0% found this document useful (0 votes)
18 views

IManager U2000 IP Network Monitoring and Maintenance Solution

This document contains 19 pages of confidential information and instructions for Huawei performance monitoring. It discusses performance monitoring templates, indicators, threshold configuration, scheduled policies, and monitoring instances. It also provides step-by-step guidance on creating monitoring templates and instances to monitor network equipment performance. The entire document is marked as confidential and internal use only.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

IManager U2000 IP Network Monitoring and Maintenance Solution

This document contains 19 pages of confidential information and instructions for Huawei performance monitoring. It discusses performance monitoring templates, indicators, threshold configuration, scheduled policies, and monitoring instances. It also provides step-by-step guidance on creating monitoring templates and instances to monitor network equipment performance. The entire document is marked as confidential and internal use only.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Course Name P-0

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-1

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-2

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-3

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-4

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-5

 Performance management: Plans, monitors, and measures network efficiencies, such as the throughput, usage, and
error rate, to ensure excellent network performance at low costs and meet future requirements of network
performance.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-6

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-7

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-8

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-9

 Resource
A resource is a telecommunications resource model, for example, a device, card, port, or link in the performance management domain.
A resource can be a physical or logical entity. Logical resources include physical resources. Resources are configured with certain
indicators for capturing performance data values. The performance monitoring system collects performance data values for the
indicators.
 Indicator
Performance indicators are related to resources. Indicators are performance data, such as CPU usage and memory usage, for
monitored resources. The NMS collects performance data for monitored resources and implement calculation. Performance indicator
attributes include the data type, precision value (limited only to the floating point value), and minimum and maximum values.
 Indicator group
An indicator group refers to a statistics group, such as a basic indicator group or a subrack feature indicator group. During the
performance statistics process, an indicator group is the collection of statistics indicators. Each indicator group consists of one or
multiple indicators with similar attributes.
 Threshold configuration
A threshold is specified for an indicator.
 Data monitoring template
A data monitoring template is an indicator collection used to collect resource performance data. Users can configure indicators and
indicator groups.
 TCA monitoring template
A TCA monitoring template is a collection of indicators and threshold definitions and applies to resources based on selected conditions,
such as upper threshold monitoring and lower threshold monitoring. Threshold definitions include the high trigger threshold, low
trigger threshold, high clear threshold, low clear threshold, high alarm severity, and low alarm severity.
 Scheduled policy
Based on the scheduled policy, users collect performance data within a specified period or based on the repetition cycle.
 Monitoring instance
Based on monitoring instances and all performance indicators of a resource, users use monitoring templates and scheduled policies to
collect performance data for devices. One monitoring instance collects performance data of only one resource.
 Data query
Users can query performance data of indicators related to a resource.
 Data dumping
Users can dump performance data to maintain the database and disk space.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-10

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-11

 To ensure the stable operating of IP networks, configure the following performance


monitoring items for IP network monitoring and maintenance:
 Performance monitoring for device hardware: monitors the running status of device
hardware.
 Performance monitoring on the network side: monitors the performance of the network
bearer layer to evaluate and monitor the network running without identifying specific
services or users.
 Performance monitoring for end-to-end services: monitors the performance of
services running on networks to evaluate the running status of specific services.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-12

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-13

 Historical graph: facilitates the analysis of abnormal traffic or data (for example, traffic
at holidays is remarkably heavier than that in normal times and the temperatures of
devices in winter are remarkably lower than those of devices in summer).
 TCA: The U2000 supports TCAs. When a data value is greater than the upper
threshold or less than the lower threshold, a TCA is reported to the U2000 promptly to
help O&M personnel identify faults, facilitating quick troubleshooting. In addition, data
that exceeds thresholds is marked red in reports.
 Report: The U2000 provides various reports for the O&M engineers. The reports
contain extensive online network data such as the traffic, bandwidth usage, and alarm
distribution, which lays a foundation for network design, network planning, and O&M
assessment.
 Northbound interface (NBI): The U2000 masks Huawei NE differences and supports
diversified NBIs, implementing interconnection with the OSS.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-14

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-15

Background
Select a data monitoring template and click Apply. Alternatively, right-click the template
and choose Apply to from the shortcut menu to create a monitoring instance that
uses the template.
Procedure
1. Choose Performance > Performance Template Management > Performance
Monitor Template from the main menu. The Performance Monitoring Template
tab is displayed.
2. Select a resource type and click Create. Alternatively, right-click on the result
template and choose Create from the shortcut menu. The Create Monitoring
Template dialog box is displayed.
3. Enter the name of the monitoring template in the Monitor Template Name text box.
The name of a template must meet the following requirements:
 Template names must be the same for resources of the same type.
 Template names are case insensitive.
 A template name is a string of a maximum of 60 characters.
 A template name allows Chinese characters, spaces, letters, numbers, and
symbols, such as hyphens (-), underscores (_), full stops (.), and slashes (/).
4. In the Select Indicator area, select or deselect monitoring check boxes and set
indicators and indicator groups requiring performance data collection.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-16

1. Choose Performance > Performance Monitoring Management from the main


menu.
2. On the Performance Monitoring Management tab, choose NE >
Router/Switch/MA/ME NE > Router and Switch NE from the navigation tree and
click Create.
3. In the Filter Criteria dialog box, set Is Monitored to None and click OK.
4. In the Available Resources area, select an NE name and click ↓ to add the NE
name to the Selected Resources area.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-17

1. Click Next to select a monitoring template.


2. Select CPU/Memory.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-18

1. Optional: In the Date Range area, select Start Date and End Date and set the start
date and end date for monitoring.
2. Note: The default start date and end date are the current date.
3. Optional: Select Scheduled Policy.
4. Click Test to check whether data can be collected for resources.
5. Click Next to create a monitoring instance.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-19

1. At the top of the progress bar, the status of created instances is displayed, indicating
the instance creation status (succeeded or failed).
2. Click Close.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-20

 The created monitoring instance is displayed in the query result area.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-21

1. Choose Performance > Performance Monitoring Management from the main


menu. The Performance Monitoring Management tab is displayed.
2. Click the group management icon. The group management tab is displayed.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-22

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-23

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-24

1. Choose Performance > Performance Template Management > Performance


Monitor Template from the main menu. The Performance Monitoring Template
tab is displayed.
2. On the Performance Monitoring Template tab, choose NE >
Router/Switch/MA/ME NE > Router and Switch NE from the navigation tree.
3. Select CPU/Memory to view the template details.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-25

 The left figure shows that the efficiency of manual performance monitoring is low and
it is difficult to find problems.
 In the right figure, performance deterioration can be easily identified based on TCAs
on the NMS.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-26

 Resources that seriously deteriorate are easy to be identified,


facilitating quick problem locating and resolving.

 Users can view alarm details of each resource.

 Users can switch over to the real-time performance module.

 Users can obtain the health status of the entire network quickly.

Procedure
1. Choose Performance > Top N Faulty Resources from the main
menu. The Top N Faulty Resources tab is displayed.
2. Select one or multiple indicators and click Query.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-27

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-28

This topic describes the procedure for viewing historical performance data of a resource.
Prerequisites
At least one monitoring instance is available.
Background
 For resource types other than the virtual private network (VPN) type, multiple
monitoring instances can be selected simultaneously.
 Only instances for data monitoring templates support historical data query.
Procedure
Method 1
1. Choose Performance > Performance Monitoring Management from the main
menu. The Performance Monitoring Management tab is displayed.
2. Select one or multiple monitoring instances, right-click, and choose View Historical
Data from the shortcut menu.
3. Note: Only historical data of multiple instances in the same period can be
simultaneously viewed.
Method 2
1. Choose Performance > Browse Historical Performance Data from the main menu.
2. Set query conditions and click Query.
3. Select resources whose historical performance data is to be viewed and click ↓ to
add the resources to the Selected Resources area. Then click OK.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-29

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-30

1. Choose Performance > Browse Top N Performance Data from the main menu.
2. On the Browse Top N Performance Data tab, choose NE > Router/Switch/MA/ME
NE > Router and Switch NE from the navigation tree.
3. Click Select under Selected Resources to select resources to be queried.
4. Select bar chart indicators, line graph indicators, and query periods.
5. Click Query.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-31

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-32

1. Choose Performance > Performance Grading from the main menu.


2. Select resource types and time.
3. Set the grading policy and click Apply.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-33

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-34

1. Choose Performance > Performance Dump Management > Automatic Dump


Setting from the main menu.
2. In the Path on Server text box, enter the path for saving the performance data to be
dumped.
3. Set dumping parameters, as shown in the figure.
4. Click OK.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-35

1. Choose Performance > Performance Dump Management > Manual Dump


Performance Data from the main menu.
2. In the Path on Server text box, enter the path for saving the performance data to be
dumped.
3. Set dumping parameters, as shown in the figure.
4. Click Dump data. The performance data dumping progress is displayed.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-36

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-37

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-38

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-39

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-40

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-41

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-42

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-43

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-44

1. On the main menu, choose Performance > Performance Monitoring Management.


2. In the navigation tree of the Performance Monitoring Management tab, choose NE
> Router/Switch/MA/ME NE > Interface > Universal Interface. Then, click Create
at the bottom of the page.
3. In the NEs area, select NEs where interfaces to be monitored are located and click
Get Resources.
4. In the Available Resources area, select interfaces through which instances are to
be created and click ↓ to add resources to the Selected Resources area.
5. Click Next to select a monitoring template.
6. Select Interface Monitor.
7. Click Next to set Start Date and End Date. If Start Date and End Date are not
configured, bearer network interfaces are monitored by default.
8. Click Next. The progress for creating instances is displayed.
9. Click Close.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-45

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-46

Recommended indicator values:


 Bandwidth Utilization for IP links <= 50%. If the bandwidth
usage exceeds 50%, capacity expansion is required.
Bandwidth Utilization for PWE3 or L3VPN services <= 70%. If
the bandwidth usage exceeds 70%, capacity expansion is
required.
 IP link, tunnel, PWE3 service, or L3VPN service:
 Real-time services: delay < 40 ms, jitter < 15 ms, and packet
loss rate < 0.1%
 Non-real-time services: delay < 60 ms, jitter < 20 ms, and
packet loss rate < 1%

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-47

1. Choose Performance > Performance Monitoring Management from the main


menu.
2. On the Performance Monitoring Management tab, choose Link > IP Link from the
navigation tree and click Create.
3. Set Filter Criteria to be blank to filter out all L3VPN services on the NMS, or
implement criteria-based filtering.
4. In the Available Resources area, select interfaces through which instances are to
be created and click ↓ to add resources to the Selected Resources area.
5. Click Next to select a monitoring template.
6. Select IP Link-Delay/Jitter/PacketLost.
7. Click Next to set Start Date and End Date. If Start Date and End Date are not
configured, network layer links are monitored by default.
8. Click Next. The instance creation progress is displayed.
9. Click Close.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-48

1. Choose Performance > Performance Monitoring Management from the main


menu.
2. On the Performance Monitoring Management tab, choose Service > VPN >
L3VPN from the navigation tree and click Create.
3. Set Filter Criteria to be blank to filter out all L3VPN services on the NMS, or
implement criteria-based filtering.
4. In the Available Resources area, select interfaces through which instances are to
be created and click ↓ to add resources to the Selected Resources area.
5. Click Next to select a monitoring template.
6. Select L3VPN-PackateLost/Delay/Jitter.
7. Click Next to set Start Date and End Date. If Start Date and End Date are not
configured, service layer links are monitored by default.
8. Click Next. The instance creation progress is displayed.
9. Click Close.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-49

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-50

 Monitoring indicators: Both inbound bandwidth usage and outbound bandwidth usage
are less than 70%.
 As shown in the preceding figure on this page, the inbound bandwidth usage is
greater than 70% and keeps increasing, and the inbound rate is also increasing.
Therefore, expansion is required.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-51

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-52

 Determine whether networks are faulty based on the performance monitoring status
and alarms.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-53

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-54

 Monitor the network quality by setting a proper threshold range.

Confidential Information of Huawei. No Spreading Without


Permission
Course Name P-55

Confidential Information of Huawei. No Spreading Without


Permission

You might also like