Beruflich Dokumente
Kultur Dokumente
Training Manual
Contents
6 Networking Modes................................................... 39
6.1 Network Architecture Requirements ........................................39
6.2 Non-Cascade Networking Modes .............................................39
NetNumen
U31(V12.12.20P01)
Introduction
After you have completed this course, you
will be able to:
>> Master NMS System Position and Hierarchy
>> Master NMS Structure and Feature
>> Master NMS Networking and Application
FIGURE 1 POSITION
OF IN THE
BEARER NETWORK
Integrated configuration
On one server, both the server and client are configured.
Separated configuration
The server is configured on one server, and the client is
configured on another computer. The client is connected to
the server through the network protocol.
1.
2.
3.
4.
The follows the TMN and eTom models, and complies with TMN,
3GPP, SNMP, NGOSS and NGMN standards.
Modularized
Design
The system can easily meet the requirements for managing new
devices and services due to its modularized architecture. The system software consists of several modules, which can be distributed
on different computers. The distributed deployment of software
modules provides the processing capability of the system.
System Openness
Operation Security
The use of CORBA, SNMP and XML interfaces enables the system to share both data and services with other service systems.
The system uses the access right control and log records to ensure
the security of operations on it.
by the user are limited to certain network elements with a certain granularity.
Ease of Use
Data Security
Database Backup
The system provides diversified backup modes by supporting
the storage of data on another peripheral memory, such as
disk, tape, compact disk, or database. You can restore the
data backup on the peripheral memory to the system when
necessary.
Disk Mirroring
When data mirroring is used, all data on the active disk is replicated to the standby disk in real time for backup.
SDH NEs
ZXMP S100, ZXMP S150, ZXMP S200, ZXMP S320, ZXMP S325,
ZXMP S330, ZXMP S335, ZXMP S360, ZXMP S380, ZXMP S385,
ZXMP S390, ZXONE 5800, ZXONE 5800-E.
WDM/OTN NEs
ZXWM-32, ZXMP M600, ZXMP M720, ZXMP M721, ZXMP M800,
ZXWM M900, ZXMP M820, ZXMP M920, ZXONE 8000, ZXONE
8300, ZXONE 8500, ZXONE 8700 X32.
CTN NEs
ZXCTN 6100, ZXCTN 6110, ZXCTN 6120, ZXCTN 6130, ZXCTN 6150, ZXCTN 6200, ZXCTN 6220, ZXCTN 6300, ZXCTN
6320, ZXCTN 6500-8, ZXCTN 6500-16L, ZXCTN 6500-32, ZXCTN 9002, ZXCTN 9004, ZXCTN 9008.
UAS Products
ZXUAS 10600, ZXE10 UAS2500S, ZXUAS 10800E, ZXUAS
10400, ZXUAS 10800.
Router
ZXR10 T8000-16, ZXR10 M6000-8, ZXR10 M6000-16, ZXR10
M6000-8s, ZXR10 M6000-5s, ZXR10 M6000-3s, ZXR10
T1200, ZXR10 T1200 BMSG, ZXR10 T600, ZXR10 T600 BMSG,
ZXR10 T128, ZXR10 T64E, ZXR10 GER, ZXR10 GER04, ZXR10
GER02, ZXR10 1822, ZXR10 1842, ZXR10 2842, ZXR10 2882,
ZXR10 3842, ZXR10 3884, ZXR10 1809, ZXR10 2822R, ZXR10
1842R, ZXR10 2842R, ZXR10 2882R, ZXR10 2822, ZXR10
2884, ZXR10 ZSR 3822, ZXR10 3844, ZXR10 3882, ZXR10
1822E, ZXR10 GAR 2604, ZXR10 GAR2608, ZXR10 GAR3608,
ZXR10 GAR7208, ZXR10 T16S, ZXR10 T16C, ZXR10 T32C,
ZXR10 T64C, ZXR10 T160, ZXR10 T1216, ZXR10 T1212,
ZXR10 6802, ZXR10 6804, ZXR10 6812, and ZXR10 6800.
Switch
ZXR10 8902, ZXR10 8905, ZXR10 8908, ZXR10 8912, ZXR10
8902E, ZXR10 8905E, ZXR10 8908E, ZXR10 8912E, ZXR10
6902, ZXR10 6905, ZXR10 6908, ZXR10 T40G, ZXR10 T64G,
ZXR10 T160G, ZXR10 T240G, ZXR10 5224, ZXR10 5228,
ZXR10 5228-FI, ZXR10 5252, ZXR10 5928, ZXR10 5928-FI,
ZXR10 5928-PS, ZXR10 5928E, ZXR10 5928E-FI, ZXR10
5952, ZXR10 5952E, ZXR10 5916E, ZXR10 5128E, ZXR10
5116E, ZXR10 5128E-FI, ZXR10 5228A, ZXR10 5252A, ZXR10
3928A, ZXR10 3928A-FI, ZXR10 3952A, ZXR10 3228A, ZXR10
3228A-EI, ZXR10 3228A-FI, ZXR10 3252A, ZXR10 3206,
ZXR10 3226, ZXR10 3228, ZXR10 3226-FI, ZXR10 3252,
ZXR10 3906, ZXR10 3928, ZXR10 3928E, ZXR10 3928E-FI,
ZXR10 3952, ZXR10 3952E, ZXR10 59S STACK.
ZXR10 5109, ZXR10 5116, ZXR10 5116-FI, ZXR10 5116-SI,
ZXR10 5124, ZXR10 5124-FI, ZXR10 5124-SI, ZXR10 2920-SI,
ZXR10 2928-SI, ZXR10 2952-SI, ZXR10 2936-FI, ZXR10
2909-SI, ZXR10 2909-FU, ZXR10 2918-SI, ZXR10 2926-SI,
ZXR10 2910E-PS, ZXR10 2918E, ZXR10 2918E-PS, ZXR10
2928E, ZXR10 2952E, ZXR10 2609-LE, ZXR10 2818S-LE,
ZXR10 2826S-LE, ZXR10 2852S-LE, ZXR10 2609A, ZXR10
2618A, ZXR10 2626A, ZXR10 2826A, ZXR10 2826A-PS,
ZXR10 2609, ZXR10 2609-FU, ZXR10 2809, ZXR10 2809-FU,
ZXR10 2818S, ZXR10 2826S, ZXR10 2852S, ZXR10 2826E,
ZXR10 2618, ZXR10 2626, ZXR10 2609-EI, ZXR10 2818S-EI,
ZXR10 2826S-EI, ZXR10 3904F, ZXR10 3904, ZXR10 3206S,
ZXR10 2826, ZXR10 1816, ZXR10 29S STACK, ZXR10 5009.
ZXR10 5250-28TC, ZXR10 5250-52TC ZXR10 5250-28SM,
ZXR10 5250-28PM, ZXR10 5250-52PM, ZXR10 2928E-PS, and
ZXR10 2950-28PC.
For the computer ports occupied by the server and client, refer to
Table 1.
TABLE 1 COMPUTER PORTS OCCUPIED
BY THE
SERVER
AND
CLIENT
N- Souu- rce
m- Port
ber
Destination
Port
Direction
Protocol
Description
Random
2080020999
Client
->
Server
TCP
Random
21100
Client
->
Server
TCP
Random
21101
Client
->
Server
TCP
Random
21102
Client
->
Server
TCP
Random
21103
Client
->
Server
TCP
Remote invocation
adaptation port for the
Java naming service for
the main process
Random
21104
Client
->
Server
TCP
Random
21105
Client
->
Server
TCP
Random
21106
Client
->
Server
TCP
Random
21109
Client
->
Server
TCP
10
Random
21110
Client
->
Server
TCP
11
Random
21111
Client
->
Server
TCP
N- Souu- rce
m- Port
ber
Destination
Port
Direction
Protocol
Description
12
Random
21112
Client
->
Server
TCP
13
Random
21113
Client
->
Server
TCP
14
Random
21114
Client
->
Server
TCP
15
Random
21118
Client
->
Server
TCP
16
Random
21128
Client
->
Server
TCP
17
Random
21133
Client
->
Server
TCP
18
Random
21140
Client
->
Server
TCP
19
Random
21199
Client
->
Server
TCP
20
Random
21
Client
->
Server
TCP
21
Random
21160
Client
->
Server
TCP
22
Random
21162
Client
->
Server
TCP
EMB port
23
Random
21163
Client
->
Server
TCP
EMB port
24
Random
21170
Client
->
Server
TCP
EMB port
25
Random
21171
Client
->
Server
TCP
EMB port
N- Souu- rce
m- Port
ber
Destination
Port
Direction
Protocol
Description
26
Random
21172
Client
->
Server
TCP
EMB port
27
Random
21173
Client
->
Server
TCP
EMB port
28
Random
21174
Client
->
Server
TCP
EMB port
29
Random
21179
Client
->
Server
TCP
EMB port
30
Random
21138
Client
->
Server
TCP
31
Random
21188
Client
->
Server
TCP
32
Random
69
Client
->
Server
TCP
33
Random
20201
20220
Client
->
Server
TCP
34
Random
20141
20160
Client
->
Server
TCP
35
Random
20001
20020
Client
->
Server
TCP
For the computer ports occupied by the server and Operation Support System (OSS), refer to Table 2.
TABLE 2 COMPUTER PORTS OCCUPIED
10
BY THE
SERVER
AND
OSS
Number
Source
Port
Destination
Port
Direction
Protocol
Description
Random
2080020999
OSS ->
Server
TCP
Random
21111
OSS ->
Server
TCP
Server and
Equipment
Number
Source
Port
Destination
Port
Direction
Protocol
Description
Random
21115
OSS ->
Server
TCP
Random
21126
OSS ->
Server
TCP
Random
21128
OSS ->
Server
TCP
Random
21161
OSS ->
Server
UDP
Random
21164
OSS ->
Server
UDP
Random
21165
OSS ->
Server
UDP
10
Random
161
OSS ->
Server
UDP
11
Random
21175
OSS ->
Server
TCP
12
Random
21176
OSS ->
Server
TCP
13
Random
21177
OSS ->
Server
TCP
14
Random
21178
OSS ->
Server
UDP
15
Random
162
OSS ->
Server
UDP
For the computer ports occupied by the server and the equipment,
refer to Table 3.
TABLE 3 COMPUTER PORTS OCCUPIED
BY THE
SERVER
AND
EQUIPMENT
11
12
Number
Source
Port
Destination
Port
Direction
Protocol
Description
Random
20
Server
-> NE
TCP
Random
21
Server
-> NE
TCP
Random
9023
Server
-> NE
TCP
Random
10251030
Server
-> NE
TCP
Qx communication port
Random
9998
Server
-> NE
TCP
Qx communication i port
Random
9999
Server
-> NE
TCP
Qx communication port
Random
1228813311
Server
-> NE
TCP
Random
1638417407
Server
-> NE
TCP
Random
2048021503
Server
-> NE
TCP
10
5734457407
Random
NE ->
Server
TCP
11
Random
2080020999
NE ->
Server
TCP
12
Random
21111
NE ->
Server
TCP
13
Random
23
Server
-> NE
TELNET
14
Random
22
Server
-> NE
TCP
15
Random
161
Server
-> NE
TCP
16
23742
23753
23740
NE ->
Server
TCP
17
Random
9890
NE ->
Server
TCP
Number
Source
Port
Destination
Port
Direction
Protocol
Description
18
Random
9835
9840
NE ->
Server
TCP
19
Random
514
NE ->
Server
TCP
13
14
Compared with the V12.12.20P01, the V12.13.10 provides the following new functions, refer to Table 4.
TABLE 4 NEW FUNCTIONS
THE V12.12.20P01)
PROVIDED
BY
N- Function
o.
Description
ZXCTN 9000
(V2.08.33R1)
Monitors real-time
MSTP traffic
DCN view
Resource analysis
function
15
16
N- Function
o.
Description
Supports ZXR10
M6000 (V2.00.20)
(topology
management, alarm,
performance, rack
diagram)
1
0
Supports ZXR10
T8000 (V
2.00.20) (topology
management, alarm,
performance, rack
diagram)
1
1
Supports ZXR10
M6000-nS
(V2.00.20) (topology
management, alarm,
performance, rack
diagram)
1
2
Supports
IPV6 protocol
management
channel; supports
browsing the IPV6
protocol
1
3
Supports configuring
the 802.1X on
middle-end switches
1
4
Supports configuring
the QoS on
middle-end switches
1
5
Resource views
support abnormal
traffic monitoring
and packet
performance reports
1
6
Creating links in
batches
1
7
Supports
northbound interface
in XML
1
8
Transparent PW
New Functions
Provided by
V12.12.20P01
(Compared With
the V12.12.20)
N- Function
o.
Description
1
9
Service parameter
templates
2
0
Compared with the V12.12.20, the V12.12.20P01 provides the following new functions, refer to Table 5.
TABLE 5 NEW FUNCTIONS
OF THE
V12.12.20P01
No.
Function
Description
Supports the
ZXCTN 6130
The SDH
equipment
supports VC3
concatenation
Supports
cross-version and
cross-scale data
restoration
Supports PCM
equipment
Supports the IP
RAN function
Supports the
ZXR10 6800 series
equipment
17
18
OF
No.
Function
Description
Real-time MSTP
monitoring
Changes the
resource view
Changes the
channel view
Changes the
optical power view
Updates the
product function
Updates the IP
RAN function
Updates the
installation scale
10
Service cutover
11
Improves the
product operation
Changed Items in
the V12.12.20P01
(Compared With
the V12.12.20)
No.
Function
Description
12
Improves the
WDM protection
subnetwork
management
13
Supports up to
30000 equivalent
NEs
14
Improves the
file management
backup policy: the
backup time and
space occupation
are reduced
15
16
Private network
route monitoring
OF THE
V12.12.20P01
No.
1
Function
Description
Changes the
SUN server
model
Simplifies
the software
installation disk
and changes
the installation
procedure
Optimizes
the product
operation
19
No.
4
Function
Changes the
fiber connection
function
Description
Refer to the following manuals:
The Fiber Connection section of the
NetNumen Unified Network Management
System Operation Guide (SDH NE
Management).
The Fiber Connection section of the
NetNumen Unified Network Management
System Operation Guide (CTN NE
Management).
The Fiber Connection section of the
NetNumen Unified Network Management
System Operation Guide (WDM/OTN NE
Management).
20
Optimizes the
service cutover
function
Supports
daughter
cards on the
2900E series
equipment
Supports the
BRAS user
statistics
management
Navigation
The NEs added in the system are listed on an NE tree in the
navigation pane, corresponding to the NE icons displayed on
the topology map. When you add or delete an NE through
shortcut menu on the NE tree, corresponding NE icon appears
or disappears on the topology map at the same time. You can
locate corresponding NE icon on the topology map by clicking
the NE on the NE tree. Besides some topology management
functions, the NE tree also provides the access to some other
management functions through shortcut menu, including configuration management, fault management, and performance
management functions.
Graphic Display
21
Filtered Display
On the topology map, you can set filtering conditions to filter
the NEs or links that you do not concern from the topology
map. The filter conditions can be NE name, IP address, link
name, NE type, link type, and/or group type.
Alarm Display
On the topology map, an NE or link is highlighted in different
colors when some fault(s) occur in it according to the fault
severity and the acknowledgement status of corresponding
alarm(s).
Group-Based View
To manage NEs more effectively, you can group NEs based on
certain rules. Then the topology map can arrange the NEs by
group.
22
Alarm Clearing
The system automatically clears an alarm from the active alarm
list after the fault causing this alarm is removed.
Alarm Synchronization
Alarm synchronization includes the synchronization of alarm
information between the server and the managed NEs (that is,
the alarm sources), and the synchronization of alarm information between the client and the server.
supports two alarm synchronization modes: manual synchronization and automatic synchronization.
23
24
Data Query
Data Synchronization
The system can automatically synchronize performance data
from the managed NEs to the server, and synchronize performance data from the server to the client. You can also initiate
the synchronization of performance data through a client.
Data Report
The system can generate a performance data statistic report
to show current KPIs, which can also be output as *.xls, *.pdf,
*.html, and *.txt files. A predefined template or user-defined
template can be used to generate the report you want.
In addition, you can create a report task by specifying the report type, template, object, time, and file name. When the
preset is up, the system generates the customized report according to the task. The customized task is stored in the database, which can be queried, modified and deleted. After the
report is generated by the system, you can view the report and
save it as an *.xls file.
The system can send the periodically-generated report to a
user in the specified format through E-mail as required.
Role
A role specifies the management permission for a user group,
including the operation permission and manageable resources.
The operation permission allows the user group to use specific functional modules of the network management system. For example, if a role has the operation permission of
the log management module, the users acting as the role
can perform log management operations, such as querying
logs and maintaining logs.
The manageable resources refer to subnetworks and/or
network elements that can be managed by the role.
Role Set
A role set is a set of roles. The management permission of a
role set involves the management permissions of all roles in
the role set.
Department
25
Departments are specified in the network management system to simulate the actual administrative departments. In this
way, the system administrator can conveniently organize and
manage users in the system. A newly-created user must belong to a department.
User
A user is an operator who is authorized to log in to the system
and perform operations in the system. While creating a user,
the system administrator assigns the management permission
to the user by specifying a role or role set and allocates the
user to a department according to the actual situation.
For the model of relations among user, role, role set, department,
operation permission, and manageable resources involved in the
security management, see Figure 4.
FIGURE 4 RELATION MODEL
OF
SECURITY MANAGEMENT
26
The management permission of a role depends on the operation permission and manageable resources specified for the
role.
Locking of Clients
If no operation is performed for on a client a long time, the
system will lock the client and force the login user on the client
to log out of the system. The user is required to log in to the
system again before performing any operation in the system.
27
NE basic configuration
Interface configuration
Protocol configuration
OAM configuration
Qos configuration
Alarm configuration
Performance configuration
Overhead configuration
Port migration
Channel view
Resource view
Gateway NE configuration
Clock configuration
NE time configuration
Service telephone configuration
NE and board configuration
Configuration for equipment-layer protection
Clock view
Network maintenance
Data synchronization
28
Clock configuration
NE clock synchronization configuration
NE basic configuration
Protection configuration
Configuration for single NE service and end-to-end service
APR-AOSD configuration
Spectrum configuration
Overhead configuration
Basic NE configuration
Clock configuration
Interface configuration
L2 configuration
L3 configuration
Security configuration
UAS configuration
OAM configuration
QoS configuration
Alarm configuration
Performance configuration
29
Log Query
You can set filtering conditions to query specific logs in the
system, and save or print the query result.
Log Backup
The system can back up the logs in the system as files according to the specified number of days or storage capacity.
Database Monitoring
If the database capacity reaches the preset threshold, the will
generate an alarm.
30
Database Backup
Scheduled Backup
Manual Backup
31
32
Storage devices are used to save the data in the system. For
storing large amounts of important data in the system, external data storage devices with high capacity and reliability are
required besides the built-in disks in the host.
33
34
Server Software
Module
Function
Network
management
interface module
Topology
management module
Fault management
module
Performance
management module
Security
management module
Configuration
management module
Software
management module
Log management
module
Report management
module
Database
management module
Inventory
management module
NE adaptation
module
Client Software
The client software provides a graphic user interface (GUI).
After connecting to the server, the client displays the results of
35
36
Southbound
Interfaces
Southbound interfaces refer to the communication interfaces between and the managed NEs.
The supports the SNMP, Syslog, Telnet/SSH, FTP/TFTP, and private
interfaces.
Northbound
Interfaces
The northbound interfaces locate between and the upper integrated NMS/OSS (Operation Support System). The upper integrated NMS/OSS can manage the northbound interfaces through .
The northbound interfaces have comply with special interface
standards that specify the information model, interface technical
modes, and interface functions for the connection between the
EMS/NMS and the upper integrated NMS/OSS. The northbound
interfaces are the basis for centralized network management and
integrated management and maintenance.
For the position of northbound interfaces in the network, refer to
the section of Position.
provides the following northbound interfaces:
37
TL1 northbound
The upper-layer network management systems/OSS can perform the configuration management and resource management for IP equipment via the U31 R22 TL1 northbound interfaces.
38
Interface Type
Description
10M/100M adaptive
Ethernet interface
GE interface
X.25 interface
FOR THE
NETWORK ARCHITECTURE
Item
Bandwidth
At least 10 Mbit/s is
recommended.
39
all located in the same Local Area Network (LAN) and connected
with each other through Ethernet. In this networking mode, the
server connects to the managed NEs through LAN.
The following describes the topology of this networking mode and
the required devices for the local networking.
Topology
For the topology of the non-cascade local networking of , see
Figure 6.
FIGURE 6 NON-CASCADE LOCAL NETWORKING
40
OVER
DDN
41
ON
E1
42
OVER
DDN
43
server through LAN. Therefore, the upper-level server can implement the centralized management of the whole network.
In the local cascade networking mode, the upper-level server and
lower-level servers are located in the same LAN. Any of the noncascade networking modes described earlier can be used for each
server and the clients corresponding to it.
For example, the following illustrates the networking of a system, where the local cascade networking mode is used for the upper-level server and two lower-level servers, and the non-cascade
local networking mode is used for each server and corresponding
clients, see Figure 10.
FIGURE 10 LOCAL CASCADE NETWORKING
Note:
For the logical model of upper-level client and lower-level clients,
see Figure 10. Physically, the management processes of the lowerlevel clients can be deployed on the upper-level client.
44
45
OF THE
SYSTEM
46
Specification
System response
time
Data storage
capacity
47
Note:
When the system operates with full load, the system response time
should not be larger than 150% of the above specifications.
Physical Interfaces
48
ITU-T Recommendations
RFC Standards
49
TMF Standards
TMF801, Plug and Play Service Fulfillment Phase 2 Validation Specification V1.0
TMF605, Connection and Service Management Information
Model
NMF037, Sub-System Alarm Surveillance Ensemble V1.0
Interworking Between CORBA and TMN System Specification V1.0
50
OMG Standards
Quick Start
Basic Operation Flow
Figure 13 shows the basic operation flow of system.
FIGURE 13 OPERATION FLOW
OF THE
Caution:
Do not start/shut down the server program frequently.
2. Log in to the client portal
The entrances of the management modules are integrated in
the client portal. The user can quickly enter the management
views through the client portal.
3. Log in to the client.
The user interfaces of the system are integrated in the client.
After logging in to the client, you can perform the relevant
management operations.
51
management
The user can create and manage the information of the .
Topology management
The user can query and present the network topology and
the service topology in the topology management view.
Security management
The user can manage the department, user, role, role set,
operation set, and user account rule in the security management view.
Alarm management
The user can perform the functions of alarm monitor,
alarm query, alarm statistics, and alarm configuration in
the alarm management view.
Performance management
The user can query and collect the performance data in the
performance management view.
Routine maintenance
The user can perform the functions of log management, security management, and system maintenance in the view.
Log management
The user can perform the functions of viewing, querying,
and exporting logs in the log management view.
Note:
END OF STEPS
52
Prerequisites
Caution:
In the , the default user name is admin, and the password is
null. Be sure to modify the password of the admin user after
successful login for the first time to ensure the account security.
Tip:
on the right side of the server
In the Login window, click
address to display the Config Bureau dialog box. In the Config Bureau dialog box, you can configure bureau name and the
corresponding server address. The configuration information
will be displayed in the drop-down list of the Server Address
to facilitate the user to select.
3. Click OK.
END OF STEPS
Portal Operations
About Portal
53
The provides a client portal as a unified login interface. After starting the client portal, you can start the client or other specific management tools by clicking corresponding links. The started client
or other management modules can communicate with the server
and load data from the server directly.
Logging in to the Client Portal
Abstract
Prerequisites
Steps
The provides a client portal as a unified login interface. After starting the client portal, you can start the client or other specific management modules by clicking corresponding links. The started
client or other management modules can communicate with the
server and load data from the server directly.
The server is operating properly.
1. On the desktop of the Windows operating system, click Start,
point to Programs > NetNumen U31 Unified Network
Management System, and click U31 Client Portal. The
Login dialog box is displayed.
Caution:
For the , the default user is admin, and the password is null.
The user should modify the password after login.
3. Click OK.
END OF STEPS
Result
54
FIGURE 14 PORTAL
Description
Screen Lockup
Log out
Exit
About
Start the U31 client
Start alarm management module
Start performance management module
Start system maintenance module
Prerequisites
Steps
55
2. Click OK.
END OF STEPS
Logging out of the Portal
Abstract
Prerequisites
Steps
2. Click OK.
END OF STEPS
Exiting the Portal
Abstract
Prerequisites
Steps
2. Click OK.
END OF STEPS
Starting the Client
Abstract
Prerequisites
Steps
Portal provides shortcut for the user to access the main window
of the system. By portal, the user can access the main window
without entering password.
You have logged in to the client portal.
In the Clients area of the Portal dialog box, click Fault Management to display the Fault Management dialog box.
In the Clients area of the Portal dialog box, click Performance Management to display the Performance Management dialog box.
In the Clients area of the Portal dialog box, click Maintenance to display the Maintenance dialog box.
END OF STEPS
System Setting
Setting System Parameters
Abstract
Prerequisites
Steps
During the system setting, you can change the waiting time before
automatic system locking or logout, and set the maximum number
of system messages displayed on the client window.
You have the authority of system setting.
1. In the main window of the client window, select System >
Customize > System Setting. The System Setting dialog
box is displayed.
2. Configure the parameters in the Autolock Setting page.
56
Parameter
Description
Enabled
Idle time
(minute(s))
Lock type
Description
Enabled
Idle Time
4. Click the Message Area tab. The Message Area page is displayed. Set the parameters in the Message Area page.
Parameter
Description
Set Hint
Message Count
Set Error
Message Count
Description
Query results
count in one
page
57
Parameter
Description
Description
Number of seconds
before hiding tooltip
8. Click OK.
END OF STEPS
Setting the Information of Login User
Abstract
Prerequisites
Steps
This section describes how to configure the e-mail address and the
telephone number of the user.
You have the authority to perform this operation.
1. On the main interface of the of the client window, select System > Customize > Login User Info Setting. The Login
User Info Setting dialog box is displayed.
2. Set parameters in the Login User Info Setting page.
58
Parameter
Description
E-mail
Address
Phone
Number
3. Click OK.
END OF STEPS
Setting Performance Management Preferences
Abstract
This section describes how to set the relative parameters of performance management module.
Steps
1. From the main menu of the client window, select System >
Customize > Performance Management Preferences.
The Performance Management Preferences dialog box is
displayed.
2. Set parameters in the dialog box.
Parameter
Description
Time
Format in
the Result
File of
Template
Task area
3. Click OK.
59
Note:
The configuration becomes effective when you log into the
client again.
END OF STEPS
Setting Alarm Sounds and Colors
Abstract
Prerequisites
Steps
Description
Sound
When
Reporting
Setting
Sound
Model
Restore to
default
60
3. Click the Color Setting tab. The Color Setting page is displayed.
4. On the Color Setting page, click the drop-down box on the
right side of alarm level to set colors for the alarms.
61
5. Click OK.
END OF STEPS
Setting Holiday Information
Abstract
Prerequisites
Steps
62
2. Add a holiday.
i.
63
Parameter
Description
Holiday
Name
Begin Date
End Date
Please select
the year
64
Parameter
Description
Start date
End date
Please select
the year
Description
Please select
the year
65
END OF STEPS
Closing All Views
Abstract
Prerequisites
Steps
END OF STEPS
Closing Other Windows
Abstract
Prerequisites
Steps
When there are several windows open, you can close all the other
windows except the current window.
END OF STEPS
Showing or Hiding the Toolbar
Abstract
Prerequisites
Steps
The user may show or hide the toolbar of the client window. For
the first startup of the system, the toolbar of the main view is
visible by default. After the first time, the display status of toolbar
on the main view for each login is consistent with the status before
the operator last exits the system.
Before you begin, make sure that you have logged in to client.
1. When the toolbar is in showing status, select Window > Tool
Bar to hide the toolbar.
2. When the toolbar is in hiding status, select Window > Tool
Bar to display the toolbar.
END OF STEPS
Showing or Hiding the Status Bar
66
Abstract
Prerequisites
Steps
The user may show or hide the status bar of the client window. For
the first startup of the system, the status bar of the main interface
is visible by default. Then, the display status of status bar on the
main interface for each login is consistent with the status before
the operator last exits the system.
You have logged in to the client.
1. When the status bar is in showing status, select Window >
Status Bar to hide the status bar.
2. When the status bar is in hiding status, select Window > Status Bar to display the status bar.
END OF STEPS
Showing and Hiding the Message Area
Abstract
The Show Message dialog box is not visible on the client window
by default when you start the client for the first time. You can
select to show the message area or not. When you start the client
again, whether the message area is displayed depends on the state
of the message area before the client was closed last time.
Prerequisites
Before you begin, make sure that you have logged in to the client.
Steps
Abstract
Prerequisites
Steps
The toolbar in the client only display the buttons of some common
functional modules by default, such as viewing topology, system
monitoring, task management, and alarm monitoring. You can set
the toolbar as required so that it displays or hides the buttons of
the functional modules.
The toolbar is displayed.
1. Display a corresponding button of a functional module.
i.
Right-click the blank area where the client toolbar is located. A shortcut menu is displayed, see Figure 19.
67
FIGURE 19 TOOLBAR
THE
BUTTON
END OF STEPS
Other Functions
Locking the Screen
Abstract
68
You can lock the screen operation when you want to leave for a
short time without exiting the client window. After the screen is
locked, only you (that is, the current login user) or the system
administrator can unlock the screen.
Prerequisites
Steps
OF
Parameter
Description
Lock
Screen
Lock
Operation
Prerequisites
Steps
Logout is unavailable if you log in from the portal. It is only available in the main view of client. If you execute the operation of
logout, you will exit from the client and enter Login dialog box.
You have the authority to perform this operation.
1. Open the Confirm dialog box by performing one of the following operations:
69
Click
on the toolbar.
2. Click OK.
END OF STEPS
Setting the Password of the Current Login User
Abstract
Prerequisites
Steps
Description
Old
Password
User
Password
Confirm
Password
70
The time of the client and the server may be different. You can
check the current time of the server on the client window.
Prerequisites
Steps
END OF STEPS
Copying, Clearing, Configuring Messages
Abstract
This section describes how to copy, clear, and configure the messages in message area.
Steps
Operation Method
Operation Result
Copy
Selected
Message
Copy All
messages
71
Task
Operation Method
Operation Result
Clear
All Messages
Click the
button in the
Show Message dialog box.
Set
Message
Count
END OF STEPS
Topology Management
Topology Management Functions
Overview
Function
Description
Viewing and editing network resource locations, network architectures, links and connections, and service distribution in
different service systems.
Displaying topological relationships between service subnetworks along with access management.
Topology Display
The system displays network resources by combining the Network Element (NE) tree and the topology graph. Users can
manage network resources in different views.
Topology Operations
The provides the following topology operations:
Operations on groups
Operations on links
Operations on NEs
Monitoring Function
The topology view provides a dynamic network topology graph,
displaying the operation status of managed networks in real
time. It monitors configuration changes and fault alarms.
72
1.
2.
3.
4.
5.
6.
NE tree
Topology Graph Toolbar
Topology Graph
Pane of Filter, legend and display
overview
Alarm and performance pane
Prompt message area
73
Note:
Select an NE on the NE Tree or in the topology graph to display
the alarms of this NE on the Active Alarms tab of the alarm and
performance pane. Right-click an alarm to handle it. Double-click
an alarm to open a dialog box that displays detailed information
of the NE alarms. See .
Topology Menu
Topology Graph
and NE Tree
Topology Graph
Toolbar
The NE tree lists all nodes in the network, while the topology
graph shows all nodes on the current layer.
On the top of the topology map is the topology toolbar, see Figure
25. You can use the buttons on the toolbar to perform basic operations on the topology graph.
FIGURE 25 TOPOLOGY GRAPH TOOLBAR
OF
Function
Select: By clicking this button and then clicking an
NE or link on the topology map, and the NE or link
node is selected.
Pan: Used to move the area displayed on the
topology graph.
74
Button
Function
Zoom in: used to zoom in the map.
Zoom out: used to zoom out the map.
Cancel: used to cancel the last zooming action.
Zoom Reset: used to display the map in accordance
with the default scale of the system.
Fit to Content: used to show the entire graph in the
current window area of the topology view.
Regional Zoom: If you select a region and click this
button, only the selected area in the current window
is displayed.
Lock Position: After being locked, the NE cannot be
moved.
Save Position: save the position information on the
topology graph.
Search: used to search nodes by name, type,
description or location.
Network Layout: select different layout policies to
show the objects on the topology graph in different
ways.
Full Screen: display the NE tree, Filter, Legend, and
Display areas on the full screen.
Go to: locate a certain node on the graph.
Back to: displays the map layer of the previous
operation. This button changes in accordance with
map layer change.
Forward to: displays the map layer of the previous
operation. This button changes in accordance with
map layer change.
Export: export the information of all nodes on the
current layer to a local file.
Table: show the information of all nodes on the
current layer in a list.
Display topology: show the information of all nodes
on the current map layer on the topology graph.
Hide Filter and Legend Area: used to hide the pane
of filter, legend, and display overview.
Display Filter and Legend Area: used to display the
pane of filter, legend, and display overview.
75
Pane of "Filter",
"Legend",
and "Display"
overview
You can set filtering conditions in the filter to only show the
contents meeting the conditions on the view.
The legend explains the icons of all NE types, alarm colors and
status icons.
Note:
If the pane of Filter, Legend and Display Overview is not displayed
on the Topology Management view, click the
the pane on the right.
button to show
Alarm and
Performance Pane
The alarm and performance pane lists the alarm and performance
messages of the selected NE.
NE Icons
76
Prerequisites
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click the Customize Type Image tab to display the Customize Type Image page.
3. Click the
button after icon to be replaced, and the Open
dialog box is displayed.
4. Select a file in the Open dialog box.
Note:
The icon image file must meet the following requirements:
Context
You can customize the linearity and line width displayed on the
topology map for links. To do this, perform the following steps:
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click the Customize Link Appearance tab. The Customize
Link Appearance page is displayed.
3. Click the link attribute box to be modified to display the dropdown box.
4. Select the linearity and width you need from the drop-down
menu.
5. Click OK.
END OF STEPS
Customizing Status Icons
77
Abstract
Prerequisites
Context
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click the Customize Status Image tab to display the Customize Status Image page.
3. Click the
button after the image to be replaced to open the
Open dialog box.
4. Select a file from the Open dialog box.
Note:
The icon image file must meet the following requirements: The
selected image file must not exceed 50K. The icon of an NE
tree node must not be more than 25*25 pixels. The icon of a
topology node must not be more than 50*50 pixels.
5. Click the Open button to return to the Customize Status Image page.
6. Click the OK button.
END OF STEPS
Customizing Status Colors
Abstract
Context
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click Customize Status Color option to display status color
settings on the right pane.
button in the Status Color field. The Chooser
3. Click the
Status Color dialog box is displayed.
Note:
The Swatches tab is displayed by default.
4. Blocks of different colors are displayed in the middle. Select
the color as required, and click Preview button to see the
effect. The last chosen color is displayed in the first box under
the Recent section.
78
Note:
The HSB and the RGB of the selected color can be adjusted
on the other two tabs. HSB and RGB settings are interrelated.
Adjusting one of them will change the other.
5. Click the HSB tab.
To set HSB, perform one of the following operations:
Enter a value.
Note:
The parameters set here affect those on the RGB tab.
6. Click the RGB tab.
To set RGB, perform one of the following operations:
Enter a value.
You can select the status icons to be displayed on the user interface
and the order in which they are displayed. The higher-order icons
are displayed to the left. Three icons can be displayed on the
topology graph, while one icon can be displayed on the NE tree.
To replace the status icons, refer to Customizing Status Icons in
this chapter.
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click the Customize Status Order option to display the Customize Status Order page on the right pane.
3. In the Displayed Status Icon box, select icons that are not
displayed.
4. Click
list.
79
Button
Function
Add all icons to Displayed Status Icon list.
5. Click OK.
Note:
Click the Default button to restore default settings.
END OF STEPS
Customizing Tooltips
Abstract
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click Customize Tooltip option to display node tip settings on
the right pane.
3. Select an NE type in the Type list box.
4. On the Basic information tab and Pm tab, select the tip message to be displayed.
5. Click the OK button to finish setting.
END OF STEPS
Customizing Alarm Prompting Type
Abstract
80
You can customize the alarm prompting type of the nodes on the
topology graph. The prompting type includes:
Alarm flashing
Context
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click Customize Alarm option to display alarm prompting settings on the right pane.
3. Select the check box before each prompting type according to
the description and your needs.
4. Click OK to finish setting.
END OF STEPS
Customizing Other Elements
Abstract
Steps
1. On the menu bar, select Topology > Customize GUI Elements. The Customize GUI Elements dialog box is displayed.
2. Click Other option to display settings of other elements on the
right pane.
Select Show Status Icon check box under Tree Configure group box to show status icon.
Under the Topology Configure group box:
Note:
Min Combine Line Number: When the number of links between two NEs is equal to or greater than the value, all the
link lines can be collapsed to display only one line, which can
be expanded again into multiple lines.
3. Click Set to save the settings.
END OF STEPS
Functions on Topology Menu
81
This chapter provides instructions on topology management operations by using the commands on the Topology menu.
Prerequisites
Context
Log in to the client, and the system opens the Topology view
by default. If you open another view later, perform the following
steps to switch to Topology view again.
Steps
Click the
END OF STEPS
Prerequisites
Context
Steps
Result
Prerequisites
82
Context
You can export the GUI display style to a ZIP file. The exported file
includes all the configuration data in Customize GUI Elements
dialog box and your selections of legend display, overview map,
NE location and lock status, and the map configuration. To export
GUI display style, perform the following steps:
Steps
Abstract
Prerequisites
Steps
The user may export the current display style into a ZIP file, which
can later be imported to another client with the same topology data
to realize consistency in display style between clients.
You have the authority to perform this operation.
1. On the menu bar, select Topology > Import GUI Display
Style. The Open dialog box is displayed.
2. Select a zip file from the Look in box.
3. Click the Open button to import the file, and the display style
of the current client changes accordingly.
END OF STEPS
Configuring Alarm Display Method
Showing and Setting the NE Monitoring Table
Abstract
Prerequisites
Steps
You can view the monitoring information and acknowledgment status of NEs in the monitoring table at the bottom of Topology Management view. You can also set the monitoring mode in the table.
You have the authority to perform this operation.
1. On the main menu, select Topology > Show NE Monitoring
Alarm Table to show the monitoring table at the bottom of
the client.
Note:
Select an NE in the topology graph or on the NE Tree, and the
alarm information of the NE is displayed on the Active Alarms.
2. Select filter conditions from the Perceived Severity and ACK
state drop-down menu to set the monitoring information you
want to see.
3. You can use the buttons on the monitoring pane to handle
the monitoring information.Table 14 shows specific functions
of buttons.
83
TABLE 14 TOOLBAR
Function
Button
Exporting
monitoring
information
Printing
monitoring
information
ON
MONITORING PANE
Operation
Pin
table
Customize
display
columns
Note:
If you have edited the handling measures, click the Save button before closing the dialog box.
7. In the dialog box showing the details of an alarm, you can
perform the operations by performing the following operations.
84
OF
ALARM INFORMATION
Function
Operation
View previous
message
View next
message
Acknowledge an
alarm
Cancel
acknowledgment
Cancel acknowledgement of an
acknowledged alarm, whose status
turns to Unacknowledged accordingly.
Add comments
Clear contents
Forward message
to related
personnel via
SMS or E-mail
END OF STEPS
Showing Primary Monitor Alarm Table
Abstract
Prerequisites
Steps
. The Set
85
iii. Click the Alarm code tab and select an alarm code.
iv. Click
to move selected alarm code(s) to the selected box
on the right.
v. Click the Time tab to set alarm generating time.
vi. Click the Others tab to set other parameters.
Visible:
alarms.
Note:
The alarm levels and confirm status can also be set by
selecting options from the Perceived severity and ACK
state drop-down menus.
vii. Click OK.
END OF STEPS
Result
86
Prerequisites
Steps
Operation Method
IP Address
Rule
4. Click Save.
87
Note:
The objects created before the rule is enabled are not affected
by the rule.
END OF STEPS
Prerequisites
Steps
Note:
In the Set Member dialog box, click the Delete button to
remove that member.
5. Click the OK button.
END OF STEPS
Moving a Node
Abstract
Prerequisites
Steps
Abstract
Prerequisites
You can view the statistics of a node on the NE tree, including the
number of its child NEs, and that of related groups and links.
You have the right to perform this operation.
Context
Steps
88
mation from the shortcut menu. The Statistical Information dialog box is displayed, see Figure 29.
FIGURE 29 STATISTICAL INFORMATION DIALOG BOX
END OF STEPS
Switching to Fault Management View
Abstract
Prerequisites
Steps
Abstract
Prerequisites
You can select an NE and switch to the Performance Management view to manage performance data of that NE. To do this,
perform the following steps:
You have the right to perform this operation.
89
Steps
Prerequisites
Context
You can quickly view the number of current alarms and total alarms
of an NE on the topology graph. To view alarm details, see Unified
Network Management System Performance Management Operation Guide.
Steps
The NE tree has a hierarchical structure based on parent-child relationship, with the server as the root node. The node has the
following types: sub-networks, managed NEs, and groups.
The function unique to the NE tree is to find a node on the tree. You
can also perform many other operations on the NE nodes, similar
to those on the topology graph.
Searching a Node on the NE Tree
Abstract
Prerequisites
Steps
90
You have some information of the node you want to find, such
as a keyword of its name or IP address.
1. Type the keyword, such as the name, in the text box Enter
query content.
FIGURE 31 TYPING
2. Click
KEYWORD
END OF STEPS
Operations on Topology Graph
This chapter describes how to perform operations unique to topology graph.
Topology Layer Operations
The topology graph is divided into layers. Select a node on the NE
tree, and the topology graph shows all nodes on the current layer
under the same node, see Figure 32.
FIGURE 32 CURRENT LAYER
This section describes how to see the topology graph of the upper
layer.
Before you begin, make sure that
91
Steps
Abstract
Prerequisites
Steps
On the current layer, you can expand a node to show its child nodes
at the same time and collapse it to hide the child nodes. Collapsing
is the opposite operation of expanding.
Before you begin, make sure that
Abstract
Prerequisites
Context
Steps
On the current map layer, you can expand all parent nodes and
collapse all expanded nodes.
Prerequisites
92
Context
To see the lower layer of the topology graph, perform the following
steps:
Steps
You can move the topology graph about in the current view to
display the information out of the current view.
Before you begin, make sure that
Context
Steps
1. Click
2. Drag the cursor in the graph pane to move the topology graph.
END OF STEPS
Locking and Unlocking the Topology Graph
Abstract
Prerequisites
Context
Steps
The locking and unlocking operation is applicable only to the current user.
1. Locking the topology graph: Click
ogy graph.
93
END OF STEPS
Setting Network Layout
Abstract
Prerequisites
Steps
You can select the network layout type of NEs on the topology
graph. To do this, perform the following steps:
Before you begin, make sure that
1. Click
button on the toolbar. The Network Layout dialog
box is displayed.
2. Select a layout type from the Layout Strategy list box.
Note:
Refer to the layout example in the Sample box when you select
a layout type.
The layout type options include:
Hierarchical Layout
Tree Layout
3. Click OK button.
END OF STEPS
Switching to the Graph of Another Node
Abstract
Prerequisites
Steps
You can switch the graph to another node you have viewed. Note
that only the node(s) you have viewed during this login can be
switched to.
Before you begin, make sure that
1. Click the
displayed.
94
Prerequisites
You have some information of the node, such as the name, type,
coordinate range, or IP address.
Steps
1. Click the
displayed.
3. Select the conditions from the check boxes after Search Conditions.
4. Configure the condition value in the corresponding condition
tabs.
5. Select the Case Sensitive check box.
6. Click the Search button.
END OF STEPS
Result
Prerequisites
Context
Steps
If no matching nodes are found, the Confirm is displayed, informing you about that result.
You can display the topology graph on full screen. If the topology
graph is displayed not on full screen, you have to drag the graph
to view the part not displayed. Full-screen view displays all information, thus making it unnecessary to move the graph.
1. Click
Note:
Click the
END OF STEPS
Exporting the Topology Graph
Abstract
Prerequisites
95
Steps
1. Click
played.
File name: Type the file name. It is better to use the name
of a group or an NE.
Files of type: the options include jpg and png.
Prerequisites
Context
Steps
You can list the NEs on the topology graph in a table. To do this,
perform the following steps:
button, and the topology information is listed in a
1. Click the
table.
2. Click
END OF STEPS
Printing Topology Information
Abstract
Prerequisites
Steps
You can only print the NE list when they are displayed in table,
instead of being presented in topology graph.
Before you begin, make sure that
96
Prerequisites
Steps
You can select the contents you want to display on the topology
graph. For example, the notification message is displayed only
when you select the Enable Message Notification check box.
Before you begin, make sure that
1. Click the
Prerequisites
This topic introduces how to hide or show the pane of Filter, Legend, and Display Overview, on the right of the Topology Management View.
Before you begin, make sure that
Context
Steps
1. Click
on the toolbar. The Legend tab is displayed in the
right pane.
Tip:
Click Filter below the Legend page. The Filter dialog box is
displayed.
Click Config Displaying Content below the Legend page,
and then you can set displaying content in the Topology Management view.
END OF STEPS
97
Result
Abstract
Prerequisites
Steps
Note:
If the pane of Filter, Legend and Display Overview is not displayed on the Topology Management view, click the
ton to show the pane on the right.
but-
98
Prerequisites
If the topology graph is complex or that the user only needs necessary information, using the condition filter can remove some
information. Set filtering conditions on the Condition Filter page
to get required topological view.
Before you begin, make sure that
Context
Steps
99
Note:
If the pane of Filter, Legend and Display Overview is not displayed on the Topology Management view, click the
ton to show the pane on the right.
but-
4. Type the filter condition in the NE(Group) name and IP address text boxes.
5. Type the link name in the Link Name text box.
Note:
You can also use the following wild cards: "?" represents one
character, while "*" represents two characters.
Use ";" to separate more than one IP addresses. You can enter
three types of IP address:
1. A single IP address, for example, 1.2.3.4.
2. An IP address range from a smaller address to a larger
one connected with -, for example, 10.197.0.010.197.255.255.
3. IP address with * used at head or end to substitute
for multiple characters, for example, *.10.10.10 and
10.197.10.*.
6. Click the OK button to display the nodes that meet the filter
conditions on the topology graph.
END OF STEPS
Configuring a Map
Abstract
Prerequisites
Context
100
The imported map file should be less than 1MB, and in the
format of gif or jpg.
Steps
1. Right-click the blank of the topology graph, and select Configure Map from the shortcut menu. The Configure Map dialog
box is displayed.
2. Click the Import button under the File Setting group box to
select a map file.
To...
Do...
3. Click Open.
Import a default map
Click Default.
3. Set the longitude and latitude ranges under the Map Range
group box.
Note:
You can only set the longitude and latitude ranges for imported
map.
Parameter
Description
Value Range
Default Value
Start
Longitude
Starting
longitude of
the map range.
[-180, 180]
-180
End
Longitude
Ending
longitude of
the map range.
[-180, 180]
180
Start
Latitude
Starting
latitude of the
map range.
[-90, 90]
90
End Latitude
Ending latitude
of the map
range.
[-90, 90]
-90
Tip:
Suspend the cursor on the longitude or latitude setting box, the
range will be displayed, such as latitude W:[-180, 0], E:[180,
0].
4. Click Set to save the settings. The imported map will be displayed as the background of the topology graph.
END OF STEPS
Group Management Operations
101
Overview of Groups
The system supports the grouping of managed NEs for easier management. The NEs can be grouped by type or by location.
Creating a Common Group
Abstract
Prerequisites
Steps
In the topology view, NEs can be divided into logical groups. This
grouping process does not depend on the actual physical connections between the NEs.
You have the user permissions of "Maintenance Role" or above.
1. Right-click a blank area in the Topology Management view,
and select Create Object > Common Group. The Create
Common Group dialog box is displayed, see Figure 34.
FIGURE 34 CREATE COMMON GROUP DIALOG BOX
102
2. To set the attributes of the common group, refer to the following table.
Attribute
Description
Parent
Node
Name
Description
Rule Type
No rule
No rule is required.
IP
address
rule
Location
rule
Device
type rule
Note:
If the Successively Create check box is selected, after a common group is created, the Create Common Group dialog box
is displayed automatically to create another common group.
3. Click OK.
END OF STEPS
Result
Abstract
Prerequisites
Context
103
Creation of type groups is based on equipment type. You can either create a single group, or create multiple groups in batches.
Steps
104
Note:
The parent node here can be other groups or NEs.
4. (Optional) Create a batch of groups.
i.
Note:
The rules for the type groups contain the following: No
Rule/IP Address Rule/Location Rule/Device Type Rule. All
writing specifications are given in the bottom of the dialog
box.
iv. Click OK.
The new single group is displayed under the selected parent
node
END OF STEPS
Creating a Location Group
Abstract
Prerequisites
Steps
In the topology view, NEs can be divided into logical groups. This
grouping process does not depend on the actual physical connections between the NEs. This topic describes the procedure.
You have the user permissions of "Maintenance Role" or above.
1. Right-click a blank area in the Topology Management view,
and select Create Object > Location Group from the menu.
The Create Location Group dialog box is displayed, see
Figure 36.
105
Note:
The parent node here can be other groups or NEs.
4. Enter the Group Name and Group Description.
5. Enter the self-defined rules in Rule Type. The writing specifications vary with rule types. Enter the rule based on the
message.
Note:
6. Click OK.
END OF STEPS
106
Result
Abstract
Prerequisites
Steps
Note:
Only an NE but not a group can be added as a member.
i.
107
Steps
Note:
The right-click menus vary with the types of objects.
2. Click the OK button to delete the selected group.
END OF STEPS
Result
Abstract
Prerequisites
Steps
Note:
The right-click menus vary with the types of objects.
To view the group attributes, you can also display the topology information in table. For this operation, see Showing the
Topology Information in Table in the chapter Operations on
Topology Graph.
END OF STEPS
108
Glossary
3GPP
3rd Generation Partnership Project
BRAS
Broadband Remote Access Server
CORBA
Common Object Request Broker Architecture
CTN
Converged packet Transport Network
DB
DataBase
DDN
Digital Data Network
EMB
Enterprise Message Bus
FTP
File Transfer Protocol
GUI
Graphical User Interface
HDSL
High-data-rate Digital Subscriber Line
IP
Internet Protocol
IP
Intelligent Peripheral
J2EE
JAVA 2 platform Enterprise Edition
JMS
Java Message Service
KPI
Key Performance Indicator
LAN
Local Area Network
MML
Man Machine Language
MODEM
Modulator-Demodulator
NAF
Northbound Adapter Function
NBI
NorthBound Interface
NE
Network Element
109
NMS
Network Management System
OSS
Operation Support System
OTN
Optical Transport Network
PS
Packet Switched
RMI
Remote Method Invocation
SDH
Synchronous Digital Hierarchy
SFTP
Secure File Transfer Protocol
SMS
Short Message Service
SNMP
Simple Network Management Protocol
SSH
Secure Shell
TCP
Transfer Control Protocol
TMN
Telecommunications Management Network
UDP
User Datagram Protocol
WAN
Wide Area Network
WDM
Wavelength Division Multiplexing
XML
eXtensible Markup Language
110