The iManager U inherits all the functions of the original T, N BMS, and DMS systems, and manages Huawei transport, IP, and access equipment. OBN iManager N BMS Introduction ISSUE CJH, CJH, iManager N BMS Advanced Operation and CJL, CJL, iManager N BMS Operation Training (MSAN),

Author: Dagar Shakagami
Country: Zambia
Language: English (Spanish)
Genre: Finance
Published (Last): 5 July 2015
Pages: 105
PDF File Size: 12.9 Mb
ePub File Size: 8.88 Mb
ISBN: 851-2-17410-989-7
Downloads: 73910
Price: Free* [*Free Regsitration Required]
Uploader: Bajora

Slave servers can share the CPU usage and memory usage of the master server. Usually, one NE has at least an SCC system control and communication board which responsible for the management and monitoring of imangaer NE. The user can check the email address for alarm information received on the alarm server.

In the case of network failure, the communication channel between the U and its managed network is interrupted. Alarm dumping is used to dump history alarms and events to files, which ensures a stable and efficient system and saves disk space.

Equipment set facilitates the user authority management imanafer equipment in the management domain of the NMS. The main functions for managing system processes are as follows: Symbol Description Indicates a hazard with a high level of risk, which if not avoided, will result in death or serious injury.

The development of gms architecture is the leading factor in the transition from the existing vertical network that is divided by technology and service to the flattened horizontal network.

Protection path A specific path that is imxnager of a protection group and is labeled protection. L Label A mark on a cable, a subrack, or a cabinet for identification. Therefore, you can bulk import devices to the U and implement the functions of software-commissioning-free and remote acceptance.


It provides intelligent configuration and monitoring means. The trend analysis graph helps you know the entire change trend of the interface performance in a timely manner. There are three kinds of loopback modes: When you configure the firewall on the network access side, you need to configure ACL matching rules, such as the restriction on a MAC address and the restriction gms an IP address.

Performance Performance events usually have upper and lower thresholds. The entity which provides the means used to transport and process information related to management functions for the telecommunications network. Indicates a hazard with a medium or low level of risk, which if not avoided, could result in minor or moderate injury.

One third-party NE is equal to one equivalent NE, and can only be discovered instead of being managed. Protection strategy In case the service route provides multiple service protections, different protection strategies can be selected as required.

Imamager Trail Management By using the U, you can perform the following operations: Figure shows the alarm notification means. It has multiple pairs of interfaces for the optical fibre connection. By using the U, a user can configure the Query and configure the Ethernet interface board on an NE.

Huawei iManager U Price Manual Specification Certification —

In this manner, the security of the U is ensured. The VC4 server trail provides transparent channels that is, circuit group for circuit-layer network nodes for example, a switch in a path-layer network, and acts as the basic unit of inter-office communication path.


This way is applicable for the grooming of multi-dimensional optical cross-connections. The scheduled tasks that the U supports are backing up the database, exporting script files, collecting performance data, collecting ATM performance data, backing up history performance data, and refreshing the automatically switched optical network ASON information.

The parameters of multiple sets of equipment can be automatically generated through related service templates. The LCAS can dynamically adjust the number of virtual containers for mapping desired services, to meet different bandwidth requirements of services. It indicates the virtual channel in the path.

Then, the NE is added to the topology view on the U automatically. In addition, this function helps to quickly locate a network fault, which improves the efficiency of alarm locating. The alarms in the topology view are displayed by two methods: Convention Description Boldface Buttons, menus, parameters, tabs, window, and dialog titles are in boldface.

Product Information and Downloads

Query the line rate of an optical transport network OTN. The equivalent coefficient of the OEM equipment is calculated in the way similar to Huawei equipment.

In addition, different application processes are integrated into the system by means of registry files. This base stores alarm details.