The iManager U inherits all the functions of the original T, N BMS, and DMS systems, and manages Huawei transport, IP, and access equipment. OBN iManager N BMS Introduction ISSUE CJH, CJH, iManager N BMS Advanced Operation and CJL, CJL, iManager N BMS Operation Training (MSAN),

Author: Vucage Volmaran
Country: Chad
Language: English (Spanish)
Genre: Politics
Published (Last): 7 December 2014
Pages: 172
PDF File Size: 18.56 Mb
ePub File Size: 6.40 Mb
ISBN: 725-1-63371-288-7
Downloads: 5220
Price: Free* [*Free Regsitration Required]
Uploader: Goltim

Hence, the degree of coupling of NE management components decreases. This document provides guides for getting the features and functions of the U The U provides the following configuration functions for ATM service creation: The U supports a networking scheme of multiple servers and clients, as shown in Figure The U system contains management components for manageable equipment. The development of all-IP architecture is the leading factor in the transition from the existing vertical network that is divided by technology and service to the flattened horizontal network.

You can create a new virtual bridge VB and configure the following: You can easily operate and maintain devices. By using the U, a user can configure the If a rule needs to be applied to multiple interfaces on different routers, configuring the rule at every point is time-consuming and increases the costs of management and maintenance. In this way, existing network resources can be reused maximally, and equipment expenditure can be reduced. One third-party NE is equal to one equivalent NE, and can only be discovered instead of being managed.

You can filter all the NEs to display only the required NEs quickly. Edits and displays the rule of the topology data or the filter conditions. The U is based on the design of distributed software architecture, and supports the new generation advanced telecom computing architecture ATCA hardware platform.

N wavelength protection subnet by using the search function. In this case, you can right-click the NE icon and query the current alarm of the NE from the shortcut menu. Housekeeping Configuration By using the U, a user can perform the following operations: B2000 rights to perform various operations on policy packages are under control.

  HOMONIMOS EJERCICIOS PDF

GPON FTTx Consultant resume in Riyadh, Riyadh Province, Saudi Arabia – April

Created according to user test requests, a test case is the entity of a test tool based on the application layer, transport layer, network layer, data link layer, and MPLS services. Subnet mask Also ianager to as the network mask off code, it is used to define network segments, so that only the computers in the same network segment can communicate with one another, thus suppressing broadcast storm between different network segments. Examples of SDH managed objects are: The view can be zoomed in or out so that you can view the objects clearly.

It uses the TDC to precisely adjust the dispersion. The fault is defined as imaanager crash. If the client is locked out, you need to enter the user password or use the administrator account to unlock the client.

Clock Configuration By using the U, a user can perform the following operations: You can also dump or print log data.

Slave servers can share the CPU usage and memory usage of the master server. The connection point is characterized by the information which passes across it.

Dump Dump is a process of exporting alarm data from the database to the customized file and meanwhile the exported data is cleared in the database. When a fault occurs in the primary site, the system switches to the secondary site so that network monitoring continues.

The system analyzes the alarms based on the pre-defined correlation rule to mask the correlative alarms and finds the root alarm.

To avoid negative n2000 on the transmission performance, the ROADM optical power equalization function is provided. This function allows you to perform the following operations: These nodes are connected by using Ethernet or data communications channel DCC.

In this way, the HONET UA effectively reduces the risk of decisions due to the rapid development of telecommunication technologies. The service package module helps you perform typical service configurations. Configuration File Text file, including various configuration on the device. You do not need to query the operation logs on each NE. It is applied to build communications connection with the equipment beyond the NMS management area. IP Source Guard Management This function supports the management on the static user binding table, dynamic check, and clearance of dynamic configurations.

  BRECHT CAUCASIAN CHALK CIRCLE PDF

Figure Performance Management Process Monitoring Instance Management Monitoring instance enables you to collect performance data according to the monitoring template and schedule policy for all performance indicators belonging to a resource from a device.

iManager U – Huawei

Users can also perform operations such as creating, deploying, undeploying, and verifying policy packages. Web Authentication Management This function supports the management on the Web authentication server. Italic Command arguments are in italics.

Its routing type includes port routing and VLAN routing. imanwger

iManager N2000 BMS

In the case of deployment test or fault restoration, or when updating the baseline is required, you need to collect the baseline, to provide reference for comparison tests, and alerts or alarms. N Wavelength Protection Subnet Parameters. This greatly reduces the operation and maintenance investment of large-scale networks. When the communication between the U and the active GNE recovers, the U determines whether to use the active GNE again according to the preset revertive mode.

Cluster network management involves the following functions: Such a process is called alarm correlation analysis. Networkwide clock synchronisation status query3. You can set the U to automatically synchronize the NE time by specifying the automatic synchronization period.

This function can help you to detect the events of frame error, frame error period, and frame error seconds. In addition, the U breaks the restrictions of the vertical management mode and realizes integrated management on the equipment at the network layer and NE layer.