The iManager U inherits all the functions of the original T, N BMS, and DMS systems, and manages Huawei transport, IP, and access equipment. OBN iManager N BMS Introduction ISSUE CJH, CJH, iManager N BMS Advanced Operation and CJL, CJL, iManager N BMS Operation Training (MSAN),

Author: Daktilar Dait
Country: Monaco
Language: English (Spanish)
Genre: Finance
Published (Last): 12 November 2007
Pages: 422
PDF File Size: 16.33 Mb
ePub File Size: 18.5 Mb
ISBN: 203-4-32619-857-7
Downloads: 60793
Price: Free* [*Free Regsitration Required]
Uploader: Bacage

During user group creation, the user group details, management domain, and user group permissions must be set. If you set the status of an alarm to Suppressed, the NE does not report the alarm. n20000

The wavelength detection mode applies to the transmission link where no service is added or dropped or where the number of wavelengths added and that dropped are the same at the OADM. The rights to perform bmx operations on policy packages are under control. The Metro Ethernet often carries heavy imajager traffic. When you log in to the U for the first time, the U provides some services by default. Applicable to remote hot standby of the non-distributed system, featuring automatic switching.

The remote access service is applicable to employees accessing the enterprise intranet in remote dial-up mode over the Imanagger. User imnager User Group Management The functions of user and user group management are described as follows: Layer 3 Physical port Not supported Carries tunnels.

The WSS is applicable to cross-connect nodes in a ring. In addition to the preceding functions, the U provides various customized functions, as shown in Figure and as listed in Table Card attributes Management By using the U, a user can perform the following operations: The U needs to be connected to only the nearby NE on the managed network.

iManager U2000

Interface Management This function allows you to configure a variety of media interfaces, including: The value of a port set ranges from 0 to Routing Policy Configuration The U supports configuring routing policy.

Alarm acknowledgment helps you to identify a processed alarm.


You can run the i,anager suite associated with a certain running policy at a specified time daily, weekly, or monthly. Software library management The system supports the ability to manage NE software.

Generally, the number of equivalent NEs that the U can manage is calculated according to the following rules: User configuration results can be previewed through the topology before being delivered.

Networkwide clock synchronisation status query3. Alarm color display The severity of imsnager alarm in the alarm list is displayed with a corresponding color. When the time expires, these operations automatically stop. The user can configure the U to automatically synchronize the NE time by specifying the automatic synchronization period.

This ensures that services are available. Device Management By using the U, you can manage device panels, shelves, cards, and system parameter profiles. The details of a trail group include direction, name, trail status, source and sink, source and sink wavelength, bearer rate, rate, and service type.

Product Information and Downloads

Service deployment is used to make services take effect on devices. The system analyzes the alarms based on the pre-defined correlation rule to mask the correlative alarms and finds the root alarm. Customize the view according to requirements of every product and organize the data in the view displayed by the topology module, such as the layer 2 view, VPN view and IP view. Security Logs Security logs record the security-based operations that the user performs on the U, including logout, login, log dumping, and device log synchronization.

NE Channel Management This function allows you to configure and maintain various types of management channels, including: L Label A mark on a cable, a subrack, or a cabinet for identification. You need to set the start time and end time of a day and immanager on which days of bm week the rules are valid. Hence, multiple operating systems are compatible.

Capability license controls the monitoring instance creation based on the license availed. The data in different locations is backed up through a network.

You can set to periodically disable some NE functions that may affect services, such as loopback and ALS. Equipment set An aggregate of multiple managed equipment. A sub-network planning can better the organisation of a network view.


iManager U Unified Network Management System VRC00 | 봉열 김 –

See Figure and Figure By using the U, you can m2000 the following operations: It is also applicable to other applications such as broadband Internet access and video conference.

Hence, the degree of coupling of NE management components decreases. In this manner, the load is balanced. On the upgraded U software, previous data can be restored with the help of the upgrade wizard. Branches of Company A or Company C that are in different cities have data communication requirements. Device Management By using the U, you can manage device panels, shelves, cards, clock sources, and system parameter profiles.

The password security policies involve the maximum number of password duplications with history passwords, maximum password reservation period, minimum password reservation period, and number of days ahead for notifying password expiration. N optical channel protection.

In addition, the U can quickly load services on the current network to itself for unified management and monitoring, without requiring much user participation. In the TMN hierarchy, the U is located between the element management layer and network management layer, and supports all functions of the NE and network layers.

The configuration object is a single NE. Through the adjustment of the nominal gain of the optical amplifier unit and the attenuation value of the attenuation adjustment unit, the attenuation value vms equal to the gain value, thus ensuring the power budget of the entire link. The U is based on the design of distributed software architecture, and supports the new generation advanced telecom computing architecture ATCA hardware platform.