Beruflich Dokumente
Kultur Dokumente
Contents
1 Introduction to Alarms....................................................................................................................................1 2 Alarm Monitoring............................................................................................................................................9 3 Alarm Settings................................................................................................................................................13 4 Alarm Operations...........................................................................................................................................55
1 Introduction to Alarms
1.1 Common Alarm Terms
Description Every alarm term has its specific meaning. Knowing the alarm terms preciously can help to correctly perform various operations on the alarms. Alarm Alarms are various faults or alerting information that occurs during the running of the system. Operation and maintenance personnel should perform corresponding operations based on the specific alarms. Current Alarm If the system generates an alarm and that alarm persists, then this kind of alarm is called the current alarm. History Alarm If the system generated an alarm, but the fault has been eliminated later. This kind of alarm is called the history alarm. Alarm Recovery The alarm recovery information indicates that the system has been faulty, but the fault has been eliminated at present. Alarm Level The alarm level indicates the severity of an alarm. Alarm Code It is an indicator to distinguish various alarms. Different alarms correspond to different alarm codes. Alarm Management System The alarm management system is the system maintenance tool of the OMM system. It performs the centralized monitoring on the running condition of the whole system and
collects the unexpected information of the boards, links, databases and servers. Fault Management System The fault management system timely displays the correct fault information to the administrator. Notification The notification information means the operation or unexpected information that occurs and does not affect the system. Alarm Filtering It is used to filter a certain level or some types of alarm information through certain settings.
acknowledging/unacknowledging it, clearing it, informing someone through the Email or Short Messages (SM), and viewing its detailed information and related events. If the user has summarized the processing methods of alarms and saved them in the alarm processing suggestion library, the user can also view the corresponding suggestions to shorten the time spent on troubleshooting when similar alarms occur next time. The alarm management function is capable of monitoring and managing alarms and notification messages in the network in a centralized manner. Alarm Categories
According to the severity, alarms fall into critical alarms, major alarms, minor alarms and warnings.
According to the fault types, alarms fall into the processing alarm, the Quality of Service (QoS) alarm, the environment alarm, the equipment alarm, the communication alarm, and the network management system alarm.
According to the system types, alarms fall into the security alarm, the alarm box and OMM communication link alarm, the billing server alarm, the SORM server alarm, the foreground/background communication link alarm, the MP NE Equipment Alarm, the system management alarm, the correlation alarm and the performance alarm.
Table 1.3-1 Components and Functions Introduction Alarm System MSCS Foreground Alarm System OMM Server Alarm System OMM Client Alarm System Function Collects and processes foreground alarm information; Executes background man-machine commands and return execution results Processes, stores and forwards the information; Controls the alarm box Displays, searches and prints the alarm information; Displays rack charts; Executes man-machine commands. Receives the alarm information from the background through the Ethernet interface. The alarm box can prompt the fault during the running of the system through such various modes as sound, light, screen display, the SM and file transfer.
Alarm Box
Flow description The OMM alarm management system sends the alarm (its level can be set) and warning information to the alarm box. The Mobile Station (MS) module of the alarm box converts the alarm into a SM, and then transmits it to a series of MS numbers, including the MS module of the alarm processing server, the local ZTE office personnel and relative personnel of the carrier. After receiving the alarm or warning SM, the alarm processing server converts the SM into the alarm or warning information, and generates an Email through the mail protocol and then sends it to the personnel among the predefined Email list; or re-generates a SM and then sends it to the personnel among the SM receiving list predefined in the alarm processing server.
occurs. Usually, an alarm will exist for a period of time until the problem or the fault is handled.
2 Alarm Monitoring
2.1 Alarm Monitoring Policy
Introduction When the onsite equipment is faulty, or becomes abnormal, the alarm management system sends out the alarm and warming information according to the alarm monitoring policies, which facilitates eliminating the fault and hidden trouble in time. Principle The alarm monitoring policies are described as follows. Priority policy for important alarms The alarm information is divided into four levels by severity. The higher the level is, the more serious the alarm is. When the alarms with different levels appear at the same time, the highest-level alarm information must be sent first. First time policy The alarm has an impact on the service. The alarm must be eliminated as soon as possible to quickly recover the system to the normal status and relieve the impact on the service. So the alarm information must be sent out as soon as possible. Featured by using shorter transmission time, the alarm box can send the alarm and warning information as soon as possible through the sound and the short message. Multi-receiver policy Multiple persons can receive the alarm information by alarm management server settings. In this way, it may reduce the possibility of delaying handling the fault because one or several persons did not receive the alarm information in time. Multi-way policy Using a single source to give an alarm will cause the alarm information unreliable as this procedure can become faulty. Adopting multi-way alarm monitoring policy can avoid this case.
Comparison Alarm box monitoring alarm, short message monitoring alarm, MMS monitoring alarm, and Email monitoring alarm must use the alarm box to transfer the information, while the background monitoring alarm does not. Besides monitoring alarms, the background monitoring alarm can query the system performance, while the other modes can only query the system alarm information.
The alarm box is the tool of the alarm monitoring system that can display the fault information visually and rapidly. Working Principle Connecting to the alarm box, the fault management subsystem of the OMM server transfers the alarm messages to the alarm box through the TCP/IP protocol, which are displayed on the screen and accompanied by the alarm indicator and alarm sound prompts. Functions The alarm box can collect the alarm (recovery)/warning information and log data of the equipment, and send it to the warning center. Finally, the warning center analyzes and processes the information, and notifies the corresponding personnel through the alarm short message, alarm MMS and Alarm box audible and visual information. The audible/visual information contains the following contents. Prompting the current alarm with sound Giving an alarm through indicators or horns Display relatively detailed alarm information on the screen by using the keyboard to turn pages.
11
12
3 Alarm Settings
3.1 Alarm Rule Settings
Introduction This section describes how to set an alarm rule. For how to activate, pause, refresh, and delete an alarm rule, see Alarm Rule Operations.
Valid Range Rule setting can contain multiple rules. The range where a rule takes effect varies with the type of the rule. It is called the valid range of a rule, which is divided into following
four types: Global validity Once an alarm rule is set and activated, it is effective for all alarms, events and notifications that conform to this rule, which has no relationship with the one who makes it. Therefore, the alarms that all users saw are processed according to this rule. User validity Once an alarm rule is set and activated, it is only effective for the user who makes it, such as the alarm user filtering rule. It has no influence on other users. Forward validity Once an alarm is set and activated, it is effective for all current alarms, including the alarm that has been reported and that will be reported in the future. Backward validity Once an alarm rule is set and activated, it is only effective for the alarms that will be reported in the future, having no influence on the alarm that has been reported. Function Table 3.1 -2 shows the alarm rules supported by the OMM system.
Table 3.1-2 Functions of Alarm Rules Rule Name Valid Range Function Upgrading the alarm severity or generating a new alarm when the duration of acknowledging the alarm satisfying this rule or the alarm being in the active status exceeds that specified by this rule. The persisting duration is obtained by deducting the generation time from the acknowledging time or the current time Generating a new counting alarm, saving the reported alarms and the amount into the database, and showing them on the Realtime Alarms window, when the amount of the current alarms that satisfy this rule reaches the rulespecified threshold within a period of time specified by the rule
Alarm Rule
Persisting
Alarm Rule
Counting
Function Delaying showing the reported alarm that satisfies this rule on the Realtime Alarms window for a period of time, which is specified by this rule Not showing the consequential alarm specified by this rule on the Realtime Alarms window when the root alarm of a current alarm exists or occurs Only showing one of the alarms that satisfy this rule on the Realtime Alarms window instead of all of them Not showing the alarm satisfying the rule on the Realtime Alarms window of the client of the user who set this rule Only saving the reported alarm that satisfies this rule in the database, not showing it on the Realtime Alarms window of the client Discarding the reported alarm that satisfies this rule directly, and neither saving it into the database nor showing it on the Realtime Alarms window of the client Notifying the user specified in the rule through the Email or SMS when the reported alarm satisfies this rule Clearing the reported alarm that satisfied this rule directly from the current alarms, and moving it to the history alarm database, that is, the alarm is automatically recovered Acknowledging the alarm that satisfies this rule when it is reported Clearing the reported notification that satisfied this rule directly from the Realtime Notifications window of the client, and moving it to the database Discarding the reported notification that satisfies this rule directly, and neither saving it into the database nor showing it on the Realtime Notifications window of the client
Global validity; Backward validity Global validity; Backward validity User Validity; Forward validity
Alarm Rule
Merging
15
3.
Click the
icon on the toolbar, and the New dialog box pops up. Select the
Alarm Persisting Rule radio button, and then click OK, as shown in Fig 3.1 -4.
16
4.
The Alarm Persisting Rule dialog box pops up, as shown in Fig 3.1 -5. The parameters on the Information page are described in Table 3.1 -3.
17
Table 3.1-3 Parameter Descriptions for Alarm Persisting Rule Parameters Name Description Persist Time Persist State Rule Action Descriptions The name of an alarm persisting rule The description of an alarm persisting rule The interval for an alarm persisting rule to take effect The persisting state of the alarm information, either unacknowledged state or active state When the conditions of duration and state are satisfied, the system will automatically change the alarm severity or generate a new alarm. Alarm severity change means that the severity of an alarm changes from the original level to the specified one when the rule takes effect.
5.
Select the Selection tab, as shown in Fig 3.1 -6. Select the alarm type suitable for this rule.
18
NOTE: The left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
6.
When the setting is over, click OK to complete creating an alarm persisting rule.
1.
In the main window of the network management client, choose View > Fault Management. The Fault Management window appears.
2.
In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears.
3.
Click the
icon on the toolbar, and the New dialog box pops up. Select the
Alarm Counting Rule radio button, and then click OK. 4. The Alarm Counting Rule dialog box pops up, as shown in Fig 3.1 -7. The parameters on the Information page are described in Table 3.1 -4.
Table 3.1-4 Parameter Descriptions for the Alarm Counting Rule Parameters Name Description Descriptions The name of a rule Details of a rule 20
Parameters If in _ _ there are _ suitable alarms, then new a _ alarm automatically New Alarm Information
Descriptions The duration for the rule to take effect, meaning that a new alarm of specified severity is generated when the specified number of alarms is generated within specified time. The description of the new generated alarm
5.
Select the Selection tab, as shown in Fig 3.1 -8. Select the alarm type suitable for this rule.
NOTE: The left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
6.
Result
21
Alarm Delaying Rule radio button, and then click OK. 4. The Alarm Delaying Rule dialog box pops up, as shown in Fig 3.1 -9. Enter Name, Description and Delay Time, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
22
5.
When the setting is over, click OK to complete setting an alarm delaying rule.
1.
In the main window of the network management client, choose View > Fault Management. The Fault Management window appears.
2.
In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears.
3.
Click the
icon on the toolbar, and the New dialog box pops up. Select the
Alarm Restraining Rule radio button, and then click OK. 4. The Alarm Restraining Rule dialog box pops up, as shown in Fig 3.1 -10. Enter the Name and Description.
5.
On the Root alarm area, click the Setting button to pop up the Root alarm dialog box, as shown in Fig 3.1 -11
NOTE: The left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
24
6.
Click OK after the setting is over. Return to the Alarm Restraining Rule dialog box.
7.
Click New on the Consequential alarm area, to pop up the Consequential alarm dialog box, as shown in Fig 3.1 -12.
8.
Click OK after the setting is over. Return to the Alarm Restraining Rule dialog box.
25
9.
Merging Rule radio button, and then click OK, as shown in Fig 3.1 -13.
26
4.
The Alarm Merging Rule dialog box pops up. Enter Name and Description, and select the alarm merging conditions on the Selection area.
NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types. 5. After completing the settings, click OK to complete creating an alarm merging rule.
The selected alarms will be discarded by the client and not be displayed in the alarm list or counted as the alarms of an NE. A user filtering rule is valid only for a specific login user and will not take effect on the clients that other users log in. Prerequisite Confirm that the user has logged in the network management server normally. Steps To set an alarm user filtering rule, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears. 3. Click the icon on the toolbar, and the New dialog box pops up. Select the
Alarm User Filtering Rule radio button, and then click OK. 4. The Alarm User Filtering Rule dialog box pops up, as shown in Fig 3.1 -14. Enter Name and Description, select For User parameter, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
28
5.
When the setting is over, click OK to complete setting an alarm user filtering rule.
Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears. 3. Click the icon on the toolbar, and the New dialog box pops up. Select the
Alarm Global Filtering Rule radio button, and then click OK. 4. The Alarm Global Filtering Rule dialog box pops up, as shown in Fig 3.1 -15. Enter Name and Description, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
5. rule.
When the setting is over, click OK to complete setting an alarm global filtering
30
Alarm Discarding Rule radio button, and then click OK. 4. The Alarm Discarding Rule dialog box pops up, as shown in Fig 3.1 -16. Enter Name and Description, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
31
5.
When the setting is over, click OK to complete setting an alarm discarding rule.
2.
In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears.
3.
Click the
icon on the toolbar, and the New dialog box pops up. Select the
Alarm Forwarding Rule radio button, and then click OK. 4. The Alarm Forwarding Rule dialog box pops up, as shown in Fig 3.1 -17. Enter the Name and Description on the Information page.
5.
From the List of Forwarded-to Users area, click the Custom button to pop up the Setting a Forwarded-to User dialog box. Enter Forwarding User, Email Address and Phone Number, as shown in Fig 3.1 -18.
33
NOTE: Click Select to add a user who already exists in the system to the List of Forwardedto Users. 6. Click OK to add the customized forwarded-to user to the List of Forwarded-to Users, as shown in Fig 3.1 -19.
34
7.
Select the Selection tab, as shown in Fig 3.1 -20. Select the alarm type suitable for
this rule. NOTE: The left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
8.
well, so that the maintenance personnel can better focus their attentions on important alarms. Prerequisite Confirm that the user has logged in the network management server normally. Steps To set an alarm clearing rule, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting. The Management Rule Setting page appears. 3. Click the icon on the toolbar, and the New dialog box pops up. Select the
Alarm Clearing Rule radio button, and then click OK. 4. The Alarm Clearing Rule dialog box pops up, as shown in Fig 3.1 -21. Enter Name and Description, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
36
5.
After setting all filtering conditions, click OK to complete setting an alarm clearing rule.
1.
In the main window of the network management client, choose View > Fault Management. The Fault Management window appears.
2.
In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears.
3.
Click the
icon on the toolbar to pop up the New dialog box. Select the Alarm
Acknowledging Rule radio button, and then click OK. 4. The Alarm Acknowledging Rule dialog box pops up, as shown in Fig 3.1 -22. Enter Name and Description, select the acknowledgement parameter, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
5.
Notification Global Filtering Rule radio button, and then click OK. 4. Click OK, the Notification Global Filtering Rule dialog box pops up, as shown in Fig 3.1 -23. Enter Name and Description, and select the notification filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
39
5.
When the setting is over, click OK to complete setting a notification global filtering rule.
Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting page appears. 3. Click the icon on the toolbar, and the New dialog box pops up. Select the
Notification Discarding Rule radio button, and then click OK. 4. The Alarm Acknowledging Rule dialog box pops up, as shown in Fig 3.1 -24. Enter Name and Description, and select the alarm filtering conditions on the Selection area. NOTE: The left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
5. rule.
41
3.
After the System type is selected, all alarms corresponding to this system type will
42
be displayed on the Severity Redegrading Setting page automatically, as shown in Fig 3.2 -26.
4.
Select the alarm item whose severity is to be redefined. Select the new severity from the drop-down list of New Severity, as shown in Fig 3.2 -27.
5.
Click the
time, the mark on the Modify Status column will be cleared automatically, as shown in
43
Steps To set the alarm sound, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Preferences to pop up the Preferences dialog box. On the Alarm Sound Setup page, select the sound mode from the Sound Mode drop-down list in each alarm level area. The sound mode falls into the continuous sound and the short beeps. At this time, the Select and Play buttons next to the Sound File text box are activated, as shown in Fig 3.3 -29.
44
3.
Click the Select button to select the sound file. Click the Play button to play the selected alarm sound.
4.
45
To set an alarm color, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Preferences to pop up the Preferences dialog box. Select the Alarm Color Setup tab, as shown in Fig 3.4 -30.
3. 4.
On the Alarm Color Setup page, set the alarm colors of different alarm severities. Click OK for the system to save the color parameters that have been set.
mailbox through the SM or Email. Prerequisite Confirm that the user has logged in the network management server normally. Steps To set a forwarding template, perform the following steps: 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Preferences to pop up the Preferences dialog box. Select the Forward Template Setup tab, as shown in Fig 3.5 -31. Check and recover the settings of the forwarding template of the short message and Email title and content.
3.
In the Setup the forwarding content template of the mail area, input [ to select the required parameters from the pop-up choice box, as shown in Fig 3.5 -32.
47
NOTE: The operation to set the forwarding template of the handset short message and forwarding title template of the mail are similar to this operation.
4.
Confirm that the user has logged in the network management server normally. Steps To set an alarm box, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Alarm Box Setting . The Alarm Box Setting page appears, as shown in Fig 3.6 -33.
3.
Click the
icon on the page to pop up the Alarm Box Detail dialog box, as
shown in Fig 3.6 -34. For the details of the alarm box settings, refer to Table 3.6 -5.
49
Table 3.6-5 Alarm Box Information Parameters Parameters Alarm Box Name Alarm Box Description Description The name of the alarm box, which must be input. The description of the alarm box. Input the parameter as required Selects the initial state of the alarm box, either Enable or Disable. When selecting Enable, the alarm box works normally. The IP address of the alarm box, which is in the same network segment as the address of the network management server, which must be input. The port number for alarm box for communicating with the server is 6700.
Initial State
Alarm Box IP
Server Port
50
Parameters
Description Controls the alarm severity displayed on the alarm box, which is divided into five types: none, warning and above, minor and above, major and above and critical. Sets that the alarm box gives sound corresponding to a certain level and above among all levels in the current alarm pool, including none, warning and above, minor and above, major and above and critical. Selects the alarm of a certain severity that can be received by the alarm box, including Critical, Major, Minor, Warning.
4.
After setting the Alarms send to Alarm Box, click the Advanced button to pop up the Alarm Box Rule Setting dialog box, as shown in Fig 3.6 -35.
5.
Click New in the Alarm Box Rule Setting dialog box to pup-up the Details of 3.6 -36. Enter Rule Name and
Description, and select the alarm filtering conditions on the Selection area. NOTE: In the Selection area, the left column shows the conditions distinguishing different alarm types, while the right column shows the alarm types corresponding to different alarm conditions. It is available to select several alarm conditions and alarm types.
51
6.
Click OK to completing setting the alarm box rule. The system will add a record in the Alarm Box Rule Setting dialog box, as shown in Fig 3.6 -37.
7. 8.
Click OK to pop up the Alarm Box Detail dialog box. Click OK in the Alarm Box Detail dialog box, the system adds an alarm box
52
record in the Alarm Box Setting window, as shown in Fig 3.6 -38.
9.
Click the
icon on the Alarm Box Setting window. The Confirm dialog box
53
4 Alarm Operations
4.1 Alarm Information Operations
Introduction This section mainly describes the operations related to the alarm information.
Realtime Monitor
Alarm
Realtime
Command
Detailed Procedure Management window, choose Query > Realtime Notification Monitor to pop up the Realtime Notification window
Notification Monitor
dialog box, as shown in Fig 4.1 -39. Specify the query conditions as required.
4.
Click OK to add a query record of alarm conditions on the Current Alarm Query Conditions window, as shown in Fig 4.1 -40.
5.
After selecting a query condition on the Current Alarm Query Conditions window, click the icon. The View Current Alarms page pops up, listing the
57
4.
Set the query conditions as required, enter Name and Description, and select the suitable query conditions from the Selection area. The data filtered by the system can be queried by selecting the Visibility check box.
5.
Click OK to add a query record of alarm conditions on the History Alarm Query Conditions page, as shown in Fig 4.1 -43.
59
6.
After selecting a query condition on the History Alarm Query Conditions page, icon. The View History Alarms page pops up, listing the query results.
click the
Management. The Fault Management window appears. 2. In the Fault Management window, choose Query > Alarm Synchronization to pop up the Alarm Synchronization dialog box, as shown in Fig 4.1 -44. Set the conditions of alarm synchronization.
3.
Click Select button to set the type of system to be synchronized, as shown in Fig 4.1 -45.
Selecting the BILL Server radio box means synchronizing the alarms on the billing server. Selecting the NE Alarm radio box means synchronizing the alarms on the foreground NE equipment. Selecting the SORM Alarm radio box means synchronizing the alarms on the SORM server.
61
4.
Click OK. The system synchronizes the alarm data in the specified location. The alerting box pops up when the synchronization is successful.
pop up the Report Management window. From the resource pane of the Report Management window, choose Report Template Tree > Server (OMM server ID) to pop up the List of Report Templates page, as shown in Fig 4.1 -46.
3.
Double-click the required alarm statistics template from the list to pop up the Parameter Input Box, as shown in Fig 4.1 -47. Specify the parameters of alarm selection conditions and other conditions. For the parameter descriptions, refer to Table 4.1 -7.
63
Table 4.1-7 Parameter Descriptions for Alarm Statistics Alarm Selection System Type Description Including such types as the Alarm Box Link Break Alarm, Bill Server Alarm, Correlation Alarm, Link Alarm, Local and Remote OMC Linkdown Alarm, NE Alarm, Performance QoS Alarm, SORM Server Alarm, and System Management. The System Type must be selected before selecting the location, which is selected based on the different system types. The System Type must be selected before selecting the alarm code. The available alarm codes on the right pane vary with different system types. Including critical, major, minor and warning. Including Communication Alarm, Environment Alarm, Equipment Alarm, OMS Alarm, Processing Alarm and QoS Alarm The System Type must be selected before selecting the probable causes. The available probable causes on the 64
Location
Alarm Code
Probable Cause
Alarm Selection
Happen Time Acknowledgment Status (Un)acknowledge Operator (Un)acknowledging Time Restore Type
Including By Time Range and By Relative Time Including Acknowledged and Unacknowledged. Sets the operator who acknowledges/unacknowledges alarms. Sets the range of time alarms to be acknowledged/unacknowledged. Including such options as Normal, Cleared by User, Restoration upon NE Restart, Restoration upon Synchronization, Restoration upon Alarm Pool Fillup, Restoration upon UMS Restart, Auto Cleared and Restoration upon NE Delete Sets the operator who clears alarms. Sets the range of time alarms to be restored. Sets the detailed information of statistics.
4.
Click OK to start statistics. The statistical results will be listed on the View Report page, as shown in Fig 4.1 -48.
Exporting: on the toolbar of the View Report page, click the corresponding icon to export and save the report in the corresponding file format.
Printing: click the icon on the toolbar of the View Report page to print the report results.
66
3.
Enter the acknowledging information in the popup Acknowledge Alarm dialog box. Users can enter the information based on the actual alarm processing, as shown in Fig 4.2 -50.
4.
Result The status of this alarm is changed from the unacknowledged status to the acknowledged status.
67
Result The status of this alarm is changed from the acknowledged status to the unacknowledged status.
Steps To clear an alarm, perform the following steps: 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Realtime Current Alarms page of the Realtime Alarms window, right-click the alarm to be cleared, and select Clear from the short-cut menu. 3. The Confirm dialog box pops up. Click OK to clear the alarm. The cleared alarm will be automatically shown in the Realtime History Alarms page. Reference For querying the history alarm information, refer to Querying History Alarms.
Steps To forward an alarm, perform the following steps: 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Realtime Current Alarms page of the Realtime Alarms window, right-click the alarm to be forwarded, and select Forward from the short-cut menu. 3. The Forwarding Setup dialog box pops up, as shown in Fig 4.2 -51. Enter the Forwarded-to Email Address and Forwarded-to Phone Number of the personnel to process the alarm. It is available to select Forward by Email and Forward by SMS.
When selecting the Forwarded-to Email Address check box, input contents in the Forward by Email page.
69
When selecting the Forwarded-to Phone Number check box, input contents in the Forward by SMS page.
4.
For the operation of querying alarms, refer to Querying Current Alarms and Querying History Alarms. Steps To view the detailed alarm information, perform the following steps: 1. In the Realtime Current Alarms page of the Realtime Alarms window, right-click the alarm to be viewed, and select Details from the short-cut menu.
70
2.
The Details window pops up to show the detailed information of the alarm, as shown in Fig 4.2 -52. For parameter descriptions, refer to Table 4.2 -8.
3.
Select the Maintenance suggestion tab to display the maintenance suggestions of the alarm, as shown in Fig 4.2 -53.
4.
Reference The main contents about the alarm details are shown in Table 4.2 -8.
Table 4.2-8 Parameter Descriptions for Alarm Information Parameters Node No. System Type ID Internal ID Location Description The number of the OMM node that generates alarms The system type of the alarm System ID Internal number of the system The location where alarms are generated Example 100001 Link Alarm 1200935849140 1200935849141 Subnet = 0, Ne = 1, Module = 1 Alarm Code Severity Alarm Type Probable Cause Happen Time Acknowledgment Status (Un)acknowledge Operator (Un)acknowledge System (Un)acknowledge Information (Un)acknowledge Time Comment Information The brief description and alarm code of an alarm Advanced national severity Alarm type The probable cause of the alarm The time when an alarm is generated Acknowledged /unacknowledged status of the alarm The operator to acknowledge/ unacknowledge this alarm The network management system to acknowledge/ unacknowledge this alarm The information entered when acknowledging/ unacknowledging this alarm The time when this alarm is acknowledged/ unacknowledged The information of comment 100001 Broken link between OMC and NE (1000) Critical Communication Alarm Communication abnormal (0) 2008-01-21 09:19:25 Unacknowledged
Admin
OK
2008-01-26 14:49:25
72
Description Detailed information related to this alarm The type of the NE where this alarm is generated
For the operation of querying alarms, refer to Querying Current Alarms and Querying History Alarms.
Confirm that the printer is connected and set correctly.
Steps To print alarm information, perform the following steps. 1. On the alarm list window, click the on the toolbar. The Print Setup dialog box
pops up, and performs the General settings, as shown in Fig 4.2 -54.
73
2.
Select the Page Setup tab to set the page parameters, as shown in Fig 4.2 -55.
3.
Select the Advance tab to set the parameters as required, as show in Fig 4.2 -56.
74
4.
When completing the setting, click Print to start printing the alarm list. Click
For the operation of querying alarms, refer to Querying Current Alarms and Querying History Alarms. Steps To export the alarm data, perform the following steps: 1. On the alarm list window, click the on the toolbar to pop up the Save dialog
box. Set the Save In, File Name and Files of Type, as shown in Fig 4.2 -57.
75
2.
Click Save to export the data of the selected alarm list to the specified file in the specified path.
1.
In the main window of the network management client, choose View > Fault Management. The Fault Management window appears.
2.
In the Fault Management window, choose Setting > Maintenance Suggestion Setting to pop up the Maintenance Suggestion Setting window, as shown in Fig 4.3 -58.
3.
On the Maintenance Suggestion Setting window, from the System Type dropdown list, select the alarm type to be set, including All System Type, Alarm Box Link Break Alarm, Bill Server Alarm, Correlation Alarm, Link Alarm, Local and Remote OMC Linkdown Alarm , NE Alarm, Performance QoS Alarm, SORM Server Alarm and System Management.
4.
Click the
box. Select Alarm Code and Reason Description, and enter the suggestion in the Customized Suggestions text box, as shown in Fig 4.3 -59.
77
5.
4.
From the suggestion list on the Maintenance Suggestion Setting window, click the suggestion to be modified.
5.
Click the
on the toolbar to pop up the Maintenance suggestion dialog box, as 4.3 -60. Enter the modified suggestion in the Customized
shown in Fig
6.
Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Maintenance Suggestion Setting to pop up the Maintenance Suggestion Setting window. 3. Click the icon in the Alarm Maintenance Setting window to pop up the Save
dialog box pops up. Select the proper path and the file name. 4. Click Save to export the selected alarm maintenance suggestions to the specified file in the specific path.
Confirm dialog box pops up, prompting that the old data will be overwritten, as shown in Fig 4.3 -61.
4. 5.
Click OK to pop up the Open dialog box. Select the file to be imported. Click Open to import the specified file of alarm maintenance suggestions. Caution:
The file to be imported must have a correct internal format. Otherwise, it cannot be imported. For the correct internal format of a file, refer to the exported file.
The Confirm dialog box pops up. Click OK to complete the operation.
81
Steps To deactivate an alarm rule, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting window appears, as shown in Fig 4.4 -62.
3. 4.
The Confirm dialog box pops up. Click OK to complete the operation.
82
Prerequisite Confirm that the user has logged in the network management server normally. Confirm that the rule is in the deactivated status.
Steps To activate an alarm rule, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting window appears. 3. 4. Select the rule to be enabled, and click the icon on the toolbar.
The Confirm dialog box pops up. Click OK to complete the operation.
Steps To delete an alarm rule, perform the following steps. 1. In the main window of the network management client, choose View > Fault Management. The Fault Management window appears. 2. In the Fault Management window, choose Setting > Management Rule Setting . The Management Rule Setting window appears. 3. 4. Select the rule to be deleted, and click the icon on the toolbar.
The Confirm dialog box pops up. Click OK to complete the operation.
83
Steps To check the alarms on the alarm box, perform the following steps: 1. Check whether the alarm box gives alarm tone and alarm light. If it does, the alarm must exist. 2. Press the FUN key in the initial interface to enter the main interface of the alarm box, as shown in Fig 4.5 -63.
84
3.
Press the
4.
Select the Alarm Query menu by pressing the up arrow or down arrow. Press OK
to enter the Alarm Query interface. 5. The latest alarm will be shown firstly when querying alarms. Pressing the up arrow
85