0% found this document useful (0 votes)
162 views

NetNumen N31 UNMS (V5.01.01) User Manual Performance

Uploaded by

Nick Name
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views

NetNumen N31 UNMS (V5.01.01) User Manual Performance

Uploaded by

Nick Name
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 87

NetNumen N31 (IP Network)

Unified Network Management System


User Manual (Performance and Alarm)

Version 5.01.01

ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: (86) 755 26771900
Fax: (86) 755 26770801
URL: http://ensupport.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION

Copyright © 2010 ZTE CORPORATION.

The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPO-
RATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations.

All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION
or of their respective owners.

This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are dis-
claimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-in-
fringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the
information contained herein.

ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject
matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee,
the user of this document shall not acquire any license to the subject matter herein.

ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.

Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.

The ultimate right to interpret this product resides in ZTE CORPORATION.

Revision History

Revision No. Revision Date Revision Reason


R1.0 2010–08–18 First edition

Serial Number: SJ-20100817155256-010


Contents

About This Manual............................................. I


Performance Management.................................1
Performance Management ............................................... 1
Performance Management Function Overview ................. 1
Basic Concepts of Performance Management .................. 2
Performance Management Operation Flow...................... 2
Measure Task Management .............................................. 4
Measurement Task Management Overview ..................... 4
Creating the Measurement Task.................................... 5
Activating the Measurement Task.................................. 8
Synchronizing the Measurement Task ............................ 8
Recollecting the Performance Data ................................ 9
Performance Threshold Management ................................10
Performance Threshold Management Overview ..............10
Creating the Performance Threshold ............................11
Activating the Performance Threshold...........................15
Counter Index Management ............................................16
Counter Index Management Overview ..........................16
Creating the Index.....................................................17
Searching the Counter Index.......................................20
Performance Data Query ................................................21
Performance Data Query Overview...............................21
Searching the Performance Data According to
Tasks ...............................................................21
Searching the Performance Data According to User
Definition .........................................................22
Searching the Realtime Performance Data.....................24
Searching Performance Data According to
Templates.........................................................25
Creating a Template ..........................................25
Searching the Performance Data .........................26
Exporting the Data Query Result..................................27

Confidential and Proprietary Information of ZTE CORPORATION I


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Setting the Performance Data Display Mode ..................28


Alarm Management ......................................... 29
Alarm Management Overview ..........................................29
Alarm Management Function .......................................29
Alarm Management Terms ..........................................30
Alarm Management System Structure Description ..........31
Alarm Generation Mechanism ......................................31
Notification Generation Mechanism ..............................32
Alarm Classification ...................................................32
Introdunction to Alarm Message ..................................33
Alarm Information Description ............................33
The Influence of Alarm Information on
Services ...............................................33
The Relation between Faults and Alarm
Information...........................................33
Introduction to Notification Message.............................34
Notification Information Description.....................34
The Effect of Notification Information on
Services ...............................................34
The Relation between Faults and Notification
Information...........................................34
Alarm Monitoring ...........................................................34
Alarm Monitoring Policy ..............................................34
Alarm Monitoring Mode...............................................35
Background Monitoring Alarm......................................36
Alarm Box Monitoring Alarm........................................36
Short Message and Mail Monitoring Alarm .....................36
Monitoring Real-time Alarm.........................................37
Monitoring Real-time Notification .................................38
Monitoring the Alarm Statistics According to NE .............38
Monitoring the Alarm Statistics According to NE
Type ................................................................38
Checking Alarm Box Alarms ........................................39
Alarm Information Management ......................................40
Introduction to Alarm Information Management.............40
Confirming Alarms .....................................................40
Anti-confirm Alarms ...................................................41
Clearing Alarms.........................................................41
Forwarding Alarms.....................................................42
Creating Rules ..........................................................43

II Confidential and Proprietary Information of ZTE CORPORATION


Querying Alarm Information Related Rules ....................44
Checking Detailed Alarm Information ...........................45
Locating the Alarm on Topology View ...........................45
Printing Alarm Information..........................................46
Exporting Alarm Information .......................................46
Synchronizing Alarms.................................................47
Custom Query...............................................................47
Querying the Current Alarm ........................................47
Querying History Alarm ..............................................48
Querying Notification .................................................48
Alarm Rule Management.................................................49
Introduction to Alarm Rule ..........................................49
Introduction to Alarm Rule Operation ...........................51
Creating Alarm Rule ...................................................52
Alarm Rule Parameter Description ................................52
Configuring Alarm Forwarding Template ........................57
Alarm Process Suggestion Management ............................57
Introduction to Alarm Process Suggestion .....................57
Editing Alarm Process Suggestion ................................58
Searching Alarm Process Suggestion ............................59
Alarm Box Management .................................................59
Introduction to Alarm Box...........................................59
Creating Alarm Box....................................................60
Pausing Alarm Box.....................................................61
Alarm Level Redefinition Setting ......................................62
Alarm Level Description ..............................................62
Redefining Alarm Level ...............................................62
Alarm Statistic Level ......................................................63
Creating Alarm Basic Statistic Template ........................63
Creating Alarm Busy Time Statistic Template .................66
Calculating Alarm According to NE ...............................67
Calculating Alarm According to NE Type ........................68
Calculating Alarm According to Alarm Code ...................69
Calculating Alarm According to Time ............................69
Calculating Alarm According to User-defined
Template ..........................................................70
Timing Statistics Task Management ..................................71
Introduction to Timing Statistics Task ...........................71
Creating Timing Statistics Task ....................................71
Figures ............................................................ 75

Confidential and Proprietary Information of ZTE CORPORATION III


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Tables ............................................................. 77
Glossary .......................................................... 79

IV Confidential and Proprietary Information of ZTE CORPORATION


About This Manual

Purpose At first, thank you for choosing NetNumen N31 Unified Manage-
ment System of ZTE Corporation!
NetNumen N31 Unified Management System is the intermediate
system between lower level NE and upper layer operation. It
mainly realizes the centralized topology management, centralized
alarm management, centralized performance management and
centralized report management of lower level NE.
This manual mainly introduces the management measurement
task, management performance threshold, management perfor-
mance data and centralized alarm management of NetNumen
N31 Unified Management System.
Intended This manual is intended for the following engineers:
Audience
� On-site maintenance engineers
� Network monitoring engineers
� System maintenance engineers

What Is in This
Manual Chapter Summary

Chapter 1 Performance Introduces the common concepts


Management of performance management.

Chapter 2 Alarm Management Introduces the alarm-related


operations.

Conventions ZTE documents employ the following typographical conventions.

Typeface Meaning

Italics References to other Manuals and documents.

“Quotes” Links on screens.

Bold Menus, menu options, function names, input fields,


radio button names, check boxes, drop-down lists,
dialog box names, window names.

CAPS Keys on the keyboard and buttons on screens and


company name.

Note: Provides additional information about a certain


topic.

Checkpoint: Indicates that a particular step needs to


be checked before proceeding further.

Tip: Indicates a suggestion or hint to make things


easier or more productive for the reader.

Mouse operation conventions are listed as follows:

Confidential and Proprietary Information of ZTE CORPORATION I


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Typeface Meaning

Click Refers to clicking the primary mouse button (usually the


left mouse button) once.

Double- Refers to quickly clicking the primary mouse button


click (usually the left mouse button) twice.

Right-click Refers to clicking the secondary mouse button (usually


the right mouse button) once.

II Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1

Performance
Management

Table of Contents
Performance Management ................................................... 1
Measure Task Management .................................................. 4
Performance Threshold Management ....................................10
Counter Index Management ................................................16
Performance Data Query ....................................................21

Performance Management
Performance Management Function
Overview
Performance management is to manage the performance of the
network, that is, it guarantees that the network can run effectively,
stably and safely by network running state monitoring. Also it pro-
vides sufficient and complete running operation by the collection
and analysis of network device data, which makes management
personnel work out the suitable running policy according to the
network running state and makes the network run at the most ef-
ficient state.
Performance management mainly includes the following functions:
� Task management measure
� Service quality monitoring
� Performance analysis
� Report system
Performance management is mainly drove and implemented by
the measure task. When one specified measure task is completed,
the specified data collecting method, store and transmission
method, layout content and handling method of the final perfor-
mance data can be defined.
The data collection and analysis procedure corresponding to the
measure task are as follows:

Confidential and Proprietary Information of ZTE CORPORATION 1


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

The operator creates measure tasks on the NetNumen N31 net-


work management client, sets enabling time and collects data from
foreground. When the foreground collects data, it reports them to
EMS for analysis and importing library.
When the data is queried on the client, the measure result is di-
rectly got from the EMS data library and displayed on the client
interface.

Basic Concepts of Performance


Management
Measure Type Measure type is also named as PO (performance object). It is
the basic unit of measure and can realize the measure of differ-
ent indexes of measure object. Also it can select measure type
according to the index requiring measure.
Counter Counter means detailed measure index in measure type. Each
measure type includes some measure indexes.
Calculation Index Calculation index is the index to judge device performance. It
is got by some calculation. The system will set some calculation
indexes in advance according to general applications.
Collection Collection granularity means the period of data collection from
Granularity foreground board. System can set various kinds of collection gran-
ularities, such as 5 minutes, 10 minutes, 15 minutes, 30 minutes
and one hour.

Performance Management Operation


Flow
Flow Graph The flow of performance management subsystem operation is
shown as Figure 1.

2 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

FIGURE 1 OPERATION FLOW

Flow Description � Log in to the NetNumen N31 network management client end.
� Enter performance management subsystem.
� Establish performance measure task, collect foreground NE
performance data and send them to network management.
� According to the new calculation index that requires to be de-
fined by users, calculate the collected performance data and
get the required performance index.

Confidential and Proprietary Information of ZTE CORPORATION 3


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

� When the measure task is established and the index is calcu-


lated, query the NE performance measure data and the corre-
sponding calculation index statistics.
� Set alarm threshold for calculation index or NE performance
measure data. If calculation result exceeds the preset thresh-
old, performance QoS alarm will generate and be reported to
alarm module.

Measure Task Management


Measurement Task Management
Overview
Description The measurement task defines the specified data collecting
method, store and transmission method and layout content and
handling method of final performance, and then collects data
according to specified task scheduling rule and detailed granu-
larity to generate measurement report. The measurement task
management interface is shown as Figure 2.

FIGURE 2 MEASUREMENT TASK MANAGEMENT INTERFACE

Reference Click and select one piece of measurement task in measurement


Information task list, all shortcut buttons in the Measurement Task Manage-
ment window special toolbar turn valid.

4 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Creating the Measurement Task


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
Context This function is to flexibly work out the NE measurement task ac-
cording to users, collect the NE performance data and send the
collected performance data to background network management
by the format of message.
Steps 1. In the NetNumen N31 network management client end
interface, click Performance > Measurement Task Man-
agement, pop up the Measurement Task Management
interface.
2. Click the Create Measurement Task shortcut button in
the Measurement Task Management window, pop up the
Create Measurement Task interface shown as Figure 3.
Select Task type, NE type, MO type and PO.

Confidential and Proprietary Information of ZTE CORPORATION 5


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 3 CREATING MEASUREMENT TASK

3. Click the Location tab, enter the Location interface.


Select the measurement object of the specified NE, if the right
panel turns grey, it means the selected measurement type in
the first step can create tasks without measurement object.
4. Click the Basic Information tab, enter the Basic Informa-
tion interface.
The collection granularity of measurement task has three
types: 5 minutes, 15 minutes and one hour.

Note:
If the selected measurement object type is different, the col-
lection granularity that the measurement task supports is dif-
ferent.

Configure measurement task information, the parameter de-


scription is shown as Table 1.

6 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

TABLE 1 TASK PARAMETER DESCRIPTION

Parameter
Parameter Configuration Description
Description

Task name The name of It should describe


measurement task measurement task clearly
and cannot be same to the
existent task name.

Founder By default, it is the -


current user and
cannot be modified.

Task status Suspension or If suspension, this task is


activation invalid.

Start time The start time of The start time cannot be


measurement task earlier than the system time
of client end, otherwise
the start time fails to be
configured. Also it must be
the hour of granularity.

End time The end time of The start time cannot be


measurement task later than the end time.
Also it must be the hour of
granularity.

Valid date In the valid period Configure the date according


of measurement to week or month, the date
task, the time with color means it can be
of implementing selected.
measurement task
by the cycle of month
or week.

Valid time In the specified The time segment with color


segment running period, test means it can be selected,
by segment. Time click it to select.
segment is a period
of time in one day.

Granularity The collection The collection granularity is


granularity 15 minutes.
configured in
the network
management

5. Click the OK button to complete the establishment.


END OF STEPS

Result The measurement task which has been established can be dis-
played in the Measurement Task Management window on the
right interface. In collection period, the collection data will be re-
ported. If the measurement task is in inconsistent state, synchro-
nization should be implemented. If it is still in inconsistent state,
some task operations will fail.

Confidential and Proprietary Information of ZTE CORPORATION 7


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Activating the Measurement Task


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered performance management sub-
system.
� This operation authority is got.
� The measurement task to be activated has been created.
Context When the running state of measurement task is in suspension
state, if the foreground performance data can be collected accord-
ing to this task rule, the measurement task must be activated in
advance. Only the measurement task is in suspension state, can
it be activated.
When the task is activated, the task information will be synchro-
nized to the foreground NE. The foreground NE transforms the
measurement task information to corresponding NE measure task
for performance database collection. The collected performance
data will be reported to local database for saving by NE.
Steps 1. Open the window of measurement task management.
2. In the measurement task list, right-click the measurement task
in suspension state, pop up shortcut menu, click the menu item
of activating measurement task.
END OF STEPS

Result The task state turns from suspension to activation.

Synchronizing the Measurement


Task
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
Context This function is to synchronize the measurement task and get the
measure task data correctly.
Steps 1. Open the application view of measurement task management.
2. In the application view of measurement task, right-click the
measurement task, pop up the shortcut menu, click the com-
mand of synchronizing measurement task.
END OF STEPS

8 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Result Measurement task synchronization is successful.

Recollecting the Performance Data


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
Context The lost data of some time segment in measurement task statis-
tics procedure can be recollected by the performance data manual
recollection function.
Steps 1. In the NetNumen N31 network management client end, click
Performance > Measurement Task Management, the
Measurement Task Management interface appears.
2. In the Measurement Task Management interface,
right-click the selected measurement task, pop up the short-
cut menu, click Recollect Data, the Recollect Data window
appears, as shown in Figure 4.

FIGURE 4 THE INTERFACE OF RECOLLECTING DATA

Confidential and Proprietary Information of ZTE CORPORATION 9


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

3. In the Location tab, configure the Start time and End time,
click the OK button to send the command.
Start to recollect the data of the specified task in a period.

Note:
The start time and the end time must be the hour of granularity
and the end time cannot be earlier than the start time.

END OF STEPS

Performance Threshold
Management
Performance Threshold Management
Overview
Description Performance threshold defines what performance data is done
threshold calculated and when they are calculated. If the calcu-
lation result exceeds the preset threshold value, the performance
threshold alarm will generate and be reported to alarm module
for reminding users of paying attention to the abnormal condition
of network operation. In the alarm management of network
management, the performance alarm can be checked. The per-
formance threshold management interface is shown as Figure 5.

10 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

FIGURE 5 PERFORMANCE THRESHOLD WINDOW

Creating the Performance Threshold


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
Context Performance threshold is created to monitor the NE measurement
data which is preset time length. When the calculated specified
index is more than or lower than the preset threshold, the alarm
generates.
Steps 1. In the NetNumen N31 network management client end inter-
face, click Performance > Threshold Task Management.
Enter the Threshold Task Management interface.
2. There are two ways to create performance threshold task.
� In the Threshold Task Management window, click the
Create Threshold Task button on the toolbar.
� Layout the NE view node, right-click NE or detailed mea-
surement object type, select the Create Threshold Task
shortcut menu.
Enter the Create Threshold Task interface, as shown in
Figure 6.

Confidential and Proprietary Information of ZTE CORPORATION 11


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 6 CREATING THRESHOLD TASK

The description to parameters of creating threshold task is


shown as Table 2.

TABLE 2 THRESHOLD TASK PARAMETER 1

Param- Parameter Configuration Description


eter Description

Task There are three Full NE task: it includes all


type threshold task measurement object tasks of this
types: ordinary measurement object type. NE and
task, full NE measurement object do not require
task and full to be selected.
measurement Full measurement object task:
object task it includes all measurement
object tasks of the selected NE
in this measurement object type.
Measurement object does not require
to be selected.

NE type The NE type of Select NE type according to the actual


threshold task condition.

Meas- The Different NE types have different


urement measurement measurement objects. The
object object of NE measurement object is selected
type type according to different NE types.

Index The index of Different measurement objects


name measurement have different measurement
object indexes. Configure the threshold of
measurement index.

12 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Param- Parameter Configuration Description


eter Description

Out of Out of It can be alarm information


range range alarm description and handling comments.
alarm additional
addi- information
tional in-
forma-
tion

3. Click Select, select the measurement index of threshold task,


and then click OK.
4. Double-click the selected measurement index, pop up the
Modify Index Threshold dialog box.
Configure four levels of alarm threshold and hysteresis value,
the alarm parameter configuration is shown as Table 3.

TABLE 3 THRESHOLD CONFIGURATION PARAMETER DESCRIPTION

Parameter Parameter De- Configuration


scription Description

Alarm up, down or two-way Up means that the larger


direction the threshold, the more
possibly the alarm can
generate.
Down means that the
smaller the threshold, the
more possibly the alarm
can generate.

Critical When the performance The unit of alarm


alarm index exceeds the threshold value is related
threshold threshold, the to that of measurement
corresponding alarm item.
Important will be reported. When
alarm the performance index
threshold is lower than the
threshold, the alarm
Ordinary of this threshold will
alarm recover. When the
threshold direction is up, the
threshold configuration
Minor alarm should comply with the
threshold following rules:
Minor alarm threshold<
ordinary alarm
threshold-hysteresis
Ordinary alarm
threshold<Important
alarm threshold-
hysteresis
Important alarm
threshold<Critical alarm
threshold-hysteresis

Hysteresis To avoid the threshold It is suggested that


out of range alarm hysteresis is configured.
frequently filters

Confidential and Proprietary Information of ZTE CORPORATION 13


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Parameter Parameter De- Configuration


scription Description
between alarm and If there is no hysteresis,
alarm recovery, the input 0.
hysteresis is set.

Out of Input default alarm -


range alarm process suggestion
additional and give appropriate
information prompts to the alarm
processing personnel

5. Click the OK button, return the Create Threshold Task in-


terface.
6. Click the Location tab, enter the Location interface. The
measurement object which is selected in the left resource
frame will automatically appear in the right measurement
object tree, confirm the measurement object tree.
7. Click the General tab, enter the General interface.
Configure the task basic information, the parameters are de-
scribed as Table 4.

TABLE 4 BASIC INFORMATION DESCRIPTION

Pa- Parameter Configuration Description


rame- Description
ter

Task The name of It should clearly indicate the


name performance performance threshold task and
threshold task cannot be same to the existent
task.

Creator The name of the By default, it is the current user


user who creates and cannot be modified.
the performance
threshold task

Task Suspension or If suspension, this task is invalid.


state activation

Granu- The collection The collection granularity of


larity period of measurement includes three
measurement task types: 5 minute, 10 minutes and
15 minutes.

Start The start time The start time cannot be earlier


time of performance than the system time of client end,
threshold task otherwise the start time fails to be
configured.

End The end time The start time cannot be later than
time of performance the end time. Otherwise the end
threshold task time is not configured successfully.

Valid In the valid period Configure the date according to


date of measurement week or month, the date with color
task, the time means it can be selected.
of implementing

14 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Pa- Parameter Configuration Description


rame- Description
ter
measurement task
by the cycle of
month or week.

Valid In the specified The time segment can be one day


time running period, test or a period time of one day. The
seg- by segment. time segment with color means it
ment can be selected, click it to select.

8. Click the OK button to successfully create the performance


threshold task. Click the Cancel to cancel this task estab-
lishment.
END OF STEPS

Result In the Threshold Task Management window, the established


performance threshold task is displayed. If the monitoring value
exceeds the specified threshold, the alarm of the corresponding
level will generate. Enter the Alarm Management interface, the
alarm out of range in the corresponding office direction can be
checked.

Activating the Performance Threshold


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� Performance threshold has been created.
Context When the running state of performance threshold is in suspension
state, if the foreground performance data can be collected accord-
ing to this task rule, the measurement task must be activated in
advance. Only the performance threshold is in suspension state,
can it be activated.
Steps 1. In the NetNumen N31 network management client end, click
Performance > Threshold Task Management, enter the
Threshold Task Management window.
2. Select the NE in the NE tree node, all performance thresholds
that the NE has created are displayed in the Threshold Task
Management list.
3. There are two ways to activate the performance threshold.
� In the Threshold Task Management list, select the per-
formance threshold, click the Activate Threshold Task
button in the toolbar.

Confidential and Proprietary Information of ZTE CORPORATION 15


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

� In the Threshold Task Management list, right-click the


performance threshold to be activated, select the Activate
Threshold Task shortcut menu.
END OF STEPS

Result The running state of performance threshold is in activated state.

Counter Index Management


Counter Index Management
Overview
Counter index is the basic object of performance threshold (QoS)
task management. The monitored object of QoS task is specific
counter index. One counter index mainly includes index name,
formula and type information. The counter index management
interface is shown as Figure 7.

FIGURE 7 COUNTER AND INDEX MANAGEMENT INTERFACE

16 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Creating the Index


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
Context Users can define the new counter index according to actual re-
quirements before creating the performance threshold task. It is
used to configure task alarm threshold.
Steps 1. In the network management client end interface, click Perfor-
mance > Counter And Index, Counter And Index appears.
2. In resource type tree, layout the NE node which requires cre-
ating the index.
The index type includes performance counter (SPI index), or-
dinary performance index (PI indexand key performance index
(KPI index).
Click the index type to be created, the Create Index shortcut
key turns valid.
3. In toolbar, click the Create Index shortcut button, pop up
Create Index, as shown in Figure 8.

Confidential and Proprietary Information of ZTE CORPORATION 17


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 8 CREATING AN INDEX

For parameters in Basic Information, refer to Table 5.

TABLE 5 BASIC INFORMATION-PARAMETER DESCRIPTION

Pa- Parameter Configuration Description


rame- Description
ter

Index The name of It cannot be same to the existent


name counter index index name.

Index It changes � Statistic performance index


value according to includes logic statistic type
type different index
types. � Ordinary performance index
includes integer value, float
point type and percent type.
� Key performance index includes
integer value, float point type,
percent type and Boolean logic
mode.

NE The NE type of the Select the NE type according to the


type index actual condition.

18 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Pa- Parameter Configuration Description


rame- Description
ter

Meas- The measurement Different NE types have different


ure- object of NE type measurement objects. The
ment measurement object is selected
object according to different NE types.
type

Alarm up, down Up means that the larger the


direc- threshold, the more possibly the
tion alarm can generate.
Down means that the smaller the
threshold, the more possibly the
alarm can generate.

Crit- When the The unit of alarm threshold value


ical performance is related to that of measurement
alarm index exceeds item.
thres- the threshold,
hold the corresponding
alarm will be
Impor- reported. When
tant the performance
alarm index is lower
thres- than the threshold,
hold the alarm of this
threshold will
Ordi- recover. When
nary the direction is
alarm up, the threshold
thres- configuration
hold should comply with
the following rules:
Minor Minor alarm
alarm threshold<
thres- ordinary alarm
hold threshold-
hysteresis
Ordinary alarm
threshold<Impor-
tant alarm thresh-
old-hysteresis
Important alarm
threshold<Critical
alarm threshold-
hysteresis

Hyste- To avoid the It is suggested that hysteresis


resis threshold out is configured. If there is no
of range alarm hysteresis, input 0.
frequently filters
between alarm and
alarm recovery, the
hysteresis is set.

4. Input the Index Formula tab, edit the formula according to


counter and operator

Confidential and Proprietary Information of ZTE CORPORATION 19


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Note:
Gr in operator selection box is collection granularity.
Various numbers can be used with logic operators to define
index formula.

5. When the formula is edited, click the OK button, the system


will check the validation of the formula. If the formula does
not comply with the specification, the error prompt will be dis-
played at the top of the window. If the formula is correct, add
the counter index which is newly created into the counter in-
dex list. In the procedure of creating counter index, click the
Cancel button to cancel the operation of creation.
END OF STEPS

Searching the Counter Index


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority is got.
� The counter index to be searched has been created.
Context The procedure of searching the counter index is to search the
counter index by text filter mode.
Steps 1. In the network management client end interface, click Perfor-
mance > Counter And Index, Counter And Index appears.
2. In the resource type tree, layout the specified NE, select the
index type requiring to be searched such as statistic perfor-
mance index.

3. Click the Search button , pop up the Search interface.


4. Input the name of index, click the OK button.
END OF STEPS

20 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

Performance Data Query


Performance Data Query Overview
Performance data query is used to search the performance data of
the measurement task collection according to the specified condi-
tion and provide foreground data real-time search. Also it supports
opening multiple data query windows at the same time.
The performance data query has the following three types:
� Search the performance data according to tasks
� Search the performance data according to user definitions
� Search the performance data according to templates

Searching the Performance Data


According to Tasks
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� The performance measurement task has been created and the
performance data exists in the network management data-
base.
Context According to the customized measurement task, collect the per-
formance data from foreground and save them to the database of
network management. The procedure of searching performance
data is to search the performance statistics data which has been
imported to the library from the database of network management
according to the task setting condition.
Steps 1. In the network management client end interface, click the Per-
formance > Measurement Task Management menu item,
Measurement Task Management appears.
2. Right-click the measurement task in the Measurement Task
Management list, pop up the shortcut menu, click the menu
command of searching data according to tasks.
3. Pop up the Raw Data Query dialog box. Click the OK button,
the interface displays the query data in detail.

Confidential and Proprietary Information of ZTE CORPORATION 21


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Caution:
The query result can be displayed according to time, statistics
object and other counter field sorts.

END OF STEPS

Result The query result is displayed by the format of table.

Searching the Performance Data


According to User Definition
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� The performance measurement task has been created and the
performance data exists in the network management data-
base.
Context The procedure of searching performance data according to user
definition is to flexibly search the performance data collected by
measurement task according to the conditions defined by users.
Steps 1. In the network management client end interface, select the
Performance > Raw Data Query menu item.
Pop up the Raw Data Query dialog box, as shown in Figure 9.

22 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

FIGURE 9 RAW DATA QUERY

2. In the Indices Section tab, select the measurement index


according to NE type and MO type.
3. Select the Object Selection tab, select the specified NE as the
measurement object. The location of measurement object tree
will display the measurement objects of all NEs. For example,
if the measurement object is selected as interface, all interface
names of current NE will be listed in the measurement object
tree for selection.
4. Select the Time Selection tab, configure Query Granular-
ity, Query Time Segment, Valid Date and Valid Time Seg-
ment.
5. Click the OK button to complete the performance data query
according to the user definition.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION 23


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Searching the Realtime Performance


Data
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
Context Realtime performance data query can display the performance
data by graph and table according to the user requirements.
Steps 1. In the network management client end interface, select the
Performance > Create Realtime Data Query menu item.
Pop up the Creating Realtime Data Query dialog box, as
shown in Figure 10.

FIGURE 10 CREATING REALTIME DATA QUERY

24 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

2. Select the NE type and MO type that the realtime data query
belongs to, click Select Counter, the system pops up the Se-
lect Counter window.
3. Select the counter that requires realtime query and click OK.
4. Select Collection Granularity, and click Select Location,
the system pops up the Select Location window.
5. Select the NE location where the counter lies and click OK.
6. Click OK, system starts to display the selected counter infor-
mation.
END OF STEPS

Result When realtime query is created, the system will display the per-
formance data by graph and table.

Searching Performance Data


According to Templates

Creating a Template
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� The performance measurement task has been created and the
performance data exists in the network management data-
base.
Context Searching the performance data according to templates is to put
the query condition into the system as the performance data query
template. It is convenient for query at the same condition.
Steps 1. In the network management client end interface, click the Per-
formance > Counter And Index menu item, the Counter
And Index interface appears, click the Template Tree tag.
2. Right-click the Performance Data Query node, pop up the
shortcut menu, click New template.
Pop up the New template dialog box, as shown in Figure 11.

Confidential and Proprietary Information of ZTE CORPORATION 25


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 11 CREATING A TEMPLATE

Configure Name and Operation Mode.


3. Click the OK button, pop up the Performance Data Query
interface.
4. Configure Indices Section, Object Selection and Time Se-
lection.
The operation method refers to “Searching Performance Data
According to User Definition”.
5. Click the OK button to complete the template creation.
The created template is displayed in the template tree.
END OF STEPS

Searching the Performance Data


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
Context Template tree saves the previous query condition of the perfor-
mance data. The performance data can be got by query.
Steps 1. In the network management client end interface, select the
Performance > Counter And Index menu item.
The Counter And Index interface appears.
2. In the main interface, select the Template Tree tab.
3. Right-click the corresponding template in the template tree,
pop up the shortcut menu, click the Implement button.
Pop up the Raw Data Query dialog box, as shown in Figure
12.

26 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 1 Performance Management

FIGURE 12 IMPLEMENTATION TEMPLATE

4. Click the OK button to complete the performance data query


according to the template.
END OF STEPS

Result The performance data complying with query condition is displayed.

Exporting the Data Query Result


Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority has been got.
� The performance data query has been completed.
Context After the data is queried, save the performance statistics data
which is queried as file format for the later check. At present,

Confidential and Proprietary Information of ZTE CORPORATION 27


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

the five file formats including Excel, PDF, HTML, CSV and TXT are
supported.
Steps 1. Search the performance data according to tasks or user defi-
nition, the result is displayed in the Query page.
2. Click the Export button , pop up the Save dialog box.
3. Select Save path, File name and File type, click the Save
button. The performance query result will be exported to the
specified file.
END OF STEPS

Setting the Performance Data Display


Mode
Prerequisites � The connection between the foreground device and the back-
ground network management server is normal.
� Users have logged in to the NetNumen N31 network manage-
ment client end and entered the performance management
subsystem.
� This operation authority has been got.
� The performance data query has been completed.
Context After the performance data is queried, configure the performance
data as graph mode in the Performance Management interface.
Steps 1. When the performance data is queried, click the Transform
the data to the graph mode button . Pop up the Graph
Configuration dialog box.
2. When Query Object and Query Index are configured, click
the OK button, the performance data is displayed as graph
mode.
END OF STEPS

Postrequisite Click in the toolbar to save the graph as PNG file.

28 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2

Alarm Management

Table of Contents
Alarm Management Overview..............................................29
Alarm Monitoring ...............................................................34
Alarm Information Management ..........................................40
Custom Query...................................................................47
Alarm Rule Management.....................................................49
Alarm Process Suggestion Management ................................57
Alarm Box Management .....................................................59
Alarm Level Redefinition Setting ..........................................62
Alarm Statistic Level ..........................................................63
Timing Statistics Task Management ......................................71

Alarm Management
Overview
Alarm Management Function
Users can monitor and manage the faults in the full network by
alarm management function. Users can monitor and check the
alarm of network in real time and even can filter the unnecessary
alarm according to the specified condition. The alarm can be pre-
sented to network maintenance personnel by sound, light or LCD.
When the alarm appears, users can confirm/anti-confirm alarms,
clear alarms, report alarms to others by E-mail or message and
check the alarm detailed information and related alarms. If users
sum up the alarm process mode and save them to alarm process
suggestion library, when the alarm appears again, users also can
check the corresponding alarm process suggestion to shorten the
time of solution.
Alarm management is used to manage, monitor and report alarms
of the network.

Confidential and Proprietary Information of ZTE CORPORATION 29


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Alarm Management Terms


Alarm Alarm is various faults or prompt messages in the system oper-
ation. Operation and maintenance personnel can do the corre-
sponding operation according to the detailed condition.
Current Alarm The alarm appears in the current system.
History Alarm The abnormal information that recovered or did not recover and
appeared in this system.
The non-recovery condition includes user manual clearing, rule
clearing or clearing after NE deletion.
Alarm Type The abnormal type related to the alarm includes:
� Telecommunication alarm
� Environment alarm
� Device alarm
� Processing error alarm
� QoS alarm
� Network management system alarm
� Integrity alarm
� Validity alarm
� Physical attack alarm
� Security attack alarm
� Duration alarm
Alarm Recovery When the alarm is cleared, the system recovers to normal state
and generates alarm recovery notification message.
Alarm Manage- Alarm management realizes the integrated monitor of whole NE
ment System integrated management system operation state and collect the ab-
normal information of each part in real time.
Notification System informs the operation and maintenance personnel of the
information requiring to be noted.
Alarm Code In the same alarm system type, the serial number that identifies
the alarm information.

Note:
In the different system types, the same alarm code indicates the
different alarm informations.

Alarm Mask Alarm system does not report the alarm of this device which sup-
ports the mask rule to this system according to the condition that
the service personnel sets.

30 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Alarm Management System Structure


Description
Purpose The alarm management system is the system maintenance tool in
operation maintenance system. It is used to implement the cen-
tralized monitor of the whole NE centralized management system
running state and collect the abnormal information of each single
board, link, database and server in real time.
Function When the fault appears, the alarm management system can cor-
rectly display the fault information in time and help the adminis-
trator locate and remove the fault to guarantee the stable running
of the system. Also it can provide correct, timely and necessary
alarm data for carriers, network management departments and
device manufacturers.
Structure The composition of alarm system is shown as Figure 13.

FIGURE 13 ALARM SYSTEM COMPOSITION

The unified network management system and the alarm box


mainly have the following functions:
1. The unified network management system connects the alarm
box, the alarm message is transmitted to the alarm box by
TCP/IP or UDP. The alarm short message is sent to the speci-
fied number through the mobile phone module. The alarm box
displays the alarm statistics information on the LCD and has
alarm light and alarm voice for prompt.
2. The alarm level of the alarm message and the mobile phone
number to send the message in the alarm box can be set by
the unified network management system.

Alarm Generation Mechanism


Alarm mechanism is to monitor the running state of the whole NE
management system and display the abnormal alarm information
of the server in real time.
When the system has faults, service process can detect the default
and send the message to the alarm box. The message will be

Confidential and Proprietary Information of ZTE CORPORATION 31


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

transformed to short message which will be sent to a series of


specified mobile phone users.

Notification Generation Mechanism


The notification information often appears in the routine operation
to remind maintenance personnel of paying attention to the oper-
ation state of the system.
When there is an event in the system, the notification will gener-
ate, but there is no potential dangers. The notification information
will not recover in the following procedure.
The maintenance personnel can grasp the running states of each
part.

Alarm Classification
Sort According to � Managed device alarm
System Types
� Alarm box link disconnection alarm
� The alarm of the telecommunication link with the upper net-
work management
� Foreground and background telecommunication link alarm
� Performance QoS alarm
� Performance data collection delay alarm
� Network management system alarm and so on
Sort According to � Telecommunication alarm
Fault Types
� Environment alarm
� Device alarm
� Processing error alarm
� QoS alarm
� Network management system alarm
� Integrity alarm
� Validity alarm
� Physical attack alarm
� Security attack alarm
� Duration alarm
Sort According to � Critical alarm
Alarm Levels
� Important alarm
� Ordinary alarm
� Minor alarm

32 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Introdunction to Alarm Message

Alarm Information Description


Description When the fault appears in the system, alarm management system
can correctly show fault information to the administrator in time.
It helps the administrator locate and remove the fault to guarantee
the stable operation of the system.
Alarm Level Alarm information includes four levels according to the severity:
� 1 level: Critical
� 2 level: Important
� 3 level: Ordinary
� 4 level: Minor
Relation The alarm information is the prompt message when the fault ap-
pears in the system operation procedure. When the fault disap-
pears, alarm recovers to normal, alarm message disappears from
the current alarm message and enters the history alarm list.
Process measures For alarms of different levels, the process measures is as follows:
� When the alarm information of level 1 and level 2 appear, gen-
erally, users should immediately notify ZTE local office and
process the problem under the instruction of ZTE engineers.
� When the alarm information of level 3 and level 4 appear,
equipment room maintenance personnel can process accord-
ing to the related process method of this topic after recording
the problem and the fault phenomenon. If the fault cannot be
processed, users should notice ZTE local office.

The Influence of Alarm Information on Services


The alarm system monitors the operation state of whole NE man-
agement system. When some part of NE management system has
abnormal condition, system will report the alarm.
The alarm message level indicates the severity of the alarm. The
alarm information is the prompt message when the operation pro-
cedure of NE management system has faults and It will be showed
through network management client end.
After the fault disappears, the alarm recovers normal, alarm in-
formation will disappear from the current alarm information and
enter the history alarm list.

The Relation between Faults and Alarm


Information
The alarm information is the prompt message when the fault ap-
pears in the system operation procedure. It will be showed on the
network management client end. The alarm information will last

Confidential and Proprietary Information of ZTE CORPORATION 33


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

for a period time. When the fault disappears, the alarm informa-
tion will disappear.

Introduction to Notification Message

Notification Information Description


The notification information often appears in the system routine
operation. It is used to remind the maintenance personnel of pay-
ing attention to the system operation state information. The no-
tification information means the unrepeatable or instant condition
in the operation of the system. The maintenance personnel can
grasp the operation state of each part in the system.

The Effect of Notification Information on Services


In general, the notification information is the prompt information
of some systems and does not affect the service. But the notifi-
cation information appears in some specified conditions will affect
the service.

The Relation between Faults and Notification


Information
The notification information means the operation or abnormal in-
formation appeared in the operation of the system. In the most
cases, the notification information does not affect the service. But
faults do not affect the system and service and require to be pro-
cessed.

Alarm Monitoring
Alarm Monitoring Policy
Monitoring Users can monitor the operation state of on-site devices in real
Description time by alarm box system. It makes users conveniently remove
faults and hidden troubles.
Monitoring Rule The rule of the alarm monitoring policy is as follows:
� Level 1 and level 2 have more higher level. If the fault is not
processed in time, the result could be serious. Therefore the
alarm must be sent to the alarm box by voice prompt mode
and then sent to the mobile phone.

34 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

� For the alarm with lower level, it can be sent to the related
personnel by background monitoring alarm and short message
monitoring alarm. The alarm can remind the faults and hidden
troubles, monitor the performance of the system, analyze rea-
son and process.
Monitoring Policy The policy of the alarm monitoring policy is recommended as fol-
lows:
� Important alarm priority policy
Alarm information includes four levels according to the sever-
ity. The higher the level, the more serious the alarm. When the
alarms with different levels appear, the alarm with the highest
level must be sent first.
� First time policy
The alarm will affect the service. To make the system run
normally as soon as possible and have the least effect on the
service, the alarm must be removed as soon as possible. It
requires that the alarm information should be sent at the first
time. The alarm box sound prompt and mobile phone short
message prompt have the advantage that the time of trans-
mission alarm is short and the alarm can be sent as soon as
possible.
� Multi-person receiving policy
In the alarm server, set that multiple persons can receive the
alarm information. So that it can reduce the possibility that
the fault cannot be processed because the alarm information
cannot be received in time.
� Multi-way policy
If the single alarm way is applied, when this way fails, the alarm
information of the whole system cannot be sent. If multi-way
policy alarm policy is applied, this condition can be avoided.

Alarm Monitoring Mode


Monitoring Mode The alarm report includes the three modes:
� Background monitoring alarm
� Alarm box monitoring alarm
� Short message and mail monitoring alarm
The Relation Background monitoring alarm, alarm box monitoring alarm and
among Monitoring short message and mail monitoring alarm can realize the monitor
Modes of the alarm. Apart from background monitoring alarm and mail
monitoring alarm, other alarms must be transmitted through the
alarm box. Background monitoring alarm can both monitor the
alarm and query the performance of the system at the same time.
Other two monitoring modes only can query the alarm information.

Confidential and Proprietary Information of ZTE CORPORATION 35


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Background Monitoring Alarm


Purpose The alarm system monitors the whole NE centralized management
system in real time. When there are faults in the specified part of
the NE centralized management system, the alarm service process
of the NE centralized management system will send the message
to the server and generates alarms or alarm information.
Function By background monitoring alarm, the performance statistics and
alarm information can be checked and the alarm can be analyzed .
Query Method Log in to the network management system, query the alarm in-
formation on the alarm management main interface.

Alarm Box Monitoring Alarm


Purpose The alarm box is the tool which can most visually and quickly re-
flect the fault information in the alarm monitoring system.
Function The alarm box connects the alarm management subsystem of the
NetNumen N31 network management server. The alarm message
is sent to the alarm box through TCP/IP. The alarm box displays the
alarm on the LCD and has alarm light and alarm voice for prompt.
The alarm box is used to collect the alarm information of devices,
alarm recovery information and send the information to the alarm
center. In the end, the alarm center analyzes the information.
There are threes ways to inform the related personnel:
� Mobile phone short message
� Mail
� Alarm box acoustic-optic information
Query Mode The query method of the alarm box alarm monitor is as follows:
� The LCD can display the detailed alarm information and turn
pages by the keyboard.
� The alarm box can prompt the current alarm by voice. Also it
can select the horn ring mode for alarm.

Short Message and Mail Monitoring


Alarm
Description The mobile phone numbers and mail addresses of users are con-
figured in the alarm forwarding template. All alarms are sent to a
series of phone numbers and mail addresses which maybe include
the maintenance personnel or carrier maintenance personnel of
ZTE local office.
Function By the short message and mail monitoring alarm, alarm manage-
ments can send the alarm or alarm message to the specified per-
sonnel. The maintenance personnel or carrier maintenance per-

36 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

sonnel can know the operation state of the system when they are
not on site.

Monitoring Real-time Alarm


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The alarm real-time monitor is responsible for monitoring the cur-
rent alarms and the history alarms. The current alarm real-time
monitor can get the alarm information of devices and networks.
The history alarm real-time monitor reflects the alarm condition
which is processed and recovered in the system.
Steps � In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface, as shown in Figure 14.

FIGURE 14 ALARM REAL-TIME MONITORING INTERFACE

END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION 37


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Monitoring Real-time Notification


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Monitor the notification of the system. It makes users know the
operation of the network in real time. The notification real-time
monitor reflects the problems appeared in the operation of the
device.
Steps � In the NetNumen N31 network management main interface,
select Alarm > Notification Monitoring, enter the Notifica-
tion Monitoring interface.
� The notification monitor list is displayed in the interface. It
includes generation time and notification code.
END OF STEPS

Monitoring the Alarm Statistics


According to NE
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context According to the lower-level NE type of EMS access, list the alarm
information of each level.
Steps � In the NetNumen N31 network management main interface,
select Alarm > Monitor Alarms by NE, enter the Monitor
Alarms by NE interface.
� The statistics result includes critical, important, ordinary and
minor according to the different alarms.
END OF STEPS

Monitoring the Alarm Statistics


According to NE Type
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context According to the lower-level NE type of EMS access, list the alarm
information of each level.

38 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Steps � In the NetNumen N31 network management main interface,


select Alarm > Monitor Alarms by NE Type, enter the Mon-
itor Alarms by NE Type interface.
� The statistics result includes critical, important, ordinary and
minor according to the different alarms.
END OF STEPS

Checking Alarm Box Alarms


Prerequisites � The database works normally.
� The operation authority has been got.
� The alarm box works normally, such as normal power-on, the
normal communication with servers.
Context The operation state of the system can be clearly known by alarm
box check alarms.
Steps 1. Check if the alarm sound and the alarm light appear in the
alarm box. If they appear, the alarm should exist.
2. In the initialization interface, press the FUN button, enter the
alarm box main interface, as shown in Figure 15.

FIGURE 15 ALARM BOX MAIN INTERFACE

3. Press , enter the function selection menu, as shown in Figure


16.

Confidential and Proprietary Information of ZTE CORPORATION 39


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 16 FUNCTION SELECTION MENU

4. Select the Alarm Query by up and down keys, click the OK


button, enter the interface of alarm query.
5. When the alarm is queried, the latest alarm will be displayed
first, other alarms can be searched by up and down keys.
END OF STEPS

Alarm Information
Management
Introduction to Alarm Information
Management
The alarm operation is to right-click one piece of alarm information
in the alarm list, operate by shortcut menu and print and export
the alarm information.
The alarm information operation includes confirmation, anti-con-
firmation, clearing, note, forwarding alarm, checking the detailed
information of the alarm, process suggestion, related rules and re-
lated history alarms, creating alarm rules, locating alarms to units,
printing alarms, exporting alarms and synchronizing alarms.

Confirming Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Confirmation is to transform the alarm entry from Unacknowl-
edged to Acknowledged. For the alarm data whose state is not

40 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

confirmed, this function can be used for confirmation. It indicates


that the maintenance personnel knows the alarm that the system
prompts and starts doing the corresponding operation.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click one piece of alarm that is not acknowledged, select
OK. The system will record the time that the confirmation hap-
pens, identifier and acknowledged information.
END OF STEPS

Result This alarm state turns from Unacknowledged to Acknowl-


edged.

Anti-confirm Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Guarantee that the alarm information that requires to be anti-
confirmed is queried.
Context Anti-confirmation is to transform a piece of alarm from Acknowl-
edged to Unacknowledged. The alarm information that is anti-
confirmed must be the acknowledged information.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm that is acknowledged, select anti-
confirm, this alarm data turns from Acknowledged to Unac-
knowledged.
END OF STEPS

Clearing Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The function of clearing alarms is to clear the alarm data that the
current alarm monitors in real time from network devices. The
alarm data which is cleared will be displayed in the history alarm
monitor bar. It can be searched in the history alarm.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.

Confidential and Proprietary Information of ZTE CORPORATION 41


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

2. Right-click a piece of alarm which requires to be cleared, select


Clear, pop up the confirmation dialog box.
3. Click the OK button, the alarm is cleared.
In the history alarm, the alarm which is cleared can be queried.
END OF STEPS

Forwarding Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Make sure that the connection between the network manage-
ment server, short message center and the mail server is nor-
mal. The phone number and the mail address that require to
be forwarded have been got.
Context The forwarding alarm is to forward the alarm data to other ad-
ministrators by mail or short message. It makes administrators
process the alarm more conveniently.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm which requires to be forwarded,
select Forward, pop up the Forwarding Setup dialog box,
as shown in Figure 17.

42 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

FIGURE 17 FORWARDING SETUP INTERFACE

3. Enter mail, phone of alarm processing personnel, mail title and


mail content.
4. Click the Forward by SMS tab, enter SMS Content.
5. Click the OK button, this alarm is forwarded to the specified
personnel.
END OF STEPS

Creating Rules
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context By using the function of creating rules, users can create the alarm
rule by taking the existent alarm data in the alarm list as blueprint.
When the rule is created, the system will initialize the correspond-
ing parameter of created rule by using the attribute value of the
selected alarm.

Confidential and Proprietary Information of ZTE CORPORATION 43


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Steps 1. In the NetNumen N31 network management main interface,


select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm which is taken as blueprint, select
Create Rule.
3. Select the corresponding alarm rule, set the corresponding pa-
rameter in the pop-up alarm rule configuration interface.
END OF STEPS

Querying Alarm Information Related


Rules
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context By using the function of related rules, user can query the rule
related to one piece of alarm in the alarm list. This alarm meets
the condition of related rules, that is, these rules maybe affect this
alarm.
Please note that this related rule which is queried maybe affect
this alarm but might not always affect this alarm.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click the alarm information, select the rule related to this
alarm, pop up the dialog box of the rule which might affect the
alarm.
For the alarm rule related operation, refer to Table 6.

TABLE 6 ALARM RULE OPERATION

Button Name Operation Description

Modify Modify the alarm related rule which has been


created

Delete Delete the alarm related rule

Activate Activate the alarm related rule

Pause Pause the alarm related rule

44 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

3. When the checking is completed, click the Close button.


END OF STEPS

Checking Detailed Alarm Information


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Users can locate and process the fault as soon as possible by
checking the detailed alarm information and referring to related
processing suggestions.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm data which requires to check de-
tailed information, select Detailed Information, pop up the
Detailed Information page. Users can check the detailed
alarm information and processing suggestions.
3. Click the Close button to finish the checking.
END OF STEPS

Locating the Alarm on Topology View


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Enter the topology view and select the icon of the NE that the
alarm appears by the function of locating on NE.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. Right-click a piece of alarm data, select Locate on NE, enter
the Topology Management window. The icon of the NE that
the alarm appears in the topology figure is selected.
END OF STEPS

Postrequisite In the topology interface, select some NE icon, the bar on the
bottom of the topology interface will automatically browse (alarm
state is updated automatically) the active alarm of this NE. In the
alarm browse window which is on the bottom of the topology page,
the selected alarm can be confirmed, anti-confirmed and cleared
by right-click menu.

Confidential and Proprietary Information of ZTE CORPORATION 45


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Printing Alarm Information


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Make sure that the connection and configuration of print are
correct.
Context The print function is to print the alarm data in the alarm interface
that the current user opens. During the print, the print range, the
number of copies, paper, layout and appearance can be configured,
which makes print effect meet the requirement.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the Alarm Monitoring interface, click the Print button ,
pop up the Print Configuration dialog box, set in the Routine
tab.
3. Select the Page Configuration tab, configure page parame-
ters.
4. Select the Advanced tab, configure the parameters according
to the requirements.
5. When the configuration is completed, click the Print button,
start to print the data of the alarm list. Click the All Preview
to preview the print effect.
END OF STEPS

Exporting Alarm Information


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Make sure that the alarm information that requires the export
operation is queried.
Context The export function can export all alarm data of the alarm interface
that the current users open, export and save to the file. The export
function can provide text file, EXCEL file, PDF file, xml file, the text
file with Tab character segmentation, HTML file and the file with
CSV format.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the Alarm Monitoring interface, click the Export button
, pop up the Save dialog box.
3. Set Save Location, File Name and File Type.

46 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

4. Click the Save button, pop up the message box that the file
export is successful, click the OK button.
END OF STEPS

Synchronizing Alarms
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Alarm synchronization is to synchronize NE alarm. Users can select
the NE that requires synchronization.
When users find that the alarm data of network management sys-
tem is different from that of NE, this function can be used to manu-
ally synchronize the alarm data of NE to the network management
server.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Synchronization, pop up the Alarm
Synchronization dialog box.
2. Select the NE that requires to be synchronized, click the OK
button, system synchronizes the alarm data of the specified
NE.
3. When the synchronization is successful, pop up the synchro-
nization command is successfully sent message box, click
the OK button.
END OF STEPS

Custom Query
Querying the Current Alarm
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The current alarm query function supports users to query the cur-
rent alarm according to the specified condition. Users can set the
specified location, time, alarm level, alarm type, state and alarm
reason to query the current alarm data.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the Alarm Monitoring interface, double-click Alarm Query
> Current Alarm > All Current Alarm in the management

Confidential and Proprietary Information of ZTE CORPORATION 47


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

tree, the current all alarm information is displayed on the right


of the interface.
3. Right-click Alarm Query > Custom Query, select Create the
current alarm query, pop up the current alarm query inter-
face.
4. Set the query condition according to requirements, click the
OK button, the system will display the current alarm meeting
the query condition in the Current alarm query window.
END OF STEPS

Querying History Alarm


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The history alarm query function supports users to query the his-
tory alarm according to the specified condition. Users can set the
specified location, time, alarm level type state and alarm reason
according to requirements and query the history alarm data ac-
cording to these conditions.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the management tree of Alarm Monitoring view, dou-
ble-clickAlarm Query > History Alarm > The history alarm
recovers in one day, all history alarms that recover in one
day will be displayed on the right of the interface. Also Net-
Numen N31 provides the check function of history alarm infor-
mation that recover in three days.
3. Right-click Alarm Query > Custom Query, select Query his-
tory alarm, pop up the Query history alarm interface.
4. Set the query condition according to requirements. Click the
OK button, the system will display the history alarm in the
History alarm query window.
END OF STEPS

Querying Notification
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Notification query function supports users to query according to
the specified condition. Users can set the specified location, time,
reason, description and system type according to requirements
and query the notification according to these conditions.

48 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Steps 1. In the NetNumen N31 network management main interface,


select Alarm > Alarm Monitoring, enter the Alarm Moni-
toring interface.
2. In the management tree of Alarm Monitoring view, double-
click Notification > The notification in one day, query the
notification in one day.
3. Right-click Alarm Query > Custom Query, select Create
Notification Query, pop up the Create Notification Query
interface.
4. Set the query condition according to requirements. Click the
OK button, the system will display the notification information
meeting the query condition in the Notification Query win-
dow.
END OF STEPS

Alarm Rule Management


Introduction to Alarm Rule
Alarm management function has many rules that users define.
Many alarm operations and processes are implemented accord-
ing to the rule. Alarm rule management sub-module provides the
function of adding, deleting, modifying, refreshing, activating and
pause for users.
Introduction to The rule configuration can include many rules. Different rules has
Valid Range different effect ranges. It is called rule valid range. The valid range
of each rule has four types.
� Global validation: Once one alarm rule is configured and ac-
tivated, it is valid for all alarms and notifications meeting this
rule and is not related to who makes this rule. The alarm that
all users saw is processed by this rule.
� User validation: Once one alarm rule is configured and acti-
vated, this rule is only valid for the user who makes this rule
(such as user filter rule), other users do not feel the effect of
this rule.
� Forward validation: Once one alarm rule is configured and ac-
tivated, this rule is valid for all current alarms (The alarm that
has been reported and will be reported).
� Backward validation: Once one alarm rule is configured and
activated, this rule is only valid for the alarm that will be re-
ported and is not valid for the one that has been reported.
Alarm Rule For alarm rule name, each valid range and function description,
Function refer to Table 7

Confidential and Proprietary Information of ZTE CORPORATION 49


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

TABLE 7 ALARM RULE

Rule Name Valid Range Function Description

Global
Alarm con- validation When the alarm meeting the condition
firmation and is reported, the alarm confirmation rule
rule backward will automatically confirm these alarms.
validation

Global
Alarm validation When the alarm meeting the condition
clearing and is reported, the alarm clearing rule will
rule backward automatically clear these alarms.
validation

Filter the alarm meeting the specified


condition. The filtered alarm will not
Global
be displayed in the client end interface.
Alarm filter validation
If the alarm not only meets the
rule and forward
in-warehouse rule but also meets display
validation
filter rule, it will be directly filtered by
in-warehouse filter rule.

Alarm delay rule is used to process


Global the instantaneous alarm. If the alarm
Alarm delay validation meeting the condition is reported and
rule and forward recovered during the delay time, this
validation alarm will be directly imported history
library.

Alarm conflation rule can compress


Global
Alarm multiple pieces of same source alarms
validation
conflation that are generated by the same fault
and forward
rule and only display one piece of alarm in
validation
the network management interface.

Alarm timing rule is to calculate the


Global
time of the alarm meeting the condition.
Alarm validation
If the duration reaches the specified
timing rule and forward
time, the specified operation will be
validation
implemented.

Global When the number of the alarm meeting


Alarm validation the condition in the specified time is
counting and more than the threshold, alarm counting
rule backward rule will generate one piece of new
validation alarm.

Global
There is dependent relationship among
Alarm validation
alarms. For example, alarm A depends
suppression and
on B, A can be suppressed by alarm
rule backward
suppression rule and only B is reported.
validation

Global When the alarm meeting the condition


Alarm validation is reported or is not recovered within a
forward and period, alarm forward rule can send the
rule backward alarm to the specified personnel by mail
validation or phone short message.

50 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Rule Name Valid Range Function Description


Alarm shielding rule is to distribute the
Global shielding condition to the NE agent,
Alarm validation NE agent does not report the specified
shielding and alarm data to network management.
rule backward The shielding rule only can be done on
validation the NE agent and NE agent management
device.
Filter the notification meeting the
Global specified condition. The filtered
validation notification will be directly discarded. It
Notification
and will neither be displayed on the client end
filter rule
backward interface nor be saved in the database.
validation Notification filter rule is only valid for the
notification that is newly reported.

Introduction to Alarm Rule Operation


Creating Alarm Users make alarm operation and process rules according to differ-
Rules ent alarms.
Modifying Alarm Users can modify the rule that has been created according to the
Rules requirement. The content which can be modified includes rule de-
scription, alarm selection condition and other information of the
rule.
In the Rule Setting interface, select the rule to be modified, click
the Modify button , modify the alarm rule.
Pausing Alarm Turn the alarm rule that is in the activating state to pause state.
Rules In the pause state, the alarm rule is not valid.
In the Rule Setting interface, select the rule to be paused, click
the Pause button , pause the alarm rule.
Activating Alarm Turn the alarm rule which is in the pause state to the activating
Rules state.
In the Rule Setting interface, select the alarm rule to be acti-
vated, click the Activate button , activate the alarm rule.
Deleting Alarm Delete the alarm rule which is not used but existent. The alarm
Rule rule in the activating or pause state can be deleted.
In the Rule Setting interface, select the alarm rule to be deleted,
click the Delete button , delete the alarm rule.
Refreshing Alarm In the Rule Setting interface, click the Refresh button , refresh
Rule the alarm rule.
When multiple users log in to the same server at the same time, if
some user sets the rule on the client end, other client ends may fail
to see the change of the rule due to the network factors. When the
rule is got on the server, the latest state of the rule can be seen.

Confidential and Proprietary Information of ZTE CORPORATION 51


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Creating Alarm Rule


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Make the alarm rule according to different alarms.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Rule Setting, enter the Rule Setting inter-
face.
2. Click , pop up the Create dialog box.
3. When the appropriate alarm rule is selected, click the OK but-
ton, pop up the corresponding alarm rule dialog box. According
to the selected alarm rule, set alarm selection condition.
4. When the configuration is completed, click the OK button, com-
plete the configuration of alarm confirmation rule. The system
will add a piece of rule record in the Rule Setting interface.
END OF STEPS

Alarm Rule Parameter Description


Alarm Acknowl- The alarm acknowledgement rule can automatically acknowledge
edgement Rule the alarm meeting the specified condition when the alarm or alarm
recovery message is reported. It can reduce the workload of the
network management personnel and make them pay more atten-
tion to the key alarm. Alarm automatic acknowledgement will au-
tomatically set acknowledgement state, time and acknowledge-
ment information of the alarm.
� The Basic page of the Alarm Acknowledgement Rule dialog
box is shown as Figure 18. For parameter description, refer to
Table 8.

52 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

FIGURE 18 ALARM ACKNOWLEDGEMENT RULE-BASIC PAGE

TABLE 8 ALARM ACKNOWLEDGEMENT RULE-BASIC PAGE PARAMETER


DESCRIPTION

Parameter Parameter Meaning


Name

Name The name of the rule

Description The detailed content used to describe rules

Rule State The rule state including activate and pause

Acknowledge Set alarm acknowledge mode including “while


reporting” and “while restoring”.

� The parameter description of Condition page of Alarm Ac-


knowledgement Rule dialog box is shown as Table 9.

Confidential and Proprietary Information of ZTE CORPORATION 53


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

TABLE 9 CONDITION PARAMETER DESCRIPTION

Condition Parameter Meaning


Parameter

Location Select the specified NE in the NE Type


drop-down box

Alarm code Select the detailed alarm code in the Resource


Type tree

Other Configure the generation time, alarm type,


alarm level and NE IP

Alarm Clearing The alarm clearing rule can automatically clear the alarm meeting
Rule the specified condition when the alarm is reported, that is, au-
tomatically add the alarm clearing information, turn the reported
alarm to the history alarm and save it to the history alarm data
table. So that, not only these alarms can be recorded, but also
the number of the alarm can be reduced. It makes maintenance
personnel pay more attention to the key alarms.
For the parameter description of the Alarm Clearing Rule dialog
box, refer to Table 8 and Table 9.

Alarm Filter Rule Alarm filter rule includes the following content.
� Display filter: When the alarm is preprocessed, filter the alarm,
the selected alarm will not be sent to the client end. The client
end which is not sent to includes all users and rule establisher.
It is decided by the rule.
� In-warehouse filter: It is used to filer alarms when they are
collected. The selected alarms are neither imported the data-
base nor displayed on the current alarm real-time monitoring
interface of client end. They are filtered.
For the parameter description of the Alarm Filter Rule dialog box,
refer to Table 8 and Table 9.

Alarm Delay Rule Alarm delay setting allows users to delay some unimportant
alarms. In the specified time, if the alarm is recovered, it will not
be displayed.
For the parameter description of the Alarm Delay Rule dialog
box, refer to Table 8 and Table 9.

Alarm Conflation Alarm conflation setting allows the system to merge the same type
Rule of alarms appear in the specified range. After conflation, when the
multiple pieces of alarms in the same type are reported, only one
will be displayed in the alarm monitoring.
For the parameter description of the Alarm Conflation Rule dia-
log box, refer to Table 8 and Table 9.

Alarm Timing Rule If the time that the current alarm is acknowledged or in activating
state exceeds the specified time that the alarm timing rule defines,
the alarm level will be increased or a new alarm appears.
� For the parameter description of the Basic page of the Alarm
Timing Rule dialog box, refer to Table 8.

54 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

� For the parameter description of the Condition page of the


Alarm Timing Rule dialog box, refer to Table 9.
� For the parameter description of the Action page of the Alarm
Timing Rule dialog box, refer to Table 10.

TABLE 10 ALARM TIMING RULE ACTION PARAMETER TABLE

Parameter Name Parameter Meaning

Duration The time interval of timing rule validation

Continuous state The continuous state of this alarm. It includes


unacknowledged state and activating state

Rule action When the time and state are satisfied, system
automatically applies the operation including
level transition or alarm derivative.

Generate new When the timing rule is valid, the new alarm
alarms generates. Set the level of the new alarm
and alarm information.

Alarm Counting Alarm counting setting means when the number of the same alarm
Rule exceeds the threshold in the specified time, one piece of alarm will
generate and be reported.
� For the parameter description of the Basic page of the Alarm
Counting Rule dialog box, refer to Table 8. For the parameter
description of the Condition page, refer to Table 9.
� For the parameter description of the Action page of the Alarm
Counting Rule dialog box, refer to Table 11.

TABLE 11 ALARM COUNTING RULE ACTION PARAMETER TABLE

Parameter Name Parameter Meaning

If it is in Enter the time length in the input


box. Click the drop-down button in the
drop-down list box, select the time unit,
set alarm statistics time segment.

Have pieces of alarms The accumulative value of the same


meeting the condition alarm

A new alarm will Generate the level of the new alarm


automatically be
generated.

New alarm additional Generate the description information of


information the alarm

Alarm Forwarding When the alarm is reported, the alarm meeting the condition is
Rule forwarded to the corresponding destination.
� For the parameter description of the Alarm Forwarding Rule
dialog box, refer to Table 8 and Table 9.
� For the parameter description of the Action page of the Alarm
Forwarding Rule dialog box, refer to Table 12.

Confidential and Proprietary Information of ZTE CORPORATION 55


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

TABLE 12 ALARM FORWARDING RULE ACTION PARAMETER TABLE

Parameter Parameter Meaning


Name

Forwarding user Set the mail address and phone number of


alarm forwarding user

Forwarding Set the alarm forwarding mode. It includes


mode forward when the alarm is reported and forward
when the duration exceeds the specified time.

Only forward It is valid when the check box is selected.


before the It includes weekly forwarding and monthly
specified date forwarding.

Forwarding date Set the specified date of weekly forwarding and


setting monthly forwarding

Only forward It is valid when the check box is selected. The


before the alarm is forwarded at the specified time.
specified time

Forwarding time Set the specified time of alarm forwarding


setting

Alarm Shielding Alarm shielding rule requires the device support. When the device
Rule is supported, the foreground device is demanded to shield some
alarms according to specified condition when it reports alarms.
For the parameter description of the Alarm Shielding Rule dialog
box, refer to Table 8 and Table 9.

Note:
Different devices maybe support different shielding items. When
some NEs are selected, the system will prompt that NE type does
not support shielding.

Notification Filter It means the notification meeting the specified condition is filtered.
Rule The filtered notification will be discarded. It is neither displayed
on the client end interface nor saved in the database.
� For the parameter description of the Basic page of the Noti-
fication Filter Rule dialog box, refer to Table 8.
� For the parameter description of the Condition page of the
Notification Filter Rule dialog box, refer to Table 13.

56 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

TABLE 13 NOTIFICATION FILTER CONDITION SETTING PARAMETER


DESCRIPTION

Condition Parameter Meaning


Parameter

Generation Select the specified NE in the NE type drop-down


location box

Notification Select the specified notification code in the


code Resource Type tree

Other Set the generation time

Configuring Alarm Forwarding


Template
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Preset the information format of forwarding short message and
the mail by the function of forwarding template configuration. It
is convenient for users to send the alarm appears in the system to
the specified mail box or mobile phone by mail or short message.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Forwarding Template Setting, enter the
Forwarding Template Setting interface.
2. In the Forwarding Template Setting page, set the informa-
tion format of forwarding mail and short message.
3. Click the OK button, the system will save the specified tem-
plate parameter.
END OF STEPS

Alarm Process Suggestion


Management
Introduction to Alarm Process
Suggestion
Description Process suggestion setting function provides alarm generation rea-
son, diagnosis method and process suggestion. Based on net-
work long-term running, users can sum up the problems which

Confidential and Proprietary Information of ZTE CORPORATION 57


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

frequently appear as a kind of process reference to later similar


problems.
The NetNumen N31 network management system provides the
function of importing, exporting, searching and editing the alarm
process suggestion. It is convenient for users to accumulate vari-
ous alarms of the system. So that the process analysis efficiency
is increased.
Editing Alarm Users can add the suggestion (including alarm generation detailed
Process reason, dialog method, process method and so on) to the alarm
Suggestion information according to the real requirements.
Exporting The NetNumen N31 network management system can export the
Alarm Process alarm process suggestion as file. The export function can provide
Suggestion text file, EXCEL file, PDF file, HTML file and the file with CSV format.
Importing The NetNumen N31 network management system supports the
Alarm Process import of alarm process suggestion file with the specified format.
Suggestion The import operation imports the alarm process suggestion de-
fined in the file into the internal of the system. The alarm process
suggestion file should be .xls or .csv.
Searching Search the alarm process suggestion according to the inputted
Alarm Process field.
Suggestion

Editing Alarm Process Suggestion

Prerequisites � Users have logged in to the NetNumen N31 network manage-


ment client end.
� The operation authority has been got.
Context The process suggestion is configured as alarm generation reason,
diagnosis method, the method of process suggestion. Users can
edit and maintain these content according to their experience and
actual service condition. So that the alarm process becomes more
friendly and the analysis efficiency is increased.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Process Suggestion Setting, enter the
Process Suggestion Setting interface.
2. Select the corresponding alarm in the resource type tree in
Process Suggestion Setting box, the Suggestion Addition
area becomes valid.
3. Input the additional suggestion including detailed reason, di-
agnosis method and process method.
4. Click the Save button, complete the configuration of alarm
process suggestion.
END OF STEPS

58 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Searching Alarm Process Suggestion


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Search the alarm process suggestion according to the field which
is inputted.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Process Suggestion Setting, enter the
Process Suggestion Setting interface.
2. In Input query content, enter the query content, press Enter,
search the related alarm information.
END OF STEPS

Alarm Box Management


Introduction to Alarm Box
Description The alarm box is used for alarm box management. When the net-
work management system requires a new alarm box, one piece
of alarm box rule is created. In this rule, set the parameter and
various conditions of alarm box, the network management system
establishes the connection with the alarm box and forwards the
corresponding alarm information to the alarm box.
Users can create, modify, delete, refresh, pause and activate the
alarm box.
Functions The alarm box provides the following functions:
1. acoustic-optic indicator
The alarm box prompts the state of the management device
by horn and indicator. The voice way includes buzz and sound.
The indicator includes four alarm levels and ten alarm source
indicators.
2. LCD display
The alarm box applies 240×128 black and white dot matrix LCD
with 6 inches. It completes the configuration of IP address,
service port, sound control and alarm statistics query function
by button. The screen backlight can configure as automatic
close or on consistently.
3. Short message delivery
The wireless module of G network or C network is built in the
alarm box. When SIM/UIM card is installed, the alarm short
message is forwarded by the configuration of alarm box control
module which is on the side of alarm source.

Confidential and Proprietary Information of ZTE CORPORATION 59


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

4. Voice alarm
The voice indicator of the alarm box supports the voice mode
which is recorded in advance besides buzz. The version sets
four wav files related to the level in advance (four Chinese ver-
sions, four English versions). It has fixed name and is played
by alarm box. The switch of two ways can be realized by the
configuration menu on the LCD.
5.
The alarm box supports at most 128 alarm source accesses
(64 TCP alarm sources, 64 UDP alarm sources). There are ten
alarm source indicators on the alarm box panel. When the
number of alarm sources exceeds ten, multiple alarm sources
shares the alarm source indicator.
6. Cross-Vlan alarm source support
The alarm box supports keeping the connection between dif-
ferent VLANs. It guarantees the isolation of each alarm source
and saves the layer 3 switch with more cost at the same time.
7. Query Statistics
The alarm box can display each level alarm statistics condition
of each alarm source. It is displayed on the LCD according to
the specified serial number when the alarm source is config-
ured.
8. Alarm voice control
Set mute level through alarm box. When the mute level is 4,
the alarm of level 1, level 2 and level 3 will have sound. When
the mute level is 3, the alarm of level 1 and level 2 will have
sound. When the mute level is 1, all alarms are mute. When
the mute level is 0, all alarms have sound.
9. Remote operation
Remotely log in to the alarm box by telnet tool. Alarm source
configuration edit, route edit, VLAN edit, short message pa-
rameter configuration and time parameter configuration can
be completed by Man-Machine Language (MML) command.
10. Network storm threshold configuration
When the network broadcast message exceeds the threshold,
the alarm box will have acoustic-optic alarm. This threshold
should be configured. If the threshold is too small, the error
will be reported. If the threshold is too large, the network
storm cannot be detected. The default configuration is 200
packets per second.
11. Other functions
Voice volume control, LCD backlight control, button voice con-
trol and language selection can be configured in the “parameter
configuration” of the alarm box LCD menu.

Creating Alarm Box


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.

60 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

� The operation authority has been got.


Context Users can create an alarm box for management. When the net-
work management system connects to the alarm box, the system
will forward the corresponding alarm information to the alarm box.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Box Setting, enter the Alarm Box
Setting interface.
2. In the Alarm Box Setting interface, click the Create button,
pop up the Alarm Box Detailed Information interface.
In the Alarm Box Basic Information area, enter the name
of the alarm box and description information. Select the ini-
tial state of the alarm box, that is, one of Activating State or
Pause State. In the Alarm Box Communication Informa-
tion area, enter the IP address of the alarm box and server
port number. In the Alarm Box Control Information area,
select the level of alarm and voice level. In the Alarm sent to
the alarm box area, select the alarm level sent to the alarm
box.
3. When the alarm level sent to the alarm box is configured, the
Advanced button turns valid. Click this button.
4. In the Alarm Box Rule dialog box, the alarm box rule se-
lection condition can be respectively configured in three tabs
according to generation location, alarm code, generation time
and alarm type.
5. Click the OK button, alarm box rule is successfully set.
6. Click the OK button, close the dialog box.
END OF STEPS

Result The alarm box information which is completely configured is dis-


played in the Alarm Box Setting interface.

Pausing Alarm Box


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
� Make sure that this alarm box is in the activated state.
Context Users can pause the activated alarm box on the client end accord-
ing to the requirements.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Alarm Box Setting, enter the Alarm Box
Setting interface.
2. Select an alarm box in the Alarm Box Setting view, and then
click .
3. In the pop-up confirmation dialog box, click the OK button.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION 61


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Result The alarm box turns from the Activated state to the Pause state.

Alarm Level Redefinition


Setting
Alarm Level Description
Each alarm corresponds an alarm level. According to the alarm
severity, the alarm level includes four levels: minor, ordinary, im-
port and critical.

Redefining Alarm Level


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context When the system is initialized, the default alarm level of each
alarm is configured. Level redefinition setting function is to modify
alarm levels in the system operation procedure according to dif-
ferent service demands and actual environment.
When the alarm level is redefined, it is invalid for the current ex-
istent alarm and only valid for the backward alarm.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Level Redefinition Setting, pop up the Level
Redefinition Setting interface.
2. Select the corresponding system type in the Alarm Code
Group pull down list, the alarm which belongs to this system
type will be automatically listed in the Level Redefinition
Setting interface.
3. Click the alarm entry that requires redefinition level, click the
corresponding Custom Level bar, display the pull down list.
4. When the new alarm level is selected, the green tick will appear
in the Modify State bar.
5. Click , the green tick will disappear in the Modify State bar.
END OF STEPS

Result The modification result is saved on the network management


server.

62 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Note:
When the alarm level is redefined, it is displayed according to the
level after redefinition. The alarm ID information is not displayed
according to the level information before redefinition.

Alarm Statistic Level


Creating Alarm Basic Statistic
Template
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The alarm basic statistic template should be configured in advance.
It can avoid that the condition is set every time.
Steps 1. In the NetNumen N31network management main interface, se-
lect Alarm > Basic Statistic, pop up the Alarm Basic Statis-
tic Template dialog box, as shown in Figure 19. For parameter
description, refer to Table 14.

Confidential and Proprietary Information of ZTE CORPORATION 63


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 19 ALARM BASIC STATISTIC TEMPLATE-BASIC PAGE

TABLE 14 ALARM BASIC STATISTIC TEMPLATE-BASIC PARAMETER


DESCRIPTION

Parameter Configuration Description


Name

Statistic Type Set the index of alarm statistics. The statistics


of alarm frequency and average period can be
selected.

Statistic Object Set the alarm statistics object according to


week, date, hour, perceived severity, alarm type,
alarm code, NE and NE type.

View Setting Display all statistic results or maximum rows


allowed.

2. Click the Condition tab. For parameter description, refer to


Table 15.

64 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

TABLE 15 ALARM BASIC STATISTIC TEMPLATE-CONDITION PARAMETER


DESCRIPTION

Parameter Configuration Description


Name

Generation Select the specified NE in the NE type


location drop-down box

Alarm code Select the specified alarm code in the


Resource Type tree

Other Set the generation time, alarm type and alarm


level

3. Click the OK button, the query result is displayed in the Basic


Statistic interface.
For the description of toolbar in the Basic Statistic interface,
refer to Table 16.

TABLE 16 TEMPLATE STATISTICS TOOLBAR DESCRIPTION

Button Description

Reset Statistics Reset the query condition of the


Template template

Save as template Save the query condition as


template

Export Export the query result

Print Print the query result

Refresh Refresh the query result

Display Bar Chart Display the query result as bar


chart

Display Pie Chart Display the query result as pie


chart

4. Click the Save as template button , pop up the Save as


dialog box.
5. Configure Template Name, click the OK button, save statis-
tics template.
In the Template Tree, the statistics template can be checked.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION 65


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Creating Alarm Busy Time Statistic


Template
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The common alarm busy time statistic template should be config-
ured in advance. It can avoid that the condition is set every time.
Steps 1. In the NetNumen N31network management main interface, se-
lect Alarm > Busy Time Statistic, pop up Busy Time Statis-
tic Template dialog box, as shown in Figure 20. For parameter
description, refer to Table 17.

FIGURE 20 ALARM BUSY TIME STATISTIC TEMPLATE-BASIC PAGE

66 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

TABLE 17 ALARM BUSY TIME STATISTIC TEMPLATE-BASIC PARAMETER


DESCRIPTION

Parameter Configuration Description


Name

Statistic Type Set the index of alarm statistics. The statistics


of alarm frequency and average period can be
selected.

Effective Time Set the time segment of alarm statistics

View Setting Display all statistic results or maximum rows


allowed

2. Click the Condition tab.


3. Click the OK button, the query result is displayed in the Busy
Time Statistics interface.

4. Click the Save as template button , pop up the Save as


dialog box.
5. Configure Template Name, click the OK button, save statis-
tics template.
In the Template Tree, the statistics template can be checked,
as shown in Figure 21.

FIGURE 21 BUSY STATISTIC TEMPLATE

END OF STEPS

Calculating Alarm According to NE


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The NetNumen N31 network management system provides the
function of calculating alarm frequency according to NE.
Calculating alarm according to NE can respectively query the NE
that the alarm frequency is top 5, top 10, top 20 and top 100.

Confidential and Proprietary Information of ZTE CORPORATION 67


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

Steps 1. In the Alarm Management interface, select the Statistics


page.
The template tree includes the alarm statistics template that
the network management system carries and the template that
users define.
2. Expand Statistics > by NE, check the alarm statistics tem-
plate according to NE statistics.
3. Double-click Top 5, the right side of the interface displays the
NE and the corresponding alarm frequency that alarm genera-
tion frequency is in top 5.
END OF STEPS

Postrequisite � Double-click Top 10, query the NE and the corresponding


alarm frequency that alarm generation frequency is in top 10.
� Double-click Top 20, query the NE and the corresponding
alarm frequency that alarm generation frequency is in top 20.
� Double-click Top 100, query the NE and the corresponding
alarm frequency that alarm generation frequency is in top 100.

Calculating Alarm According to NE


Type
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The NetNumen N31 network management system provides the
function of calculating alarm frequency according to NE type.
Calculating alarm according to NE type can respectively query the
NE that the alarm frequency is top 5, top 10, top 20 and top 100.
Steps 1. In the Alarm Management interface, select the Statistics
page.
The template tree includes the alarm statistics template that
the network management system carries and the template that
users define.
2. Expand Statistics > by NE type, check the alarm statistics
template according to NE type.
3. Double-click Top 5, the right side of the interface displays the
NE and the corresponding alarm frequency that alarm genera-
tion frequency is in top 5.
END OF STEPS

Postrequisite � Double-click Top 10, query the NE and the corresponding


alarm frequency that alarm generation frequency is in top 10.
� Double-click Top 20, query the NE and the corresponding
alarm frequency that alarm generation frequency is in top 20.

68 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

� Double-click Top 100, query the NE and the corresponding


alarm frequency that alarm generation frequency is in top 100.

Calculating Alarm According to Alarm


Code
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The NetNumen N31 network management system provides the
function of calculating alarm frequency according to alarm code.
Calculating alarm according to alarm code can respectively query
the alarm code that the alarm frequency is top 5, top 10, top 20
and top 100.
Steps 1. In the Alarm Management interface, select the Statistics
page.
The template tree includes the alarm statistics template that
the network management system carries and the template that
users define.
2. Expand Statistics > by alarm code, check the alarm statis-
tics template according to alarm code statistics.
3. Double-click Top 5, the right side of the interface displays the
NE and the corresponding alarm frequency that alarm genera-
tion frequency is in top 5.
END OF STEPS

Postrequisite � Double-click Top 10, query the NE and the corresponding


alarm frequency that alarm generation frequency is in top 10.
� Double-click Top 20, query the NE and the corresponding
alarm frequency that alarm generation frequency is in top 20.
� Double-click Top 100, query the NE and the corresponding
alarm frequency that alarm generation frequency is in top 100.

Calculating Alarm According to Time


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The NetNumen N31 network management system provides the
function of calculating alarm frequency according to time.
Calculating alarm according to time can respectively query the fre-
quency that alarms generate according to week, date and hour.
Steps 1. In the Alarm Management interface, select the Statistics
page.

Confidential and Proprietary Information of ZTE CORPORATION 69


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

The template tree includes the alarm statistics template that


the network management system carries and the template that
users define.
2. Expand Statistics > by time, check the alarm statistics tem-
plate according to time.
3. Double-click Month, the right side of the interface displays the
frequency that the system generates alarms in one week. They
are listed in descending order.
END OF STEPS

Postrequisite � Double-click Date, query the frequency that the system gen-
erates alarms everyday in one month. They are listed in de-
scending order.
� Double-click Hour, query the frequency that the system gen-
erates alarms every hour in one day. They are listed in de-
scending order.

Calculating Alarm According to


User-defined Template
Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context The alarm is queried by the alarm statistics template which is pre-
set.
Steps 1. In the Alarm Management interface, select the Statistics
page.
The template tree includes the alarm statistics template that
the network management system carries and the template that
users define.
2. Expand Template tree > User-defined Statistics, check the
alarm statistics template that users define.
3. Double-click the template to be queried, the right side of the
interface displays query result.
END OF STEPS

70 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

Timing Statistics Task


Management
Introduction to Timing Statistics Task
The statistics template can be periodically implemented by timing
statistics task function.
Timing statistics task management function can provide the tim-
ing statistics task function including adding, deleting, modifying,
refreshing, activating and pausing.

Creating Timing Statistics Task


Prerequisites � Users have logged in to the NetNumen N31 network manage-
ment client end.
� The operation authority has been got.
Context Create timing task, automatically implement the statistics tem-
plate according to the specified period.
Steps 1. In the NetNumen N31 network management main interface,
select Alarm > Timing Statistics Task Management, enter
the Timing Statistics Task Management interface.
2. Click the Add button , pop up the Timing Report Alarm
Task dialog box, as shown in Figure 22. For parameter de-
scriptions, refer to Table 18.

Confidential and Proprietary Information of ZTE CORPORATION 71


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

FIGURE 22 ADDING TIMING TASK

TABLE 18 TIMING STATISTICS TASK PARAMETER DESCRIPTION

Parameter Parameter Description


Name

Task name The name of timing statistics task

Template name The statistics template of tasks that are timely


implemented . It can be any template of
Template tree.

Task start time The start time of timing statistics task

Task end time End time

Task state The state of timing statistics task including


activation and pause

Task The implementation plan of timing task


implementation including implementing by day, week, month
task and user definition.

72 Confidential and Proprietary Information of ZTE CORPORATION


Chapter 2 Alarm Management

3. Set the related parameters, click the OK button to complete


the establishment of timing statistics task.
END OF STEPS

Confidential and Proprietary Information of ZTE CORPORATION 73


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

This page is intentionally blank.

74 Confidential and Proprietary Information of ZTE CORPORATION


Figures

Figure 1 Operation Flow ...................................................... 3


Figure 2 Measurement Task Management Interface ................. 4
Figure 3 Creating Measurement Task ..................................... 6
Figure 4 The Interface of Recollecting Data ............................ 9
Figure 5 Performance Threshold Window...............................11
Figure 6 Creating Threshold Task .........................................12
Figure 7 Counter and Index Management Interface ................16
Figure 8 Creating an Index .................................................18
Figure 9 Raw Data Query....................................................23
Figure 10 Creating Realtime Data Query ...............................24
Figure 11 Creating a Template.............................................26
Figure 12 Implementation Template .....................................27
Figure 13 Alarm System Composition ...................................31
Figure 14 Alarm Real-time Monitoring Interface .....................37
Figure 15 Alarm Box Main Interface .....................................39
Figure 16 Function Selection Menu .......................................40
Figure 17 Forwarding Setup Interface...................................43
Figure 18 Alarm Acknowledgement Rule-Basic Page ...............53
Figure 19 Alarm Basic Statistic Template-Basic Page...............64
Figure 20 Alarm Busy Time Statistic Template-Basic Page .......66
Figure 21 Busy Statistic Template ........................................67
Figure 22 Adding Timing Task..............................................72

Confidential and Proprietary Information of ZTE CORPORATION 75


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

This page is intentionally blank.

76 Confidential and Proprietary Information of ZTE CORPORATION


Tables

Table 1 Task Parameter Description ....................................... 7


Table 2 Threshold Task Parameter 1 .....................................12
Table 3 Threshold Configuration Parameter Description ...........13
Table 4 Basic Information Description ...................................14
Table 5 Basic Information-Parameter Description ...................18
Table 6 Alarm Rule Operation ..............................................44
Table 7 Alarm Rule.............................................................50
Table 8 Alarm Acknowledgement Rule-Basic Page Parameter
Description .......................................................53
Table 9 Condition Parameter Description ...............................54
Table 10 Alarm Timing Rule Action Parameter Table................55
Table 11 Alarm Counting Rule Action Parameter Table.............55
Table 12 Alarm Forwarding Rule Action Parameter Table..........56
Table 13 Notification Filter Condition Setting Parameter
Description .......................................................57
Table 14 Alarm Basic Statistic Template-Basic Parameter
Description .......................................................64
Table 15 Alarm Basic Statistic Template-Condition Parameter
Description .......................................................65
Table 16 Template Statistics Toolbar Description ....................65
Table 17 Alarm Busy Time Statistic Template-Basic Parameter
Description .......................................................67
Table 18 Timing Statistics Task Parameter Description ............72

Confidential and Proprietary Information of ZTE CORPORATION 77


NetNumen N31 (IP Network) User Manual (Performance and Alarm)

This page is intentionally blank.

78 Confidential and Proprietary Information of ZTE CORPORATION


Glossary

EMS
- Element Management System
ID
- Identification/Identity/Identifier
IP
- Internet Protocol
KPI
- Key Performance Indicators
QoS
- Quality of Service
TCP
- Transfer Control Protocol
TCP/IP
- Transfer Control Protocol/Internet Protocol
UDP
- User Datagram Protocol
VLAN
- Virtual Local Area Network

Confidential and Proprietary Information of ZTE CORPORATION 79

You might also like