IMANAGER N2000 BMS PDF

The iManager U inherits all the functions of the original T, N BMS, and DMS systems, and manages Huawei transport, IP, and access equipment. OBN iManager N BMS Introduction ISSUE CJH, CJH, iManager N BMS Advanced Operation and CJL, CJL, iManager N BMS Operation Training (MSAN),

Author: Taktilar Meztizragore
Country: Mauritius
Language: English (Spanish)
Genre: Video
Published (Last): 27 December 2006
Pages: 343
PDF File Size: 13.79 Mb
ePub File Size: 20.16 Mb
ISBN: 646-4-69984-475-5
Downloads: 47507
Price: Free* [*Free Regsitration Required]
Uploader: Kajirisar

The current minute or hour register only one for each is applied to collect the performance data in the current monitoring period. Clock tracing and search functions Configuration data The data that configures the NE hardware for coordination imanagerr this NE and other NEs in the entire network and operation of specified services.

It includes two parts: Provide flexible customization of scheduled tasks to reduce operation and maintenance costs. Optical time domain OTDR is an optical fault locator and analysis tool for optical fiber reflectormeter networks. Actually it is the first several digits one or two of the user phone number. In addition, you can learn the cause if the discovery fails. You can also manage the RPR ring protection parameters and link parameters. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient.

You can build the iamnager data of end-to-end RTN IP network management by searching for the data at the NE layer of the U, or directly configure the data at the network layer of the U, and apply the data to all the relevant NEs. The U supports the ability to add labels.

Therefore, the latest document issue contains all updates made in previous issues.

iManager U2000

The messages sent from the U are transmitted through the service channels of the managed devices. In this manner, the load is balanced. Clock Configuration By using the U, a user can perform the following operations: Layer 3 Logical port None Lmanager tunnels. To perform protection subnet management, you need to n20000 the related license. Thus, next time when you query alarms that meet the common conditions, you can use the template directly without setting query conditions again.

  DENIS MCQUAIL USES AND GRATIFICATIONS PDF

In actual practice, the U and NEs may be located at different floors of the same building, or different buildings or cities.

:: HTSV JOINTSTOCK COMPANY :: – MSAN

You can restore the historical backup data of the equipment on the GUI of U Managed objects are grouped into imznager object sets to facilitate permission assignment. With powerful management functions at the NE and network layers, the U is the major and future-oriented network management product and solution in Huawei.

Imanayer addition, the super network management capability and modular software architecture of the U that shapes the development trend in the future network management make the U a leading all-IP and FMC management solution. For the change in the connection status of Ethernet ports, if the change is caused by the opposite equipment, a board at the local end, network cable, human factors and other reasons, you can use the LPT function to quickly switch the route to the equipment on both ends.

Huawei iManager U Price Manual Specification Certification —

No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co.

It supports overflow imanater and manual dumping of alarms. The object here may be the networkwide equipment, a specific NE, a specific board and even a specific function module of a specific board. User group User set refers to imanagerr set of NMS users with the same imanagsr authorities.

Service Mirroring Configuration In the case of the service mirroring, all packets that enter a certain port are duplicated and then duplicated packets are transmitted through an observation port. Web Authentication Management This function supports the management on the Web authentication server. This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and audit policy packages, view the deployment and audit result of policy packages.

  LA CABALE MYSTIQUE DION FORTUNE PDF

Imansger can be accessed at any time from the Help menu or by pressing the F1 key. Control Link Management By using the U, a user can perform imanagef following operations: Service Deployment The U provides a user-friendly service configuration GUI on which you can complete all configuration operations.

In the case where a rule corresponds to multiple services, these services can be in a service group or map to these services. Displayed on the NMS, the change of environment can be monitored timely and accurately. Alarm Inanager visible or imanaged audible indication to notify the person concerned that a failure or an emergency has occurred. Network convergence requires network management to be consolidated. The non-core subsystems of the U such as the management components for manageable equipment are running on the slave server.

Alarm Synchronization The U supports the ability to synchronize NE alarms automatically and manually. On a large-scale network, users do not need to check and configure services on devices one by one. By using these function point policies, you can bind the CAR configuration attribute, shaping configuration attribute, flow classification configuration attributes, WFQ schedule policy and WRED policy attributes.

The U supports distributed cluster. Main Templates The main templtes are as follows: Submarine cable line monitoring includes the following functions: The U supports the n200 of the correlation between different NEs. To perform end-to-end network management, you need to have the related license. Binding In virtual concatenated payload configuration, designating one binding number to identify the VC4s of the same virtual concatenated payload is called “bind”.

N Wavelength Protection Switching.

Layer-3 attributes are network layer attributes of the interface, such as the IP attribute. The information in this document is subject to change without notice.