You are on page 1of 11

Information Can guide you

NO.1 08/2009

01

Introduction to the Information System of Access Products Improvement on Alarm Reference Improvement on Command Reference Hot Issues

Sponsored by Accsess & Service Information Development Dept

Pilotage
Develop the best information Polish the products Ease our customers

Information .Catches the current trends of the Access Network information

Introduction to the Information System of Access Products


This document describes the functions, features, and status of various documents for the equipment of the access network. Key words: Advantage, usage, and highlight

Access Network Documentation System


Description
Internal work
Documentation Guide Guide to the documentation Product Description Function dictionary Hardware Description Encyclopedia of hardware Feature Description Complete collection of features

Operation
One hit
Planning Guide A must for planning and design Quick Installation Installation Guide Guide
Serial pictures of installation

Reference
Well-informed
Alarm and Performance Events Reference Red indicator terminator

golden book for software and hardware installation

Command Reference
Treasure box of commands Performance Index Reference Dictionary of performance indexes

Commissioning Guide Golden book for deployment Configuration Guide


Golden book for operations on the equipment

Administrator Guide N2000 manager Routine Maintenance


A health checkup on equipment Troubleshooting Guardian of equipment health Parts Replacement

Last resort
Northbound Interface User Guide Guide to OSS service provisioning
1

Information .Catches the current trends of the Access Network information

Documentation Guide

A guide to the documentation

Advantage: It describes the main contents of all the documents. Usage: Reading the Documentation Guide helps understand the roles and functions of all the documents so that you can find your desired information in the documents more quickly. Highlight: The Documentation Guide provides the recommended documents for the audience who assume different responsibilities. Advantage: It covers all the technical characteristics, features, and functions of the product. Usage: This document is preferred if you need to quickly know the capability and features of the product. Highlight: The Product Description provides all the technical specifications of the product. Advantage: It describes the definition, specifications, principles, and configuration of each feature of the product. Usage: It tackles each scenario by focusing on each product feature. Advantage: It describes each part of the equipment in every aspect. Usage: You can query any information about the cabinet, shelf, boards, cables, and electromechanical devices in this document. Highlight: The Hardware Description provides a quick reference to some common information. Read this document, and maybe you can find your desired information.

Product Description

A function dictionary

Feature Description

A complete collection of features

Hardware Description

An encyclopedia of hardware

Planning Guide

A must for planning and design

Advantage: It describes the requirements and principles for network planning and design. Usage: This document provides a guide to your network planning and design, and NE configuration.

Installation Guide

A golden book for software and hardware installation

Advantage: It describes the methods of installing the hardware for the equipment and the software for the EMS. Usage: Hardware installation engineers are required to read this document. Highlight: The companion volume for the document is the Quick Installation Guide, which is of high-quality pictures and written explanations, simple and easy to read.

Commissioning Guide

A golden book for deployment

Advantage: It describes the method of commissioning during deployment. Usage: Commissioning engineers are required to read this document.

Configuration Guide

A golden book for operations on the equipment

Advantage: It describes the methods of configuring and operating the equipment on the N2000 and the related precautions. Usage: The N2000 operators are required to read this document.

Administrator Guide

A manager for the N2000 BMS

Advantage: It describes how to manage the N200 BMS. Usage: It is a guide to the N2000 BMS administrators for managing the N2000 BMS.

Routine Maintenance

A health checkup on the equipment

Advantage: It describes the routine check items and operations. Usage: You can have a health checkup on the equipment according to this document. Highlight: It guards against possible new threats to the equipment.

Troubleshooting

A guardian of equipment health

Advantage: It describes the methods and operations for troubleshooting. Usage: With this document, you can check the fault causes step by step according to different scenarios and fault phenomena. Highlight: Read this document in advance. Then, you can draw inferences about other cases from one

Parts Replacement

The last resort

Advantage: It describes the operations for replacing components and boards. Usage: When the fault is located as damage to the hardware, refer to this document to replace the related Highlight: Parts replacement is the last resort during troubleshooting. Therefore, exercise caution when using it.
2

Information .Catches the current trends of the Access Network information

Northbound Interface User Guide An assistant in OSS service provisioning


Advantage: It describes how to provision the service through the northbound interface of the N2000 BMS. Usage: This document is a guide to the service provisioning when the OSS of a third party is used.

Alarm and Performance Events Reference

A "red indicator" terminator

Advantage: It describes the procedure for handling all alarms. Usage: You can locate the alarm cause and eliminate the "red indicator" according to the instructions in this document. Highlight: This document removes the mystery of alarm parameters.

Command Reference A treasure box of commands Advantage: It describes the usage of all the commands for the equipment.
Usage: In this document, you can query the function, format, parameter description, mode, level, usage guidelines, and system response of each command in the system.

Information .Catches the current trends of the Access Network information

Improvement on

Alarm Reference
In the past, the most impressive thing about the alarms for the access equipment was what a large number of the alarms! As a result, it was taken for granted that the maintainability of the alarms was poor. There is a procedural guide for the alarm change control, but the related restraint mechanism is not available. Therefore, the implementation is not satisfactory. Now, by optimizing the alarms and introducing the change control tool, the access network has taken the lead in alarms in the network product line.

Key words : sharp increase in the number of alarms, separating events from alarms, change control, and unified alarm library management.

Present condition
The number of alar ms is too large. Once in a central office, thousands of alarms were generated in a day, which was inconvenient for the customer to focus on the key problems. The alarms are not accurately defined, resulting in poor guidance. Some alarms are minor, but are defined as critical alarms. In this case, the number of critical alarms is large, so the workload for handling the critical alarms is heavy; meanwhile, it is difficult to use these alarms. The points of failure indicated by some alarms are ambiguous, so that it is difficult for the customer to understand and troubleshoot them. As a result, the troubleshooting efficiency is low. The guidelines in the documents matching the alarms for handling the alarms are not as clear as possible. The possible causes of some alarms are neither clear nor complete. Meanwhile, the procedure for handling the alarms in different situations is not described step by step. Therefore, it is very difficult for the customers to understand the alarms and troubleshoot the related faults according to the guidelines. The alarms are not managed in a unified way. The developers fail to comply with the alarm change control procedure, and they add or modify alarms without authorization. As a result, a large number of redundant alarms exist in the alarms list and in the equipment.
4

Information .Catches the current trends of the Access Network information

After optimization
The alarms are defined according to the r ules. The notification of the system after its detection of a fault is defined as an alarm. The normal condition determined by the customer or the active notification of the system for the customer when the system works in the normal state is defined as an event. When an alarm occurs, the customer is generally required to troubleshoot the fault according to the related handling procedure so that the alarm can be cleared. An event, however, need not be cleared. The information about the alarm is cor rect and complete. The attributes of an alarm are complete and match the related fault. The alarm can be cleared because the related fault can be rectified according to the handling procedure in the alarm reference. The handling procedure in the alarm reference is written in the step-by-step way, so that the fault can be rectified quickly. The information about alarms can be filtered accor ding to various conditions. The alarms can be filtered according to different parameters. For example, you can filter an alarm in all scenarios by its alarm ID, or you can filter an alarm on a certain port. The alarm store will not be generated. Upon the system alarm optimization, the traffic of alarms that are reported during a short period of time is stable, and no burst traffic will be generated, which prevents the alarm storm. The number of alar ms is evidently reduced. After the system alarm optimization, some alarms that are not clearly defined are deleted or combined. As a result, the number of alarms is reduced by 40% in comparison with the earlier version. The alarms are managed in a standardized way and the change is under control. The alarm baseline is created and the alarms for all the versions are managed in a unified way by the Resman tool. The application for changing an alarm must be filed through the Resman tool for review by the experts in the related fields. The alarm library, alarm codes, and alarm document are updated

Information in the Alarm Reference before and after system alarm optimization Before optimization

ALM-0x15411024 Fan Block Alarm Description

Attribute

Parameters

Possible Handling Parent topic:


5

Information .Catches the current trends of the Access Network information

After optimization

0x15411024 Fan Blocked Description Attribute

Impact on System

Possible

Handling Procedure

Related Information

reset display fan alarm

0x15421024 Fan Block Recovery Alarm 0x15411025 Temperature Too High

Information .Catches the current trends of the Access Network information

Improvement on Command Reference


The new Command Reference is a new experience to you. We are confident that the Command Reference can be an indispensable assistant to your work! Key words: Command Reference, function, parameter description, and usage guidelines

Origin
The Command Reference is the document that is used most frequently. Its contents, however, are too simple to be a guide to the operations. In this case, the customers lose confidence in using the document. As a result, the customer satisfaction with the document is low. The major problems concerning the Command Reference are as follows: The command functions and parameters are not clearly described, so the document cannot be a guide to the operations. The use guidelines are too simple to instruct the customers to perform the related configurations.

Analysis of major problems concer ning the Command Reference: 1. The Function is simply described.
In the Function section,the function of the command is described,but the description is very simple. For example:

power off

2. The Parameters are described simply and the customers are doubtful about the contents in the Value.

Paramet
Load-off-state load-off-state

Description
Sets the load power-off status. Sets the power-off voltage for a battery group. Sets the load power-off voltage.

Value
permit and forbid permit and forbid Default: forbid. Default: permit.

battery-off-state battery-off-state load-off-voltage load-off-voltage

Battery-off-voltage battery-off-voltage Sets the power-off voltage for a battery group.

35.0-44.9 V Unit: V. Default: 43.5 V. 35.0-44.9 V Unit: V. Default: 43 V.


7

Information .Catches the current trends of the Access Network information

3. The User Guidelines are lack of some important information, so they are not instructive.

Description
The set battery group power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > float charging voltage + 2 V and DC under-voltage > load power-off voltage > battery power-off voltage.

After optimization
1.The template for the Command Reference is optimized, and the Function is enhanced.
The detailed function of the command is described. In addition, the scenario where the command is used and the result after the command is executed are also described. For example:

power off
Function This command is used to set the power-off parameters for a load or a battery g roup. When the mains powers off, the system adopts the battery to supply power. When the load power-off is permitted and the load voltage reaches the load power-off voltage, the system reserves the 10 A output branch and disconnects the 50 A, 20 A output branches automatically. When the battery group power-off is permitted and the batter y voltage reaches the battery power-off voltage, the system automatically disconnects the connection between the battery and all loads. To set the power-off function for the load and the battery group to ensure that the device can work normally in the case of the mains disconnection, run the command. After that, all parameters take effect immediately. 2.The Parameters are described in detail.
The parameters are described in detail, and such contents as the principles and type of the parameters are also described.

Parameter
load-off-state load-off-state battery-off-state battery-offstate load-off-voltage load-offvoltage Battery-off-voltage battery-offvoltage

Description
Sets the load power-off status. When the system has no power module and the total line bank voltage is smaller than the poweroff voltage, set the parameter as permit if the power monitoring system needs to perform the power off operation on the load. Otherwise, set the parameter as forbid. Sets the power-off voltage for a battery group. When the system has no power module and the total line bank voltage is smaller than the power-off voltage, set the parameter as permit if the power monitoring system needs to perform the power off operation on the load. Otherwise, set the parameter as forbid.

Value
Enumerated type. Options: permit and forbid. Default: forbid.

Default: permit.
.Unit: V.

Sets the load power-off voltage. The set load power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > Numeral type. Range: 35.0-44.9 V float charging voltage + 2 V and DC under-voltage > load Default: 43.5 V. power-off voltage > battery power-off voltage. Sets the power-off voltage for a battery group. The set battery group power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > float charging voltage + 2 V and DC under-voltage > load power-off voltage > battery power-off voltage. Numeral type. Range: 35.0-44.9 V. Default: 43 V.

Unit: V .

3.The User Guidelines are improved.


The information related to the command is described in detail, including the related concepts, specifications, and precautions of the command. This makes the Command Reference more instructive. For example:

Usage Guidelines
All the matched traffic streams are deleted when the specified traffic stream is deleted. Each xDSL port supports up to 8 PVCs. Each service board supports up to 256 PVCs. The service virtual port cannot be deleted under the following conditions: O O O O The port is encapsulated as PPPoA, IPoA or as Auto. The port is added to the BTV user. The port is bound with the IP address or the MAC address. The port is configured with the static MAC address. When you create the access traffic stream in the xDSL and ATM modes and if you do not specify the VPI and VCI, the system will allocate a VPI and VCI automatically. The initial value of the VPI is 0 and that of the VCI is 32. When the service virtual port needs to carry multiple services: O If the multiple ser vices are differentiated based on the service encapsulation type, you need to input the service encapsulation type on the user side. O O If the multiple ser vices are differentiated based on the VLAN ID on the user side, you need to input the VLAN ID on the user side. If the multiple ser vices are differentiated based on the user side priority on the user side, you need to input the user side priority. Each physical port has up to one autosense traffic stream and it cannot exist with the common traffic stream at the same time.

How to obtain the documentation :Documentation CD-ROM: http://support.huawei.com/


8

Information .Catches the current trends of the Access Network information

Hot Issues
The documentation for the SmartAX MA5600T V800R005C03 is recommended here. The positioning and features of, and the element management system (EMS) and documentation for the MA5600T are introduced. To know details of the product, please refer to the documents for the product.

1.

Positioning of the MA5600T

The SmartAX MA5600T is a multi-service access device of Huawei. It provides the integrated broadband and narrowband access services of large capacity, high rate, high bandwidth, and high quality. In addition, it provides subscribers with the FTTx optical access service. As a multi-service access platform, the MA5600T supports multiple networking modes to satisfy the networking requirements of subscribers in different scenarios and for different services.

2.

Benefits and features of the MA5600T


Abundant interfaces Upstream interface, service interface, and maintenance interface. Operable IPTV service The MA5600T supports the following specifications: IGMP V2/V3 IGMP proxy and IGMP snooping 1024 multicast groups Multiple modes for authenticating multicast users to meet the requirements of different multicast operators owerful GPON access capability The MA5600T supports the following specifications: Both static bandwidth allocation (SBA) and dynamic bandwidth allocation (DBA) Passive optical transmission to resolve the bandwidth bottleneck of the access over the twisted pair cables Downstream rate of 2.488 Gbit/s and upstream rate of 1.244 Gbit/s Maximum physical reach of 20 km A split ratio of 1:64 erfect voice feature The MA5600T supports the following specifications: H248 and MGCP protocols PSTN basic services and supplementary services Transparent transmission of fax and modem services Voice coding and decoding protocols, such as G.711 (A-law/-law), G.723.1, and G.729 (A/B) Local announcement services Echo cancellation Media Gateway Controller (MGC) dual homing trict security The MA5600T supports the following specifications: Prevention of DoS attacks on the system Access control list (ACL)-based access control Layer 2 (L2) user isolation and controlled mutual access Encrypted broadcast transmission in the downstream direction for different users, such as Advanced Encryption Standard (AES) 128-bit encryption

3.

EMS for the MA5600T

EMS for the MA5600T V800R005C03: N2000 BMS V200R011C03 4. Documentation for the MA5600T
31183207-MA5600T Electronic Documentation-(V800R005C03_01,MSAN) 31183209-MA5600T Electronic Documentation-(V800R005C03_01,GPON)

11

You might also like