold can be set in either of the following windows: Threshold Management window Performance Monitor window

If the value of a counter exceed this threshold, the threshold alarm is generated.

For the same counter, you can set alarm thresholds for various time phases, or set an alarm threshold for all time periods in each measurement period. These thresholds can be set for all objects of a measurement type, or for one or more objects.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 83Results of Performance Measurement StatisticsThe maximum saving days for the results whose measurement period is 5 minutes or 15 minutes are 7 and represented by the parameter maxRTResultSavingDay.The maximum saving days for the results whose measurement period is 30 minutes, 60 minutes, or 1 day are 30 and represented by the parameter maxResultSavingDay.The M2000 checks the results whose period is 30 minutes, 60 minutes, or 1 day on a fixed time 03:25 a.m. each day. This is represented by the parameter capacityControlTime. The M2000 deletes the data saved for over 30 days.The M2000 checks the results whose period is 5 minutes or 15 minutes on a fixed time 04:35 a.m. each day. This is represented by the parameter capacityControlTime + 70 minutes. The M2000 deletes the data saved for over 7 days.The parameters described previously are described in the file /export/home/omc/var/etc/conf/pmsvc.xml.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 84Measurement Settings

Open the Measurement Settings window.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 85Setting Measurement

Two navigation modesChange of function setsChange of function subsetPeriods for the selected function subsetCounter IDSeveral NEsObjectsApplying the measurementHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 86Monitoring NE Performance

Synchronizing measurement results of NEsQuerying missing measurement results of NEs

Measurement managementHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 87Monitoring NE PerformanceMonitor the integrity of measurement results of current NEs.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 88Querying Performance Measurement Results (I)

Query templateCreate a queryHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 89Querying Performance Measurement Results (II)

Setting an objectSetting a counterOther settings, such as querying the busy-hour results, measurement periods, sorting, and filter conditionsHUAWEI TECHNOLOGIES CO., LTD.All rights reserved8960 60 30 60 30 15 15

Page 90Managing Measurement Objects

Importing the information about measurement objectsExporting the information about measurement objects

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 91Managing Measurement ObjectsActivate/Suspend measurement tasks.

Activating measurement tasksSuspending measurement tasksHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 92Managing User-Defined Counters

Creating user-defined countersModifying user-defined countersImporting user-defined counters

Exporting user-defined countersHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 93Managing Counter Threshold

Setting the counter thresholdModifying the counter thresholdSetting the status of the counter thresholdHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 94Monitoring NEs in Real Time

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved94Tip MSC Server RNC

Page 95Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 96Software ManagementThe software management involves the following operations:Managing the software and filesUpgrading NE software and patchesManaging RAN LicensesQuerying Version Information on Software Installed on the ServerHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 97Managing Software and Files

Browsing the file information on the server. The file information includes software, patches, license, data, and others.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 98Managing Software and Files

Transferring files from the client to the serverTransferring files from the server to the clientTransferring files from NEs to the serverTransferring files from the server to NEsHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 99Upgrading NE Software and PatchesThe software management function enables you to upgrade the software and patches of the following NEs: RNC NodeB SGSN GGSN MSC server MGW ASN-GWNoteFor details about how to upgrade the RNC, the NodeB, and their corresponding patches, refer to the upgrade guide. HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 100Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 101Overview of Data Management: Backing Up NM DataYou can back up the NM data in two ways: periodic backup and manual backup. You can back up the NM data through the full backup and the incremental backup. The following gives the difference between the full backup and the incremental backup:Each time when a full backup is performed, the M2000 removes all the previous files related to full backup and incremental backup on the server and saves one and only the latest compressed full backup file. The file of full backup is named in the following way: all-current time, such as, all-20060106103055.tar.gz.Each time when an incremental backup is performed, a new backup file is generated. The incremental backup is on the basis of previous backup data that can be a full backup or an incremental backup. The file of an incremental backup is named in the following way: inc-current time, such as, inc-20060106103055.tar.gz.The NM data to be backed up refers to the data contained the following files:/export/home/omc/var//export/home/sysm/The backup files of the NM data are saved in the directory of /export/home/backup/omc/ on the M2000 server.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 102Overview of Data Management: Backing Up NE DataNE data backup: The data management provided by the M2000 enables you to back up the configuration files of all NEs managed by the M2000 and the files that change dynamically during the operation.You can back up the NE data in two ways: the periodic backup and the manual backup. The system can generate one backup file after you perform the backup task once. The maximum number of NE backup files stored on the server is determined by the M2000 configuration file. At present, the M2000 server can store up to seven backup files for each NE. When more than seven backup files are generated for an NE, the M2000 server stores only the latest seven backup files for this NE. Meanwhile, the M2000 server refreshes the backup file list.The backup files of NE data are saved to the path: M2000 server/export/home/sysm/ftproot/NE type. Take the RNC for example, /data type/NE FDN.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 103When the M2000 system fails, you can run the diagnostic tool to collect all the related diagnostic information from the M2000 server and client through the FTP protocol. By using this information, you can locate faults.The collected information is as follows:Trace files on the client, for example, Client_DebugTrace. Java virtual machine thread stack and lock state of the client, for example, Client_ThreadStackDump.txt.Trace files on the server, for example, iMAP.root.trace (to store the current trace file)imap_stacks.20070206.170237.trace (to store history trace files before the currently collected NM log file). Core files on the server, for example, core.imapsvcd.0.21221.1170824184.stack. NE alarm synchronization number, for example, FMSyncNo. The pstack file, for example, imap_stacks.20070207.155817.trace. Information of the Sybase, for example, SybaseConfig.zip, SybaseVersion.zip, SYBLog.20070206.171040.zip.

Overview of Data Management: NM Log DataHUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 104Overview of Data Management: NM Log DataBy default, the collected files are saved in M2000 client\iManagerM2000Client\diagnosis\collected files. You can change the save path.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 105Data Management

Management of server dataManagement of NE dataHUAWEI TECHNOLOGIES CO., LTD.All rights reserved105BAKDATA+M2000 FTP IMSOMUCSCFHSSATSRMCCFDOPRASBC MRF

Page 106Data Management

NE data managementRefreshing NE backup dataRestoring NE backup data

Backing up NE dataHUAWEI TECHNOLOGIES CO., LTD.All rights reserved106BAKDATA+M2000 FTP IMSOMUCSCF

Page 107Collecting NM Log Files

Step 1HUAWEI TECHNOLOGIES CO., LTD.All rights reserved1071 > iManager M2000 > M2000 M2000 2 FTP 1. M2000 IP 2. 3. FTP 3 11.5.3 trace trace core trace 4 M2000 \iManagerM2000Client\diagnosis\collectedfiles 5 M2000

Page 108Collecting NM Log FilesStep 2: Set the FTP server. Enter the IP address of M2000 server. Enter the port number. Enter the FTP user name and password used to log in to the target server. Step 3: Select information to be collected. If you plan to collect trace files on the client, trace files on the server, core files on the server, or trace files on the local maintenance station, you should enter Start Time and End Time to collect the information within the specified time range. If you plan to collect alarm diagnostic data of the NE, enter the name of the NE whose alarm diagnostic data you want collect in NE Name.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 109Collecting NM Log FilesStep 4: Set the folder for saving the diagnostic information. The collected files are saved under the M2000 client installation directory: \iManagerM2000Client\diagnosis\collected files. You can change the directory for saving collected files. Step 5: Click Collect to collect the diagnostic information. If you click Stop when the diagnostic tool is collecting information from a client, you are not allowed to stop the progress of collecting information from the client. If you click Stop when the diagnostic tool is collecting information from the M2000 server, you are not allowed to get any diagnostic information about the server.

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 110Chapter 1 Logging In to the M2000 Client Chapter 2 Network MonitoringChapter 3 Topology ManagementChapter 4 Security ManagementChapter 5 Log ManagementChapter 6 Fault ManagementChapter 7 Performance ManagementChapter 8 Software ManagementChapter 9 Data ManagementChapter 10 Configuration Management

Organization

HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 111Configuration ManagementThe operations involved in the configuration management vary with different products. For details about the operations involved in the configuration management, refer to the iManager M2000 Operator Guide. This part only illustrates how to start the LMT.HUAWEI TECHNOLOGIES CO., LTD.All rights reservedPage 112Starting the LMT

HUAWEI TECHNOLOGIES CO., LTD.All rights reserved112LMTLocal Maintenance TerminalLMT M2000 LMT

LMT M2000 PC LMT LMT LMT

LMT LMT NodeB LMT M2000 LMT

[DBS3800]Name = Vendor = Physical Location = District = IP Address = Description = pos X = pos Y = longitude = latitude =

[RNC]Name = Vendor = Physical Location = District = IP Address = Description = pos X = pos Y = longitude = latitude =

template(CSV)NE TypeNameVendorPhysical LocationDistrictIP AddressDescriptionpos Xpos Ylongitudelatitude