Professional Documents
Culture Documents
OBN110201 iManager
N2000 BMS Platform
Operation and Maintenance
ISSUE 2.0
www.huawei.com
Menu bar
Tool bar
Navigation tree
Main window
Main view
Output window
Status bar
The password:
•shall contain 8–16 characters.
•shall contain characters as well as numbers .
•must not be identical with the user name.
•must not be the same as the latest used eight ones.
User
User rights include the rights to manage devices and the rights to
perform operations. That is, each user can only perform authorized
operations on authorized devices.
User Group
A user group is a group of users with the same rights to operate on the
N2000. The N2000 provides three default user groups:
− Maintainer group
− Operator group
− Monitor group
ACL
The access control list (ACL) determines the IP address from which a
user can log in to the N2000.
− User ACL: It defines the IP addresses with which a user can access
the N2000 server. All the IP addresses in the user ACL are in the
system ACL.
Management right
Operation right
Operation Set
On the Security Object tree, select the Users node, right click and select
New User.
On the Security Object tree, click a user under the Users node.
On the Security Object tree, select the User Groups node, right
On the Security Object tree, click an operation set under the Operation
Sets node. In the right pane, click the Member tab.
Topological View
Submap
In the NMS, you can divide a large network into several smaller
networks by a certain rule, such as by geographical area. This helps
to manage the devices easily. Such small networks are called
submaps in the topology.
For a device with a single frame, one node stands for one device.
For a device with multiple frames, one node stands for one frame of
the device.
Link
Container
NE
Polling Status
Select Edit > Add Object from the main menu or right click on the main
view
Select two objects, right click, and then select Create Link
The keyword
for searching
Select Edit > Maintenance Info Template Setting from the main menu.
Select Edit > Device Maintenance Info from the main menu.
specify the
location data
select a
maintainer
record
Classified by Characteristics
Fault alarm
Event alarm
Cleared alarm
Classified by Function Modules
Power alarm
Environment alarm
Signalling alarm
Trunk alarm
Hardware alarm
……
Critical alarm
Major alarm
Minor alarm
Warning alarm
Report
Ack
Unacked & Acked & uncleared
uncleared alarm alarm
Recover Recover
Ack
Unacked &
History alarm
cleared alarm
Current alarm
Start
Report alarms
Mask alarms
Analyze alarm
correlation
Report alarms
Save alarms
Notify alarms
End
On the Fault Browser tree, right click the Alarm Statistics node.
Locating an Alarm
Acknowledging an Alarm
Select Fault > Audio&Visual > Stop Alarm Panel Sound from the
main menu.
Select Fault > Audio&Visual > Stop Alarm Panel Current Sound
from the main menu.
Select Fault > Audio&Visual > Reset Alarm Box from the main menu.
In the dialog box that appears, select an alarm level, and then click OK.
Select Fault > Audio&Visual > Stop Alarm Box Sound from the main
menu.
Select Fault > Audio&Visual > Synchronize Alarm Box Data from
the main menu.
NE performance monitoring
NE data analysis
Traffic measurement task management
Data query
Performance threshold alarm management
The N2000 enables you to know the running state of the network. In this
case, you can take some measures to avoid faults. You can analyze
network performance data and quality of service for better network
planning.
Send collection
commands periodically
N2000
Report NE performance
result
Related SNMP NE
Analyse results Save results
N2000 N2000
In the task list area, right click, and then select Create Task.
Manual backup
Select
Performance&Stat >
Data Maintenance >
Manual Maintenance
from the main menu.
click Configure to
select database tables
Automatic Backup
Select
Performance&Stat >
Data Maintenance >
Timed Maintenance
from the main menu.
click Configure
to select
database tables
Manual Deleting
In the dialog box that appears, select database tables, and then click OK.
In the Time Range of Data to Process area, click …, and then select the
start time and end time.
Automatic Deleting
In the dialog box that appears, select Delete Data for Operation Strategy.
Set the name and description of the deleting task. In the Database Table
Set area, click Configure. In the dialog box that appears, select
database tables, and then click OK.
In the Time Strategy area, set the trigger time and time range to delete
data.
With the EM management, you can monitor the environment and power
Method 1:
In the Environment & Power
Monitoring window, query EMUs. In the
EMU list, double click an EMU.
Method 2:
On the device navigation tree in the left
pane, select an NE node. Right click,
and then select Open Environment
Power Monitoring Panel.
Click the Basic Info tab, and then browse power supply parameters
in the Power Parameter Info area.
Click the Basic Info tab, and then browse environment parameters
in the Environment Parameter Info area.
Click the Basic Info tab, and then browse rectifier module data in
the Rectifier Information area.