IMANAGER N2000 BMS PDF

The iManager U inherits all the functions of the original T, N BMS, and DMS systems, and manages Huawei transport, IP, and access equipment. OBN iManager N BMS Introduction ISSUE CJH, CJH, iManager N BMS Advanced Operation and CJL, CJL, iManager N BMS Operation Training (MSAN),

Author: Yosho Yozshuktilar
Country: Bosnia & Herzegovina
Language: English (Spanish)
Genre: Personal Growth
Published (Last): 12 April 2010
Pages: 180
PDF File Size: 20.2 Mb
ePub File Size: 5.93 Mb
ISBN: 714-3-94382-297-4
Downloads: 51691
Price: Free* [*Free Regsitration Required]
Uploader: Yodal

In addition, it can support multiple networking schemes, including SDH networks, MSTP networks including built-in case-shape transmission equipmentdirect connection of fibers and extension networks based on G.

In addition, the service data can be completely isolated. In this manner, imaager need not perform basic configurations on the NE again. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, and so on can be monitored as well.

The implementation is to divide and converge the data stream according to the VLAN flag of the packet. This reduces the number of orders that require engineers to rectify faults on site. Centralized Network Management N000 U can manage transport equipment, access equipment, and IP equipment in a centralized manner.

U can collect alarm statistics based on vms conditions. Performance register Performance register is the memory space for performance event counts, including min current performance register, hour current performance register, min history performance register, hour history performance register, UAT register and CSES register.

Huawei iManager U Price Manual Specification Certification —

P Path protection The working principle of path protection: In the centralized deployment mode of the single-server system, there is only one U server on which all management components are installed and all processes run.

This is the dual-homing protection. The threshold can be divided into crossing n20000 and defect threshold. Policy auditing is to audit the policy configuration differences between the NMS and device, so as to determine whether the policy needs to be deployed or discovered. Managed objects are grouped into different object sets to facilitate permission assignment. The information model is constructed based on the object-oriented concept.

  KHAIRY CHRONICLES PDF

The main functions for managing system processes are as follows: Performance Performance events bmss have upper and lower thresholds. This helps users to manage and audit services from the point of networkwide view.

The creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection subnetwork, the optical interfaces or VC4 of each board are mapped into the logical system, and then these independent logical systems are connected with one another to form a complete network structure. When the optical power is attenuated to the detection threshold, a command is automatically issued to adjust the attenuation of each station on the link.

Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided “AS IS” without warranties, guarantees or representations of any kind, either express or implied. Forced switch This command performs the ring switch from working channels to the protection channels.

Edits and displays the rule of the topology data or the filter conditions. Domain The domain of imannager NMS specifies the scope of address or functions which are available to a certain user. After a board is imanagre to the slot, the NE Panel automatically displays the board and board information. The running status of the resources used by the current service, such as an interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping you to quickly locate faults.

  JAXON22 HELP WANTED PDF

In addition, the iManager N BMS supports automatic upgrade of the entire network in batches, and user safety control.

When BMS DC Load patch from OLT (MAT)fail

Power Consumption Management By using the U, a user can perform the following operations: Meanwhile, the Client and ODUk cross-connections are created by using the end-to-end trail management function. The U has revolutionized the layer-based management mode to meet the management requirements in the transition from the existing vertical network to the flattened horizontal network. If a system does not receive any detection packet from the opposite end in a specific time, the system regards that a failure occurs in some part of the bidirectional channel to the adjacent system.

Optical time domain OTDR is an optical fault locator and analysis tool for optical fiber reflectormeter networks. N Wavelength Protection Subnet Parameters. U supports the ability to restore the backup data of equipment. Alarm color display The severity of each alarm in the alarm list is displayed with a corresponding color.

iManager U2000

You can set the information about the network operator, including the international identifier, domestic identifier, and customized identifier.

Licence A permission provided by a vendor to authorise the use of specific functions of a product.

In this way, the networking and network survivability ability is enhanced. The configuration object is a single NE. In this manner, you are freed from the in-field commissioning. Database management includes the management of NE and U databases.