Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
NO.1 08/2009
01
Introduction to the Information System of Access Products Improvement on Alarm Reference Improvement on Command Reference Hot Issues
Pilotage
Develop the best information Polish the products Ease our customers
Operation
One hit
Planning Guide A must for planning and design Quick Installation Installation Guide Guide
Serial pictures of installation
Reference
Well-informed
Alarm and Performance Events Reference Red indicator terminator
Command Reference
Treasure box of commands Performance Index Reference Dictionary of performance indexes
Last resort
Northbound Interface User Guide Guide to OSS service provisioning
1
Documentation Guide
Advantage: It describes the main contents of all the documents. Usage: Reading the Documentation Guide helps understand the roles and functions of all the documents so that you can find your desired information in the documents more quickly. Highlight: The Documentation Guide provides the recommended documents for the audience who assume different responsibilities. Advantage: It covers all the technical characteristics, features, and functions of the product. Usage: This document is preferred if you need to quickly know the capability and features of the product. Highlight: The Product Description provides all the technical specifications of the product. Advantage: It describes the definition, specifications, principles, and configuration of each feature of the product. Usage: It tackles each scenario by focusing on each product feature. Advantage: It describes each part of the equipment in every aspect. Usage: You can query any information about the cabinet, shelf, boards, cables, and electromechanical devices in this document. Highlight: The Hardware Description provides a quick reference to some common information. Read this document, and maybe you can find your desired information.
Product Description
A function dictionary
Feature Description
Hardware Description
An encyclopedia of hardware
Planning Guide
Advantage: It describes the requirements and principles for network planning and design. Usage: This document provides a guide to your network planning and design, and NE configuration.
Installation Guide
Advantage: It describes the methods of installing the hardware for the equipment and the software for the EMS. Usage: Hardware installation engineers are required to read this document. Highlight: The companion volume for the document is the Quick Installation Guide, which is of high-quality pictures and written explanations, simple and easy to read.
Commissioning Guide
Advantage: It describes the method of commissioning during deployment. Usage: Commissioning engineers are required to read this document.
Configuration Guide
Advantage: It describes the methods of configuring and operating the equipment on the N2000 and the related precautions. Usage: The N2000 operators are required to read this document.
Administrator Guide
Advantage: It describes how to manage the N200 BMS. Usage: It is a guide to the N2000 BMS administrators for managing the N2000 BMS.
Routine Maintenance
Advantage: It describes the routine check items and operations. Usage: You can have a health checkup on the equipment according to this document. Highlight: It guards against possible new threats to the equipment.
Troubleshooting
Advantage: It describes the methods and operations for troubleshooting. Usage: With this document, you can check the fault causes step by step according to different scenarios and fault phenomena. Highlight: Read this document in advance. Then, you can draw inferences about other cases from one
Parts Replacement
Advantage: It describes the operations for replacing components and boards. Usage: When the fault is located as damage to the hardware, refer to this document to replace the related Highlight: Parts replacement is the last resort during troubleshooting. Therefore, exercise caution when using it.
2
Advantage: It describes the procedure for handling all alarms. Usage: You can locate the alarm cause and eliminate the "red indicator" according to the instructions in this document. Highlight: This document removes the mystery of alarm parameters.
Command Reference A treasure box of commands Advantage: It describes the usage of all the commands for the equipment.
Usage: In this document, you can query the function, format, parameter description, mode, level, usage guidelines, and system response of each command in the system.
Improvement on
Alarm Reference
In the past, the most impressive thing about the alarms for the access equipment was what a large number of the alarms! As a result, it was taken for granted that the maintainability of the alarms was poor. There is a procedural guide for the alarm change control, but the related restraint mechanism is not available. Therefore, the implementation is not satisfactory. Now, by optimizing the alarms and introducing the change control tool, the access network has taken the lead in alarms in the network product line.
Key words : sharp increase in the number of alarms, separating events from alarms, change control, and unified alarm library management.
Present condition
The number of alar ms is too large. Once in a central office, thousands of alarms were generated in a day, which was inconvenient for the customer to focus on the key problems. The alarms are not accurately defined, resulting in poor guidance. Some alarms are minor, but are defined as critical alarms. In this case, the number of critical alarms is large, so the workload for handling the critical alarms is heavy; meanwhile, it is difficult to use these alarms. The points of failure indicated by some alarms are ambiguous, so that it is difficult for the customer to understand and troubleshoot them. As a result, the troubleshooting efficiency is low. The guidelines in the documents matching the alarms for handling the alarms are not as clear as possible. The possible causes of some alarms are neither clear nor complete. Meanwhile, the procedure for handling the alarms in different situations is not described step by step. Therefore, it is very difficult for the customers to understand the alarms and troubleshoot the related faults according to the guidelines. The alarms are not managed in a unified way. The developers fail to comply with the alarm change control procedure, and they add or modify alarms without authorization. As a result, a large number of redundant alarms exist in the alarms list and in the equipment.
4
After optimization
The alarms are defined according to the r ules. The notification of the system after its detection of a fault is defined as an alarm. The normal condition determined by the customer or the active notification of the system for the customer when the system works in the normal state is defined as an event. When an alarm occurs, the customer is generally required to troubleshoot the fault according to the related handling procedure so that the alarm can be cleared. An event, however, need not be cleared. The information about the alarm is cor rect and complete. The attributes of an alarm are complete and match the related fault. The alarm can be cleared because the related fault can be rectified according to the handling procedure in the alarm reference. The handling procedure in the alarm reference is written in the step-by-step way, so that the fault can be rectified quickly. The information about alarms can be filtered accor ding to various conditions. The alarms can be filtered according to different parameters. For example, you can filter an alarm in all scenarios by its alarm ID, or you can filter an alarm on a certain port. The alarm store will not be generated. Upon the system alarm optimization, the traffic of alarms that are reported during a short period of time is stable, and no burst traffic will be generated, which prevents the alarm storm. The number of alar ms is evidently reduced. After the system alarm optimization, some alarms that are not clearly defined are deleted or combined. As a result, the number of alarms is reduced by 40% in comparison with the earlier version. The alarms are managed in a standardized way and the change is under control. The alarm baseline is created and the alarms for all the versions are managed in a unified way by the Resman tool. The application for changing an alarm must be filed through the Resman tool for review by the experts in the related fields. The alarm library, alarm codes, and alarm document are updated
Information in the Alarm Reference before and after system alarm optimization Before optimization
Attribute
Parameters
After optimization
Impact on System
Possible
Handling Procedure
Related Information
Origin
The Command Reference is the document that is used most frequently. Its contents, however, are too simple to be a guide to the operations. In this case, the customers lose confidence in using the document. As a result, the customer satisfaction with the document is low. The major problems concerning the Command Reference are as follows: The command functions and parameters are not clearly described, so the document cannot be a guide to the operations. The use guidelines are too simple to instruct the customers to perform the related configurations.
Analysis of major problems concer ning the Command Reference: 1. The Function is simply described.
In the Function section,the function of the command is described,but the description is very simple. For example:
power off
2. The Parameters are described simply and the customers are doubtful about the contents in the Value.
Paramet
Load-off-state load-off-state
Description
Sets the load power-off status. Sets the power-off voltage for a battery group. Sets the load power-off voltage.
Value
permit and forbid permit and forbid Default: forbid. Default: permit.
3. The User Guidelines are lack of some important information, so they are not instructive.
Description
The set battery group power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > float charging voltage + 2 V and DC under-voltage > load power-off voltage > battery power-off voltage.
After optimization
1.The template for the Command Reference is optimized, and the Function is enhanced.
The detailed function of the command is described. In addition, the scenario where the command is used and the result after the command is executed are also described. For example:
power off
Function This command is used to set the power-off parameters for a load or a battery g roup. When the mains powers off, the system adopts the battery to supply power. When the load power-off is permitted and the load voltage reaches the load power-off voltage, the system reserves the 10 A output branch and disconnects the 50 A, 20 A output branches automatically. When the battery group power-off is permitted and the batter y voltage reaches the battery power-off voltage, the system automatically disconnects the connection between the battery and all loads. To set the power-off function for the load and the battery group to ensure that the device can work normally in the case of the mains disconnection, run the command. After that, all parameters take effect immediately. 2.The Parameters are described in detail.
The parameters are described in detail, and such contents as the principles and type of the parameters are also described.
Parameter
load-off-state load-off-state battery-off-state battery-offstate load-off-voltage load-offvoltage Battery-off-voltage battery-offvoltage
Description
Sets the load power-off status. When the system has no power module and the total line bank voltage is smaller than the poweroff voltage, set the parameter as permit if the power monitoring system needs to perform the power off operation on the load. Otherwise, set the parameter as forbid. Sets the power-off voltage for a battery group. When the system has no power module and the total line bank voltage is smaller than the power-off voltage, set the parameter as permit if the power monitoring system needs to perform the power off operation on the load. Otherwise, set the parameter as forbid.
Value
Enumerated type. Options: permit and forbid. Default: forbid.
Default: permit.
.Unit: V.
Sets the load power-off voltage. The set load power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > Numeral type. Range: 35.0-44.9 V float charging voltage + 2 V and DC under-voltage > load Default: 43.5 V. power-off voltage > battery power-off voltage. Sets the power-off voltage for a battery group. The set battery group power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > float charging voltage + 2 V and DC under-voltage > load power-off voltage > battery power-off voltage. Numeral type. Range: 35.0-44.9 V. Default: 43 V.
Unit: V .
Usage Guidelines
All the matched traffic streams are deleted when the specified traffic stream is deleted. Each xDSL port supports up to 8 PVCs. Each service board supports up to 256 PVCs. The service virtual port cannot be deleted under the following conditions: O O O O The port is encapsulated as PPPoA, IPoA or as Auto. The port is added to the BTV user. The port is bound with the IP address or the MAC address. The port is configured with the static MAC address. When you create the access traffic stream in the xDSL and ATM modes and if you do not specify the VPI and VCI, the system will allocate a VPI and VCI automatically. The initial value of the VPI is 0 and that of the VCI is 32. When the service virtual port needs to carry multiple services: O If the multiple ser vices are differentiated based on the service encapsulation type, you need to input the service encapsulation type on the user side. O O If the multiple ser vices are differentiated based on the VLAN ID on the user side, you need to input the VLAN ID on the user side. If the multiple ser vices are differentiated based on the user side priority on the user side, you need to input the user side priority. Each physical port has up to one autosense traffic stream and it cannot exist with the common traffic stream at the same time.
Hot Issues
The documentation for the SmartAX MA5600T V800R005C03 is recommended here. The positioning and features of, and the element management system (EMS) and documentation for the MA5600T are introduced. To know details of the product, please refer to the documents for the product.
1.
The SmartAX MA5600T is a multi-service access device of Huawei. It provides the integrated broadband and narrowband access services of large capacity, high rate, high bandwidth, and high quality. In addition, it provides subscribers with the FTTx optical access service. As a multi-service access platform, the MA5600T supports multiple networking modes to satisfy the networking requirements of subscribers in different scenarios and for different services.
2.
3.
EMS for the MA5600T V800R005C03: N2000 BMS V200R011C03 4. Documentation for the MA5600T
31183207-MA5600T Electronic Documentation-(V800R005C03_01,MSAN) 31183209-MA5600T Electronic Documentation-(V800R005C03_01,GPON)
11