NetNumen N31 UNMS (V5.01.01) User Manual Performance
NetNumen N31 UNMS (V5.01.01) User Manual Performance
Version 5.01.01
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: (86) 755 26771900
Fax: (86) 755 26770801
URL: http://ensupport.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION
The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPO-
RATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION
or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are dis-
claimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-in-
fringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the
information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject
matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee,
the user of this document shall not acquire any license to the subject matter herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Tables ............................................................. 77
Glossary .......................................................... 79
Purpose At first, thank you for choosing NetNumen N31 Unified Manage-
ment System of ZTE Corporation!
NetNumen N31 Unified Management System is the intermediate
system between lower level NE and upper layer operation. It
mainly realizes the centralized topology management, centralized
alarm management, centralized performance management and
centralized report management of lower level NE.
This manual mainly introduces the management measurement
task, management performance threshold, management perfor-
mance data and centralized alarm management of NetNumen
N31 Unified Management System.
Intended This manual is intended for the following engineers:
Audience
� On-site maintenance engineers
� Network monitoring engineers
� System maintenance engineers
What Is in This
Manual Chapter Summary
Typeface Meaning
Typeface Meaning
Performance
Management
Table of Contents
Performance Management ................................................... 1
Measure Task Management .................................................. 4
Performance Threshold Management ....................................10
Counter Index Management ................................................16
Performance Data Query ....................................................21
Performance Management
Performance Management Function
Overview
Performance management is to manage the performance of the
network, that is, it guarantees that the network can run effectively,
stably and safely by network running state monitoring. Also it pro-
vides sufficient and complete running operation by the collection
and analysis of network device data, which makes management
personnel work out the suitable running policy according to the
network running state and makes the network run at the most ef-
ficient state.
Performance management mainly includes the following functions:
� Task management measure
� Service quality monitoring
� Performance analysis
� Report system
Performance management is mainly drove and implemented by
the measure task. When one specified measure task is completed,
the specified data collecting method, store and transmission
method, layout content and handling method of the final perfor-
mance data can be defined.
The data collection and analysis procedure corresponding to the
measure task are as follows:
Flow Description � Log in to the NetNumen N31 network management client end.
� Enter performance management subsystem.
� Establish performance measure task, collect foreground NE
performance data and send them to network management.
� According to the new calculation index that requires to be de-
fined by users, calculate the collected performance data and
get the required performance index.
Note:
If the selected measurement object type is different, the col-
lection granularity that the measurement task supports is dif-
ferent.
Parameter
Parameter Configuration Description
Description
Result The measurement task which has been established can be dis-
played in the Measurement Task Management window on the
right interface. In collection period, the collection data will be re-
ported. If the measurement task is in inconsistent state, synchro-
nization should be implemented. If it is still in inconsistent state,
some task operations will fail.
3. In the Location tab, configure the Start time and End time,
click the OK button to send the command.
Start to recollect the data of the specified task in a period.
Note:
The start time and the end time must be the hour of granularity
and the end time cannot be earlier than the start time.
END OF STEPS
Performance Threshold
Management
Performance Threshold Management
Overview
Description Performance threshold defines what performance data is done
threshold calculated and when they are calculated. If the calcu-
lation result exceeds the preset threshold value, the performance
threshold alarm will generate and be reported to alarm module
for reminding users of paying attention to the abnormal condition
of network operation. In the alarm management of network
management, the performance alarm can be checked. The per-
formance threshold management interface is shown as Figure 5.
End The end time The start time cannot be later than
time of performance the end time. Otherwise the end
threshold task time is not configured successfully.
Note:
Gr in operator selection box is collection granularity.
Various numbers can be used with logic operators to define
index formula.
Caution:
The query result can be displayed according to time, statistics
object and other counter field sorts.
END OF STEPS
2. Select the NE type and MO type that the realtime data query
belongs to, click Select Counter, the system pops up the Se-
lect Counter window.
3. Select the counter that requires realtime query and click OK.
4. Select Collection Granularity, and click Select Location,
the system pops up the Select Location window.
5. Select the NE location where the counter lies and click OK.
6. Click OK, system starts to display the selected counter infor-
mation.
END OF STEPS
Result When realtime query is created, the system will display the per-
formance data by graph and table.
Creating a Template
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� The performance measurement task has been created and the
performance data exists in the network management data-
base.
Context Searching the performance data according to templates is to put
the query condition into the system as the performance data query
template. It is convenient for query at the same condition.
Steps 1. In the network management client end interface, click the Per-
formance > Counter And Index menu item, the Counter
And Index interface appears, click the Template Tree tag.
2. Right-click the Performance Data Query node, pop up the
shortcut menu, click New template.
Pop up the New template dialog box, as shown in Figure 11.
the five file formats including Excel, PDF, HTML, CSV and TXT are
supported.
Steps 1. Search the performance data according to tasks or user defi-
nition, the result is displayed in the Query page.
2. Click the Export button , pop up the Save dialog box.
3. Select Save path, File name and File type, click the Save
button. The performance query result will be exported to the
specified file.
END OF STEPS
Alarm Management
Table of Contents
Alarm Management Overview..............................................29
Alarm Monitoring ...............................................................34
Alarm Information Management ..........................................40
Custom Query...................................................................47
Alarm Rule Management.....................................................49
Alarm Process Suggestion Management ................................57
Alarm Box Management .....................................................59
Alarm Level Redefinition Setting ..........................................62
Alarm Statistic Level ..........................................................63
Timing Statistics Task Management ......................................71
Alarm Management
Overview
Alarm Management Function
Users can monitor and manage the faults in the full network by
alarm management function. Users can monitor and check the
alarm of network in real time and even can filter the unnecessary
alarm according to the specified condition. The alarm can be pre-
sented to network maintenance personnel by sound, light or LCD.
When the alarm appears, users can confirm/anti-confirm alarms,
clear alarms, report alarms to others by E-mail or message and
check the alarm detailed information and related alarms. If users
sum up the alarm process mode and save them to alarm process
suggestion library, when the alarm appears again, users also can
check the corresponding alarm process suggestion to shorten the
time of solution.
Alarm management is used to manage, monitor and report alarms
of the network.
Note:
In the different system types, the same alarm code indicates the
different alarm informations.
Alarm Mask Alarm system does not report the alarm of this device which sup-
ports the mask rule to this system according to the condition that
the service personnel sets.
Alarm Classification
Sort According to � Managed device alarm
System Types
� Alarm box link disconnection alarm
� The alarm of the telecommunication link with the upper net-
work management
� Foreground and background telecommunication link alarm
� Performance QoS alarm
� Performance data collection delay alarm
� Network management system alarm and so on
Sort According to � Telecommunication alarm
Fault Types
� Environment alarm
� Device alarm
� Processing error alarm
� QoS alarm
� Network management system alarm
� Integrity alarm
� Validity alarm
� Physical attack alarm
� Security attack alarm
� Duration alarm
Sort According to � Critical alarm
Alarm Levels
� Important alarm
� Ordinary alarm
� Minor alarm
for a period time. When the fault disappears, the alarm informa-
tion will disappear.
Alarm Monitoring
Alarm Monitoring Policy
Monitoring Users can monitor the operation state of on-site devices in real
Description time by alarm box system. It makes users conveniently remove
faults and hidden troubles.
Monitoring Rule The rule of the alarm monitoring policy is as follows:
� Level 1 and level 2 have more higher level. If the fault is not
processed in time, the result could be serious. Therefore the
alarm must be sent to the alarm box by voice prompt mode
and then sent to the mobile phone.
� For the alarm with lower level, it can be sent to the related
personnel by background monitoring alarm and short message
monitoring alarm. The alarm can remind the faults and hidden
troubles, monitor the performance of the system, analyze rea-
son and process.
Monitoring Policy The policy of the alarm monitoring policy is recommended as fol-
lows:
� Important alarm priority policy
Alarm information includes four levels according to the sever-
ity. The higher the level, the more serious the alarm. When the
alarms with different levels appear, the alarm with the highest
level must be sent first.
� First time policy
The alarm will affect the service. To make the system run
normally as soon as possible and have the least effect on the
service, the alarm must be removed as soon as possible. It
requires that the alarm information should be sent at the first
time. The alarm box sound prompt and mobile phone short
message prompt have the advantage that the time of trans-
mission alarm is short and the alarm can be sent as soon as
possible.
� Multi-person receiving policy
In the alarm server, set that multiple persons can receive the
alarm information. So that it can reduce the possibility that
the fault cannot be processed because the alarm information
cannot be received in time.
� Multi-way policy
If the single alarm way is applied, when this way fails, the alarm
information of the whole system cannot be sent. If multi-way
policy alarm policy is applied, this condition can be avoided.
sonnel can know the operation state of the system when they are
not on site.
END OF STEPS
Alarm Information
Management
Introduction to Alarm Information
Management
The alarm operation is to right-click one piece of alarm information
in the alarm list, operate by shortcut menu and print and export
the alarm information.
The alarm information operation includes confirmation, anti-con-
firmation, clearing, note, forwarding alarm, checking the detailed
information of the alarm, process suggestion, related rules and re-
lated history alarms, creating alarm rules, locating alarms to units,
printing alarms, exporting alarms and synchronizing alarms.
Confirming Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Confirmation is to transform the alarm entry from Unacknowl-
edged to Acknowledged. For the alarm data whose state is not
Anti-confirm Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Guarantee that the alarm information that requires to be anti-
confirmed is queried.
Context Anti-confirmation is to transform a piece of alarm from Acknowl-
edged to Unacknowledged. The alarm information that is anti-
confirmed must be the acknowledged information.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm that is acknowledged, select anti-
confirm, this alarm data turns from Acknowledged to Unac-
knowledged.
END OF STEPS
Clearing Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The function of clearing alarms is to clear the alarm data that the
current alarm monitors in real time from network devices. The
alarm data which is cleared will be displayed in the history alarm
monitor bar. It can be searched in the history alarm.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
Forwarding Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Make sure that the connection between the network manage-
ment server, short message center and the mail server is nor-
mal. The phone number and the mail address that require to
be forwarded have been got.
Context The forwarding alarm is to forward the alarm data to other ad-
ministrators by mail or short message. It makes administrators
process the alarm more conveniently.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm which requires to be forwarded,
select Forward, pop up the Forwarding Setup dialog box,
as shown in Figure 17.
Creating Rules
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context By using the function of creating rules, users can create the alarm
rule by taking the existent alarm data in the alarm list as blueprint.
When the rule is created, the system will initialize the correspond-
ing parameter of created rule by using the attribute value of the
selected alarm.
Postrequisite In the topology interface, select some NE icon, the bar on the
bottom of the topology interface will automatically browse (alarm
state is updated automatically) the active alarm of this NE. In the
alarm browse window which is on the bottom of the topology page,
the selected alarm can be confirmed, anti-confirmed and cleared
by right-click menu.
4. Click the Save button, pop up the message box that the file
export is successful, click the OK button.
END OF STEPS
Synchronizing Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Alarm synchronization is to synchronize NE alarm. Users can select
the NE that requires synchronization.
When users find that the alarm data of network management sys-
tem is different from that of NE, this function can be used to manu-
ally synchronize the alarm data of NE to the network management
server.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Synchronization, pop up the Alarm
Synchronization dialog box.
2. Select the NE that requires to be synchronized, click the OK
button, system synchronizes the alarm data of the specified
NE.
3. When the synchronization is successful, pop up the synchro-
nization command is successfully sent message box, click
the OK button.
END OF STEPS
Custom Query
Querying the Current Alarm
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The current alarm query function supports users to query the cur-
rent alarm according to the specified condition. Users can set the
specified location, time, alarm level, alarm type, state and alarm
reason to query the current alarm data.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the Alarm Monitoring interface, double-click Alarm Query
> Current Alarm > All Current Alarm in the management
Querying Notification
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Notification query function supports users to query according to
the specified condition. Users can set the specified location, time,
reason, description and system type according to requirements
and query the notification according to these conditions.
Global
Alarm con- validation When the alarm meeting the condition
firmation and is reported, the alarm confirmation rule
rule backward will automatically confirm these alarms.
validation
Global
Alarm validation When the alarm meeting the condition
clearing and is reported, the alarm clearing rule will
rule backward automatically clear these alarms.
validation
Global
There is dependent relationship among
Alarm validation
alarms. For example, alarm A depends
suppression and
on B, A can be suppressed by alarm
rule backward
suppression rule and only B is reported.
validation
Alarm Clearing The alarm clearing rule can automatically clear the alarm meeting
Rule the specified condition when the alarm is reported, that is, au-
tomatically add the alarm clearing information, turn the reported
alarm to the history alarm and save it to the history alarm data
table. So that, not only these alarms can be recorded, but also
the number of the alarm can be reduced. It makes maintenance
personnel pay more attention to the key alarms.
For the parameter description of the Alarm Clearing Rule dialog
box, refer to Table 8 and Table 9.
Alarm Filter Rule Alarm filter rule includes the following content.
� Display filter: When the alarm is preprocessed, filter the alarm,
the selected alarm will not be sent to the client end. The client
end which is not sent to includes all users and rule establisher.
It is decided by the rule.
� In-warehouse filter: It is used to filer alarms when they are
collected. The selected alarms are neither imported the data-
base nor displayed on the current alarm real-time monitoring
interface of client end. They are filtered.
For the parameter description of the Alarm Filter Rule dialog box,
refer to Table 8 and Table 9.
Alarm Delay Rule Alarm delay setting allows users to delay some unimportant
alarms. In the specified time, if the alarm is recovered, it will not
be displayed.
For the parameter description of the Alarm Delay Rule dialog
box, refer to Table 8 and Table 9.
Alarm Conflation Alarm conflation setting allows the system to merge the same type
Rule of alarms appear in the specified range. After conflation, when the
multiple pieces of alarms in the same type are reported, only one
will be displayed in the alarm monitoring.
For the parameter description of the Alarm Conflation Rule dia-
log box, refer to Table 8 and Table 9.
Alarm Timing Rule If the time that the current alarm is acknowledged or in activating
state exceeds the specified time that the alarm timing rule defines,
the alarm level will be increased or a new alarm appears.
� For the parameter description of the Basic page of the Alarm
Timing Rule dialog box, refer to Table 8.
Rule action When the time and state are satisfied, system
automatically applies the operation including
level transition or alarm derivative.
Generate new When the timing rule is valid, the new alarm
alarms generates. Set the level of the new alarm
and alarm information.
Alarm Counting Alarm counting setting means when the number of the same alarm
Rule exceeds the threshold in the specified time, one piece of alarm will
generate and be reported.
� For the parameter description of the Basic page of the Alarm
Counting Rule dialog box, refer to Table 8. For the parameter
description of the Condition page, refer to Table 9.
� For the parameter description of the Action page of the Alarm
Counting Rule dialog box, refer to Table 11.
Alarm Forwarding When the alarm is reported, the alarm meeting the condition is
Rule forwarded to the corresponding destination.
� For the parameter description of the Alarm Forwarding Rule
dialog box, refer to Table 8 and Table 9.
� For the parameter description of the Action page of the Alarm
Forwarding Rule dialog box, refer to Table 12.
Alarm Shielding Alarm shielding rule requires the device support. When the device
Rule is supported, the foreground device is demanded to shield some
alarms according to specified condition when it reports alarms.
For the parameter description of the Alarm Shielding Rule dialog
box, refer to Table 8 and Table 9.
Note:
Different devices maybe support different shielding items. When
some NEs are selected, the system will prompt that NE type does
not support shielding.
Notification Filter It means the notification meeting the specified condition is filtered.
Rule The filtered notification will be discarded. It is neither displayed
on the client end interface nor saved in the database.
� For the parameter description of the Basic page of the Noti-
fication Filter Rule dialog box, refer to Table 8.
� For the parameter description of the Condition page of the
Notification Filter Rule dialog box, refer to Table 13.
4. Voice alarm
The voice indicator of the alarm box supports the voice mode
which is recorded in advance besides buzz. The version sets
four wav files related to the level in advance (four Chinese ver-
sions, four English versions). It has fixed name and is played
by alarm box. The switch of two ways can be realized by the
configuration menu on the LCD.
5.
The alarm box supports at most 128 alarm source accesses
(64 TCP alarm sources, 64 UDP alarm sources). There are ten
alarm source indicators on the alarm box panel. When the
number of alarm sources exceeds ten, multiple alarm sources
shares the alarm source indicator.
6. Cross-Vlan alarm source support
The alarm box supports keeping the connection between dif-
ferent VLANs. It guarantees the isolation of each alarm source
and saves the layer 3 switch with more cost at the same time.
7. Query Statistics
The alarm box can display each level alarm statistics condition
of each alarm source. It is displayed on the LCD according to
the specified serial number when the alarm source is config-
ured.
8. Alarm voice control
Set mute level through alarm box. When the mute level is 4,
the alarm of level 1, level 2 and level 3 will have sound. When
the mute level is 3, the alarm of level 1 and level 2 will have
sound. When the mute level is 1, all alarms are mute. When
the mute level is 0, all alarms have sound.
9. Remote operation
Remotely log in to the alarm box by telnet tool. Alarm source
configuration edit, route edit, VLAN edit, short message pa-
rameter configuration and time parameter configuration can
be completed by Man-Machine Language (MML) command.
10. Network storm threshold configuration
When the network broadcast message exceeds the threshold,
the alarm box will have acoustic-optic alarm. This threshold
should be configured. If the threshold is too small, the error
will be reported. If the threshold is too large, the network
storm cannot be detected. The default configuration is 200
packets per second.
11. Other functions
Voice volume control, LCD backlight control, button voice con-
trol and language selection can be configured in the “parameter
configuration” of the alarm box LCD menu.
Result The alarm box turns from the Activated state to the Pause state.
Note:
When the alarm level is redefined, it is displayed according to the
level after redefinition. The alarm ID information is not displayed
according to the level information before redefinition.
Button Description
END OF STEPS
Postrequisite � Double-click Date, query the frequency that the system gen-
erates alarms everyday in one month. They are listed in de-
scending order.
� Double-click Hour, query the frequency that the system gen-
erates alarms every hour in one day. They are listed in de-
scending order.
EMS
- Element Management System
ID
- Identification/Identity/Identifier
IP
- Internet Protocol
KPI
- Key Performance Indicators
QoS
- Quality of Service
TCP
- Transfer Control Protocol
TCP/IP
- Transfer Control Protocol/Internet Protocol
UDP
- User Datagram Protocol
VLAN
- Virtual Local Area Network