Anda di halaman 1dari 80

iManager M2000 V200R013

Basic Feature Description(eWBB2.1)

Issue

02

Date

2012-04-12

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks
and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the commercial contract made between
Huawei and the customer. All or partial products, services and features described in this document may not
be within the purchased scope or the usage scope. Unless otherwise agreed by the contract, all
statements, information, and recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied .

Huawei Technologies Co., Ltd.


Address:

Huawei Industrial Base


Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website:

http://www.huawei.com

Email:

support@huawei.com

iManager M2000 V200R012


Basic Feature Description

Contents
1 Overview......................................................................................................................................... 2
2 Basic Features (WOFD-100000) ................................................................................................... 3
2.1 Platform ............................................................................................................................................................ 3
2.2 Fault Management .......................................................................................................................................... 15
2.3 Configuration Management ............................................................................................................................ 27
2.4 Performance Management .............................................................................................................................. 34
2.5 Security Management ..................................................................................................................................... 40
2.6 Topology Management ................................................................................................................................... 52
2.7 NE License Management ............................................................................................................................... 54
2.8 Hardware and Software Management ............................................................................................................ 56
2.9 Network Monitoring and Analysis ................................................................................................................. 59
2.10 FARS ............................................................................................................................................................ 67
2.11 Base Station Commissioning Management .................................................................................................. 73

3 Acronyms and Abbreviations ................................................................................................... 76

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Overview

This document describes the basic features provided by Huawei M2000 V200R012. This
document helps users understand the M2000 features.
The network elements (NEs) in this document refer to the network devices managed by the
M2000. The M2000 manages eWBB based on Long Term Evolution (LTE), .
The M2000 manages the following eRAN NEs:

Base station: eNodeB, including DBS3900 LTE

Clock server: IP Clock Server

The M2000 manages the following evolved packet core (EPC) NEs:

Issue 02 (2012-04-12)

Enterprise core network system: eCNS

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Basic Features (WOFD-100000)

2.1 Platform
WOFD-000100 Basic M2000 Service
Availability
This feature was introduced in M2000 V200R003.

Summary
This feature provides hardware and software platforms and basic functions required for the
proper operation of the M2000. Basic functions include system operating-status monitoring,
online help, and remote maintenance.

Benefits
The M2000 centrally manages LTE network. Based on common software and hardware
platforms, the M2000 provides various network management application services such as alarm,
performance, security, and configuration management. These functions improve the M2000's
working efficiency, reduce operation and maintenance (O&M) costs, and therefore minimize
telecom operators' investments.

Description
This feature provides the following functions:

Hardware and software platforms


For details about the hardware and software platforms, see iManager M2000 V200R012
Product Description.

M2000 software integrity check


This function ensures the accuracy and integrity of the M2000 software when it is being
installed on the live network. When releasing an M2000 software version, the M2000 uses
a digital certificate to sign the software version. Before installing or upgrading the M2000
software, the M2000 verifies the digital certificate of the software. If the digital certificate
passes the verification, the M2000 proceeds with the installation or upgrade. Otherwise,
the M2000 provides information about the verification failure.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Online help
The M2000 provides online help information that supports functions such as hotspot help,
full-text search, and offline browse. Online help includes the following items:

Description of M2000 functions such as fault, configuration, performance, security,


and topology management, and how to implement these functions

Description and valid value ranges of MML command parameters

Details about configuration parameters, alarms, and performance counters

Users can switch to Help information about the MML commands, alarms, performance
counters, and configuration objects and parameters from the command-line interface
(CLI), alarm, performance, and configuration management windows.
Users can create, edit, delete, and manage remarks on any Help pages. Remarks
management functions include querying, importing, and exporting.

M2000 status monitoring


This function monitors the M2000, database, and hardware status, and performance
counters in real time.

System status information that can be monitored includes the server, service and
process status, database and disk partition space, and component information. When a
fault occurs on the hardware, the M2000 generates an alarm.

M2000 license management


The M2000 license defines the M2000's management capability on the network. The
M2000 provides specific network resource management capacity and optional features
under license control.
The M2000 license control items consist of function control items and resource control
items. Users can view the function authorization information, update the license file, and
export license information to a CSV or XLS file.

Function control items: authorized optional M2000 features controlled on the basis of
functions.

Resource control items: authorized M2000 features that are controlled by the number
of resources, manageable resource capacities, and number of used resources of these
features. The M2000 generates an alarm if the number of network resources managed
by a resource control item exceeds the number specified by the license. Users can
manually clear the alarm.

Invalidating a license
The M2000 allows users to invalidate a license on the client and generates an invalid code.
According to the invalid code, Huawei technical support personnel apply for a new license.
This significantly improves the efficiency of updating licenses in cases such as expansion,
incremental sales, electronic serial number (ESN) replacement, and version upgrade.

Concurrent M2000 clients


The M2000 supports multiple concurrent clients. The number of concurrent clients that the
M2000 can manage depends on the hardware configuration of the M2000 server.

Web-based installation and automatic upgrade of the M2000 client


Users can install the M2000 client locally or remotely through a web browser.
In the case of a remote web-based installation, users can log in to the M2000 server
through a web browser and install the M2000 client.
The M2000 supports automatic upgrades of the M2000 client. If the version of the M2000
client is inconsistent with the server version when users log in, the M2000 automatically

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

updates the client software to the matching version according to the user confirmation.
This improves the efficiency of changing client versions and reduces maintenance costs.

Dynamic adaption of new NE version


The M2000 provides the mediation solution to match multiple NE versions. Therefore, to
manage a new NE version, users only need to install the mediation of the NE without
upgrading the M2000.
During the mediation installation, the M2000 can provide network management services
properly. The installation of mediation does not affect the online users who do not require
the mediation version. Users who require the new mediation need log in to the client again
to use the latest mediation version.
In scenarios such as initial site deployment and network upgrade, multiple mediations
need to be loaded at a time. The M2000 can load NE mediations in batches, reducing the
loading time and improving efficiency.

Online user monitoring


The M2000 monitors the session status and operations performed by all M2000 users. The
user-session monitoring can display information such as user name, maintenance terminal
IP address, user type, session start time, and user group. The user-operation monitoring
can display information such as user name, maintenance terminal IP address, security
operation, operation object, risk level and execution result. With this function,
administrators can force a specified user to log out.

Workbench management
The M2000 provides a workbench for function and application shortcuts. Users can create
function and application shortcuts on the workbench, which simplifies operations and
improves operation efficiency. Users can also customize the names, description, and icons
of workbench shortcuts. The M2000 provides default workbench shortcuts to certain
functions such as centralized MML CLI, centralized task management, system monitoring,
and topology management.

Enhancement

The following functions are added to M2000 V200R011C00:

Dynamically loading NE mediations in batches

Running M2000 clients on the Windows 7 operating system

Verifying M2000 software integrity

The following functions are added to M2000 V200R010:

Creating and managing remarks in a Help window

Invalidating licenses

The following functions are added to M2000 V200R009:

Verifying M2000 services after the M2000 is upgraded

Supporting Windows Vista and XP operating systems

Managing functions and applications using a workspace

Updating M2000 license files on the client

The following functions are added to M2000 V200R008:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Collecting M2000 performance statistics

Installing and automatically upgrading M2000 clients on a web browser

Loading M2000 mediation versions online

WOFD-000200 File Transfer Management


Availability
This feature was introduced in M2000 V200R003.

Summary
The M2000 supports file transfer between the M2000 server and the M2000 client, between the
M2000 and NEs, and between the M2000 and a third-party system by using File Transfer
Protocol (FTP).
To ensure data transmission security, the M2000 supports FTPS- and SFTP-based file transfer.
For details, see the optional feature WOFD-210100 Encrypted Transmission.

Benefits
This feature ensures effective file transfers between the M2000 server and the M2000 client,
between the M2000 and NEs, and between the M2000 and a third-party system.

Description
FTP is a standard protocol, which specifies that file transfer between network nodes can be
implemented by setting up control channels and data transfer channels. Complying with the
RFC 959 FTP standard protocol, the M2000 supports file transfer and management. It transfers
files between the M2000 server and the M2000 client, between the M2000 and NEs, and
between the M2000 and a third-party system. The data to be transferred is as follows:

Performance data, log, and configuration data files collected from NEs or sent to a
third-party system by the M2000

NE version, configuration data, and patch files downloaded from the M2000 by NEs

License and NE version files transferred between the M2000 client and server

According to the application scenarios, the M2000 can function as an FTP server or client. For
example, when transferring files to a third-party system, the M2000 can be either an FTP server
or client based on user requirements. When upgrading NEs, users need to upload the software
version from the M2000 client to the M2000 server. In such a case, the M2000 server functions
as an FTP server, while the M2000 client functions as an FTP client.
The M2000 manages parameters related to file transfer. For example, it allows users to set file
transfer between NEs and the M2000 server and between the M2000 client and server, disable
plaintext transfer, and set a transfer server and a third-party FTP server.
Generally, FTP and File Transfer Protocol over SSL (FTPS) use default service ports, which
may cause security risks. To improve system security, the M2000 allows users to customize
FTP and FTPS service ports.

Enhancement
The function of customizing FTP and FTPS service ports is added to M2000 V200R012C00.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Dependency
None.

WOFD-000300 Application Management Platform


Availability
This feature was introduced in M2000 V200R008.

Summary
The application management platform supports centralized management of iSStar script
applications and other applications. The iSStar is an enhanced script development platform
provided by the M2000. With the application management platform, the M2000 manages
application shortcuts by category and manages iSStar script applications.
The iSStar script applications are classified into local script applications and remote script
applications. Local script application files are stored and executed on the M2000 client. Remote
script application files are stored and executed on the M2000 server.

Benefits
This feature brings about the following benefits:

Using this feature, users do not need to pay attention to the implementation of the iSStar
script. After the script is released, users can run it and obtain the execution results through
the shortcut on the application management platform.

The application management platform can also manage other applications to implement
the uniform management of scripts and other applications.

Description
The application management platform is used to manage the iSStar and other applications. This
feature allows users to categorize application shortcuts and manage the remote iSStar
applications, including management for workspaces, application shortcuts, remote applications,
and iSStar tasks.

Workspace management
A workspace is a management platform for categorizing application shortcuts. The
applications of the same category can be managed by one workspace. Users can categorize
applications based on their preferences and manage these applications on different
workspaces. Users can create or delete workspaces and change the workspace names.

Remote application management


The application management platform allows users to manage remote iSStar script
applications, such as viewing, issuing, downloading, and deleting the applications.

Management of application shortcuts


Users can create, delete, and copy shortcuts. They can also modify the attributes of the
shortcuts. In addition, users can create shortcuts to both local and remote iSStar script
applications. When using the shortcuts of iSStar script applications, users can select
multiple NEs at a time to create script tasks in batches.

Issue 02 (2012-04-12)

Task management

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

The M2000 provides a GUI for managing local and remote iSStar script tasks, including
tasks started through application shortcuts or through the iSStar development platform.
Users can check task information such as script file path and name, NE, progress, start
time, end time, status, task creator, and IP address of the client where a local task is
executed. Users can also create, copy, start, suspend, resume a task, delete tasks in batches,
and check task execution results.

WOFD-070100 Local Maintenance Agent


Availability
This feature was introduced in M2000 V200R002.

Description
The M2000 provides communication agents for local maintenance terminals (LMTs) to
maintain NEs. When an NE and its LMT are located on different network segments, the LMT
can connect to the NE through the agent provided by the M2000 to maintain the NE.
Along with the development and spread of the Web LMT, M2000 can also be a communication
proxy for the Web LMT.
LMTs can still set up connections to NEs through SSL or HTTPs to ensure transmission
security when using the M2000 as an agent.

WOFD-070800 Supporting Network Time Synchronization


Availability
This feature was introduced in M2000 V200R002.

Summary
The M2000 supports the NTP/SNTP network time synchronization protocols so that it can
synchronize time with the time server of a third-party system and provide synchronization time
sources for NEs. This ensures that the time between the M2000 and the NEs is synchronized.
In addition, according to the security policy of the telecom operator, the M2000 uses MD5
encrypted algorithm defined in the NTP V3 in time synchronization.

Benefits
This feature ensures that the time of NEs on the entire network is synchronized. In addition, it
supports adopting the encrypted authentication to enhance the security of network time
synchronization.

Description
If the NTP server provided by a customer network cannot communicate with the mobile
communication devices managed by the M2000, the M2000 server can function as an
intermediate NTP server. The M2000 server obtains the reference time from the NTP server
provided by the customer and sends time synchronization signals to NEs to ensure the
consistency between the time of all NEs and the time of the time source. The M2000 monitors

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

the operating status of the NTP service in real time and generates an alarm after detecting any
exceptions in the NTP service or a synchronization failure with the upper-level time source.
The NTP protocol supports two authentication modes: unauthenticated and encrypted
authentication. Customer can determine the authentication mode according to security
requirements. If the upper-layer NTP server provided by the telecom operator uses the
encrypted authentication mode, the M2000 server synchronizes time with the time of the
upper-layer NTP server in encrypted authentication mode. After NEs send a time
synchronization request to the M2000, the M2000 allows NEs to synchronize time with the
M2000 server time in encrypted authentication mode.
This feature requires customer to provide a top-level clock source server. If customer requires a
top-level clock source server from Huawei, they need to purchase Huawei entire-network time
synchronization solution. For details about the solution, see the feature WOFD-540100
Network Time Synchronization Solution.

Enhancement
The following functions are added to M2000 V200R011C00:

The M2000 generates an alarm after detecting any exceptions in the NTP service or a
synchronization failure with the upper-level time source.

The following function is added to M2000 V200R009:

The M2000 supports encrypted authentication of the NTP.

Dependency
None

WOFD-070900 Daylight Saving Time and Management of Multiple Time Zones


Availability
This feature was introduced in M2000 V200R003.

Description
For some countries that use the Daylight Saving Time (DST), there are two time switchovers
every year. Some countries cross multiple time zones. Therefore, the time of NEs in different
time zones must be different.
This feature ensures that the M2000 adapts to DST shifts on NEs and allows users to set time
zone information. For example, users can choose whether to display server time or local NE
time in the alarm browsing window. If the area where an NE is located is using DST, the M2000
displays DST in MML messages.

WOFD-071200 Centralized Task Manager


Availability
This feature was introduced in M2000 V200R005.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager M2000 V200R012


Basic Feature Description

Description
Centralized task manager is a task management mechanism of the M2000. It manages and
controls all the scheduled tasks in the M2000 system through a centralized task management
window.
The tasks managed centrally are classified into system-scheduled tasks and user-scheduled
tasks. There are two types of tasks: one-time tasks and periodic tasks. Users can create
user-scheduled tasks and select one-time tasks or periodic tasks as required. All
system-scheduled tasks are periodic tasks and cannot be created by users.
Users can view information about all tasks on the task list provided by the M2000. The task
information includes task name, execution period, type, creator, status, execution progress,
execution result, and last execution time. Users can also perform specific operations on the
tasks, such as start, delete, suspend, copy, or resume the tasks. In addition, users can modify
task parameters.
System-scheduled tasks are as follows:

Database capacity management

Data export

Synchronization

M2000 data backup

The limitations on the operations of system tasks are as follows:

Only users in the administrator group can manage and view system-scheduled tasks.

System-scheduled tasks cannot be copied or deleted, and only some parameters can be
modified.

Data capacity tasks in system-scheduled tasks cannot be suspended or resumed. Data


export tasks, synchronization tasks, and backup tasks can be suspended and resumed.
Users can set the time to suspend and resume tasks.

User-scheduled tasks are as follows:

NE license backup

NE backup

BSC and RNC license activation

Distribution of NodeB licenses

MML script execution

iSStar script execution

Software download

Verification after upgrade

Dependency
None

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10

iManager M2000 V200R012


Basic Feature Description

WOFD-071300 Script Trigger


Availability
This feature was introduced in M2000 V200R006.

Description
This feature supports two triggering modes, customizing menus to trigger scripts and automatic
triggering.
Customizing menus to trigger scripts: This function allows users to customize the menus for
script triggering. Users can add, delete, modify, or query user-defined menus. When adding a
user-defined menu, users can select the script and set script execution parameters. The
user-defined menus are used to trigger scripts stored on the M2000 client.
Automatic triggering: The M2000 allows users to set script triggering conditions and specify
the scripts. Triggering conditions include validity time range, script type, execution period, and
alarm ID. The M2000 automatically checks whether script triggering conditions are met. If the
conditions are met, the corresponding script is automatically triggered.
The automatically triggered scripts are scripts stored on the M2000 server. Currently, HSL
scripts and the following Shell scripts can be automatically triggered:

Bourne Again shell

Bourne shell

C shell

Z shell

Korn shell

TC shell

Enhancement
The following function is added to M2000 V200R008:

This feature can be used for triggering the HSL script.

WOFD-071400 Auto IP Address Allocation Service for BTS


Availability
This feature was introduced in M2000 V200R008.

Description
The M2000 automatically assigns IP addresses to BTSs through the DHCP protocol. The
M2000 extends the DHCP protocol based on the standard protocol to support the required
functions, and automatically assigns IP addresses to Huawei BSs on IP networks based on the
extended DHCP protocol. The DHCP Server service provides the following functions:

Issue 02 (2012-04-12)

The M2000 extends protocols based on the DHCP protocol and assigns IP addresses based
on specific configuration information such as the BTS name, BTS ID, IP address, and
electronic serial number (ESN).

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11

iManager M2000 V200R012


Basic Feature Description

The M2000 allows users to add, delete, or modify the binding relationships between
specific NE configuration information and IP addresses on the M2000 client. It also allows
users to import the information about the binding relationships into a file.

The M2000 allows users to view the assignment information about IP addresses. To
facilitate information browse, it also allows users to filter IP address assignment records
by fields such as BTS ID, BTS name, and ESN.

Enhancement
The following function is added to M2000 V200R011C01:

Allowing users to filter IP address assignment records by fields such as BTS ID, BTS
name, and ESN

WOFD-071500 User Profile Management


Availability
This feature was introduced in M2000 V200R008.

Description
The user profile setting provides the user-defined settings based on M2000 users. Therefore,
multiple maintenance terminals can share the user-defined user settings. The M2000 provides
default settings for all M2000 users. The supported profile setting options are as follows:

Display styles of parameter settings on the M2000 client, such as area setting, metrology
setting, LMT prompt setting, agent server setting, MML client setting, file transfer
parameter setting, alarm sound and colors, time mode, system lock time, data display
modes, system login modes, display of alarm states in the topology view, and display of
the performance module interface.

Environment setting of function interfaces, such as the topology view, activated subnets
and filter criteria in the topology view, filter criteria for querying alarms, and alarm query
templates.

WOFD-080100 Disk Redundant Backup


Availability
This feature was introduced in M2000 V200R002.

Description
The local disks of the M2000 support the RAID 1 backup mode (1+1 disk mirroring).

WOFD-080300 M2000 Data Backup and Restore

Availability
This feature was introduced in M2000 V200R002.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

12

iManager M2000 V200R012


Basic Feature Description

Summary
The M2000 provides the backup and restore solutions for M2000 application data including
M2000 application and service data.

Benefits
This feature brings about the following benefits:

The M2000 provides cost-efficient backup and restore solutions for the O&M network.

Description
This feature provides the following functions:

Backing up and restoring application data


Application data consists of the data in the M2000 application and the service data in the
M2000 database.
The M2000 provides a user-friendly GUI for backup operations and management. Users
can set backup tasks on the M2000 client to back up the application data of the M2000 in
full or incremental backup mode. The M2000 using the Sybase database supports both full
and incremental backups. The M2000 using the Oracle database supports only the full
backup.
The system provides automatic and manual backups. A manual backup is started
immediately after users activate the backup. Manual backups can be implemented in
incremental or full backup mode. The M2000 manages automatic backup tasks based on
the feature WOFD-071200 Centralized Task Manager. The M2000 using Oracle database
performs a full backup each day. Users can also specify the backup execution time.
To restore the application data in specified full and incremental backup files to the
database and applications, users need to run the restore script.

Dependency
This feature is supported when implement using Sybase database.

WOFD-080400 NE Data Backup and Restore

Availability
This feature was introduced in M2000 V200R002.

Summary
The M2000 supports backup and restore of key NE data. If NE data is missing due to a fault,
users can use the backup data to restore the NE data on the M2000.

Description
Generally, key NE data (such as NE configuration data and logs) is stored on NEs.
Key NE data is backed up and restored on the M2000. The data can be backed up manually or
automatically on a scheduled basis. The M2000 centrally manages and schedules backup tasks

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

13

iManager M2000 V200R012


Basic Feature Description

by using the feature WOFD-071200 Centralized Task Manager. The M2000 backs up the data
based on the preset period and time.
Data must be restored manually because it may lead to NE restart. After users start restoring NE
data, the M2000 downloads backup NE data to the NE and runs data restoration commands for
the data to take effect. Users must upload the NE data that was downloaded and stored on the
M2000 client to the M2000 server before restoring the data.
NE logs cannot be modified or replaced, and the restore of NE logs may result in invalid modification of
the NE logs. Therefore, the M2000 does not provide the function of restoring NE logs.

WOFD-210200 Automatic File Upload


Availability
This feature was introduced in M2000 V200R008.

Summary
The M2000 supports the function of automatically uploading the northbound configuration files,
performance files, inventory files and alarm files to the specified FTP server by using FTP.
To ensure data transmission security, the M2000 supports SFTP-based file transfer with the
third-party system. For details, see the optional feature WOFD-210100 Encrypted
Transmission.

Benefits

The M2000 sets up and manages the transmission connection.

Description
This feature provides the following functions:

Configuring the uploaded information about the server


On the client, users can choose to upload the exported files of configuration data, alarms,
performance data, inventory data, and license data and set the IP address, directory, user
name, password, and file compression mode of the server. The M2000 creates a directory
on the server according to the settings. Users can configure specific file servers for
different types of data. The M2000 can upload data files to a maximum of 10 file servers.

Supporting the file transfer in single-connection or multi-connection mode


The types of exported files comprise the configuration files, performance files, alarm files,
and inventory files. The M2000 can upload the files of each type to one server (single
connection) or multiple servers (multi-connection). By default, the single-connection
mode is used. Users can set the uploading mode.

Creating a directory on the uploading server

Users can create a directory on the server for the M2000 to save uploaded files.
Alternatively, the M2000 can create a directory for saving the files. The directory structure
is the same as that of the M2000 export file directory.

Managing file transfer


On the M2000 client, users can browse files to be transferred and files failing to be
transferred. In addition, users can delete the files to be transferred.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

14

iManager M2000 V200R012


Basic Feature Description

Users can automatically re-transfer the files that failed to be transferred according to the
configuration parameters.

The valid duration for re-transferring the files is 1 hour. The system cancels the transfer
of the files that exceed the valid duration.

The system transfers the files again three times. The system records the files that are
re-transferred more than three times, to the logs.

The interval for re-transferring files is 15 minutes.

Managing faults
If a file fails to be uploaded to a system because the FTP service of a third-party system is
not enabled or the network is disconnected, the M2000 generates an alarm.

Dependency
This feature is used with the following features to implement automatic file upload and cannot
work independently:

WOFD-070400 NE License Management

2.2 Fault Management


WOFD-010100 Centralized Storage of Alarm Information
Availability
This feature was introduced in M2000 V200R002.

Description
The M2000 centrally collects the alarm information about all the entities (including the M2000
itself) of managed networks and stores the alarm information in the database. The fault
management module of the M2000 can manage alarms and events. Alarms are classified into
ADAC alarms and ADMC alarms. Unless otherwise stated, alarms mentioned in this document
do not include events.
Event: An event is a notification that is generated and needs to be sent to users when the system
is running properly. For example, the notification can be the deletion, modification, or status
change of an object.
Fault: A fault occurs when the system is running improperly. The fault may affect the operation
capability or backup capability.
Alarm: An alarm is a notification that is generated when the system detects a fault.
Based on the detection capability, alarms are categorized as ADAC alarms and ADMC alarms.
ADAC (Auto Detected Auto Cleared) alarm: An ADAC alarm is generated and cleared when
specified conditions are met. When a fault occurs, an alarm occurrence notification is generated.
After the fault is cleared, an alarm clearance notification is generated.
ADMC alarm: An ADMC alarm is generated when specified conditions are met, but it cannot
be cleared automatically. When a fault occurs, an alarm occurrence notification is generated.
An alarm clearance notification, however, is not sent. O&M personnel need to check that the
fault is cleared and manually clear the ADMC alarm.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15

iManager M2000 V200R012


Basic Feature Description

After receiving the alarm and event reported by an NE, the M2000 preprocesses the alarm and
event and stores them in the centralized mode. The information serves as the reference for
future browse, collection of statistics, and query.
The M2000 records each alarm or event as one log. The database stores alarm or event logs for
a maximum of 90 days. Users can change the period. If the M2000 alarm database does not
meet the standard configuration or the network size exceeds the management capacity of the
server, users may not be able to store the logs for 90 days. When the M2000 reaches the end of
the storage period or disk capacity limit, the M2000 automatically dumps event logs and logs
for acknowledged and cleared alarms to files.

WOFD-010300 Alarm Viewer


Availability
This feature was introduced in M2000 V200R002.

Summary
This feature allows users to view the alarms and events of NEs and the M2000 in real time.
Based on the browse results, users can also perform operations such as saving and printing
alarm information, viewing detailed alarm information, and locating alarms in the topology
view. Users can set conditions for filtering alarms or save the filter criteria as a template for
future use.
In addition, users can customize the colors and properties of alarms and events displayed in the
browsing window. Users can also set the uncleared alarms to be highlighted.

Benefits
This feature brings about the following benefits:

The M2000 allows users to browse alarms on the entire network in real time. It also allows
users to set various filter criteria to focus on key network faults.

The function of customizing display styles helps users to personalize working interfaces.

Description
This feature is described as follows:

Alarm/Event browse
The M2000 displays the alarms that meet the preset filter criteria in the alarm/event
browsing window. Multiple browsing windows can be opened concurrently to display
alarm logs, event logs, and alarm lists. Users can set filter criteria in each browsing
window.
The alarm list displays important alarms that users must focus on or handle. If an alarm has
duplicate alarm records, only one record is displayed in the alarm list. During routine
maintenance, O&M personnel need to monitor only the alarm list. By default,
acknowledged and cleared alarms are not stored in the alarm list. Users can store these
alarms after setting a storage period.
Users can set the following filter criteria: alarm source including NE types, NEs, MOs,
MBTSs, object groups and topology maintenance areas, severity, type, and name. Events
do not need to be cleared or acknowledged. Therefore, log browse does not support
status-related filter criteria such as clearance status and acknowledgment status.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

16

iManager M2000 V200R012


Basic Feature Description

The M2000 supports the following alarm types:

Power system alarm

Environment system alarm

Signaling system alarm

Trunk system alarm

Hardware system alarm

Software system alarm

Running system alarm

Communication system alarm

QoS alarm

Processing error alarm

Internal alarm

Integrity violation alarm

Operational violation alarm

Physical violation alarm

Security violation alarm

Time domain violation alarm

In addition, the M2000 supports the browse of alarms based on alarm categories. Users
can browse alarms according to alarm severities or alarm statuses in the same window.
Alarms statuses are unacknowledged and uncleared, unacknowledged and cleared,
acknowledged and uncleared, and acknowledged and clear.
In the event browsing window, users can query event details, locate an event on the
corresponding NE in the topology view, mask the event, or send a remote event
notification. In the alarm browsing windows, users can perform more operations, such as
acknowledging, unacknowledging, and clearing alarms.

Template
Users can save common filter criteria as a template so that they can use the template to set
filter criteria when browsing alarms or events. The M2000 filters the browse results
according to the conditions set in the template. Alarm templates are saved by user.
The owner of a template is the user who creates the template. Such users can share their
templates with other users. Administrators can manage and use all templates. Common
users can manage and use their templates and shared templates.
The M2000 provides a centralized template management window. Users can manage their
templates, for example, viewing, creating, deleting, modifying, and renaming templates.

Alarm/Event groups and object groups


The M2000 allows users to view, query, and collect the statistics on alarms and events
based on alarm/event groups and object groups.
An alarm or event group is a set of alarms or events.
An object group is a set of objects where alarms or events are generated, for example, NEs,
boards, cells, and links.
Users can define alarm/event groups and object groups according to the actual
requirements.

Saving and printing alarm/event information


Users can save the alarm or event information in the browsing window as TXT, HTML,
PDF, XLS, and CSV files or print the information. Users can save or print part of or all
alarms.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17

iManager M2000 V200R012


Basic Feature Description

Customizing alarm/event display styles


The M2000 allows users to customize the following elements in the alarm browsing
window:

Colors in which alarms/events are displayed

Attributes of the alarms/events to be displayed

Orders for sorting alarm/event attribute columns

Conditions for sorting alarm/event attributes

The settings take effect only on the current client.


Alarm properties include alarm names, severities, types, location information, IDs,
clearance status, and acknowledgment status. Events do not need to be cleared or
acknowledged. Therefore, log browse does not support status-related filter criteria such as
clearance status and acknowledgment status.
In the alarm browsing window, users can sort alarms/events according to one or more
alarm/event attributes.
Alarms and events of different severities are identified with different colors. Users can
modify the default settings. The settings take effect in the alarm browsing window, alarm
boards, and alarm icons in the topology view.
The M2000 checks alarms and highlights the alarms that are in the unacknowledged and
uncleared state, unacknowledged and cleared state, and acknowledged and uncleared state
for a long time. Users can set thresholds for alarms of different severities. When the status
or state duration reaches the preset thresholds, the M2000 highlights the corresponding
alarms.

Enhancement
The following functions are added to M2000 V200R009:

The M2000 allows users to open the device panel of the NE that generates the selected
alarm when users locate the device panel in the alarm viewer.

The M2000 supports alarm/event groups and object groups. Users can perform operations
such as viewing, querying, and collecting the statistics on alarms and events based on
alarm/event groups and object groups.

WOFD-014200 Real-Time Alarm Notification


Availability
This feature was introduced in M2000 V200R002.

Summary
The M2000 supports the real-time notification of alarms in the forms of sound, light, blinking,
and display of statistical results. Alarms are notified through alarm boxes, alarm boards, tool
tips, and real-time statistics.

Benefits
The M2000 supports the real-time alarm notification in multiple modes. This ensures that users
can learn about the generation and clearance of alarms in real time to take corresponding
troubleshooting measures, reducing the impacts on network services.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18

iManager M2000 V200R012


Basic Feature Description

Description
This feature is described as follows:

Alarm box
The M2000 notifies users of audible and visual alarms through an alarm box. The alarm
box is connected to the M2000 client through a serial port. The M2000 client sends the
alarms that meet the preset conditions to the alarm box in real time. Then, the alarm box
generates sound and the corresponding alarm indicators blink according to the alarm
severities. Users can filter alarms based on alarm severities or by using a query template.
The filter criteria set in a query template are the same as the filter criteria in the feature
WOFD-010300 Alarm Viewer.

Alarm notification by sound and light


M2000 provides alarm boards to display the total number of current alarms, number of
alarms of each severity, and number of alarms of each severity in each status in real time
and to notify users of new alarms by emitting sound and through blinking icons. Users can
customize notification sound.
Users can set a template to control the range for collecting the statistics of alarms. The
conditions in the template are the same as the conditions described in the feature
WOFD-010300 Alarm Viewer.

Tool tip
After users set the alarm indication in the topology view, the NE icon is identified in the
color of the alarm of the highest severity when alarms in the same status exist on an NE.
The alarm states that can be selected are unacknowledged and uncleared. In addition, users
can set whether to display the current number of alarms of the highest severity on NEs.

Real-time collection of alarm statistics


When creating statistical charts, users need to select alarm templates. According to filter
criteria in the alarm list templates, the M2000 filters alarms and collects the statistics of
alarms based on alarm severities and types. The statistical results are displayed in a bar
chart and are updated in real time according to the generation or clearance of alarms.
Users can select multiple alarm list templates to create multiple statistical charts.
Users can obtain the details about alarm sources in masking conditions by referring to the feature
WOFD-010300 Alarm Viewer.

WOFD-011400 Automatic Alarm Retrieval


Availability
This feature was introduced in M2000 V200R002.

Description
After the connection between the M2000 and NEs is restored, the M2000 automatically
synchronizes the data between the M2000 and NEs to obtain the alarm data generated during
the disconnection. This feature ensures that the alarm data on the M2000 and NEs is consistent.
When NEs report alarms to the M2000, the M2000 automatically checks whether the alarm data
on the M2000 is consistent with that on NEs. If the data is inconsistent, the M2000
synchronizes the alarm data on the M2000 with that on NEs.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

19

iManager M2000 V200R012


Basic Feature Description

WOFD-011500 Alarm Synchronization


Availability
This feature was introduced in M2000 V200R002.

Description
Generally, after an alarm is generated on an NE or the M2000, the alarm is automatically
reported to the M2000 in real time. The M2000 supports manual and scheduled alarm
synchronization modes. Therefore, alarms can be synchronized in the following scenarios:

The connection between an NE and the M2000 is restored after it is disrupted.

The status of an alarm is updated after the alarm is handled.

The M2000 supports manual alarm synchronization and scheduled alarm synchronization.
In manual synchronization mode, users manually synchronize the alarm data on the M2000
with that on NEs through the M2000 client.
Scheduled synchronization tasks are managed and scheduled by using the feature
WOFD-071200 Centralized Task Manager. In scheduled synchronization mode, the M2000
synchronizes the alarm data on the M2000 with that on NEs according to the preset period and
time. Users can change the synchronization period and time. The unit of the synchronization
period is day. The default synchronization period is one day.

WOFD-014000 Alarm Pre-Processing on M2000


Availability
This feature was introduced in M2000 V200R002.

Summary
Alarm pre-processing on the M2000 refers to processing the new alarms and events received by
the M2000 before they are saved to the database. Alarm pre-processing involves alarm masking,
alarm severity redefinition, and alarm correlation analysis.

Benefits
The M2000 provides flexible functions of masking alarms and customizing the rules for
analyzing alarm correlations. This helps in sharing the maintenance experience of O&M
personnel, reducing the number of alarms, and improving work efficiency.

Description
This feature provides the following functions:

Masking alarms and events


After receiving alarms or events, the M2000 checks and discards the alarms or events that
meet the preset conditions.
The supported conditions for masking alarms and events include alarm/event sources,
alarm/event severities, alarm/event names, alarm location information, alarm duration,

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

20

iManager M2000 V200R012


Basic Feature Description

and alarm/event types. Users can also set the time segment for alarm masking conditions
to take effect.
Delayed alarm/event processing: If the duration of an alarm/event is shorter than the
threshold set in the alarm/event masking criteria, the M2000 discards the alarm/event after
analyzing toggling alarms. When the duration of an alarm/event reaches or exceeds the
preset threshold, the M2000 delays processing the alarm/event. The delay time equals the
preset threshold of alarm/event duration.
Users can obtain the details about alarm sources in masking conditions by referring to the feature
WOFD-010300 Alarm Viewer.

Redefining alarm and event severities


Users can modify the properties of alarms and events on the M2000. For example, users
can change the severities, names, and types of alarms and events. After the alarm and
event properties are redefined, the M2000 displays the alarms and events based on the new
properties. The redefinition takes effect only on the M2000. On NEs, the properties of
alarms and events remain unchanged.
Alarm severities can be redefined on the basis of time segments, such as during a busy
hour and a non-busy hour.

Analyzing correlations
Correlation rules are classified into default and user-defined rules.
Default rules are provided by the system and can be instantiated by users. These rules are
used for analyzing alarm or event occurrence frequency, intermittent alarms, repeated
events, and duration of acknowledged and uncleared alarms.
Associated concepts are described as follows:
Alarm or event occurrence frequency: If the number of repeated alarms or events exceeds
a preset threshold within a specified period, the M2000 considers that these alarms or
events are correlated and performs one of the following operations, which have different
threshold ranges:

Changing the alarm or event severity

Generating an avalanche alarm

Generating an avalanche alarm and masking alarms or events

Generating a toggling alarm

Intermittent alarm: The M2000 generates an intermittent alarm if the interval for reporting
the clearance alarm of an alarm is within a specified period. The M2000 displays only the
first intermittent alarm and discards other ones. If the number of intermittent alarms
exceeds a preset threshold within a specified period, the M2000 generates a
high-frequency intermittent alarm. When intermittent alarms are generated at a lower
frequency than the threshold, the high-frequency intermittent alarm is automatically
cleared.
Repeated event: The M2000 generates a repeated event if the interval for reporting an
event is within a specified period. The M2000 displays only the first repeated event and
discards other ones. If the number of repeated events exceeds a preset threshold within a
specified period, the M2000 generates a high-frequency repeated event.
With the correlation analysis function, users can create rule instances for analyzing
alarms/events frequency, intermittent alarms, and repeated events. If alarms/events meet
the preset conditions, the M2000 deals with the information about redundant
alarms/events according to the preset policy. This prevents the M2000 from generating or
clearing the same alarms, enhancing system reliability.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

21

iManager M2000 V200R012


Basic Feature Description

The purpose of analyzing the duration of acknowledged and uncleared alarms is to prompt
users to clear these alarms in time. If certain alarms are already acknowledged but are not
cleared for a long time, the M2000 sets the severity of these alarms to a higher level.
The M2000 allows users to define alarm correlation rules by setting root alarms, correlated
alarms, handling methods, handling conditions, analysis periods, and priorities through
the creation wizard.
Users can delete or modify alarm correlation rules.
After users apply advanced correlation rules, the M2000 discards the alarms/events that
meet the correlation rules. It can also redefine the severities of these alarms or set them to
correlative alarms. Therefore, the number of unnecessary alarms/events is reduced and
non-root alarms/events are not considered. Therefore, users can handle key alarms/events
to quickly locate and rectify related faults.
Advanced correlation rules support the following functions:

Setting correlations within a single NE and among multiple NEs.

The main property values in the alarm locating information can serve as correlation
conditions.

Users can set the interval for analyzing correlations.

Converting events to ADMC alarms


The M2000 allows users to convert an event to an ADMC alarm. Then, the ADMC alarm
is displayed in the alarm list. After the conversion setting is canceled, newly reported
records of this event are no longer displayed in the alarm list.

Enhancement
The following functions are added to M2000 V200R011C01:

The M2000 generates a summarized parallel alarm when the number of alarms meeting
the requirements exceeds Set Threshold.

The M2000 clears the summarized parallel alarm when the number of alarms is smaller
than Clear Threshold.

Users can add or delete summarized parallel alarm rule.

The following functions are added to M2000 V200R011C00:

The M2000 generates a toggling alarm in analyzing alarm or event occurrence frequency.

The following functions are added to M2000 V200R010:

The M2000 supports redefinition of alarm severities based on time segments.

The following functions are added to M2000 V200R009:

A wizard for creating advanced correlation rules is added, which improves the usability of
this feature.

The names and types of alarms/events can be redefined.

WOFD-012200 Alarm Severity Redefinition on NE


Availability
This feature was introduced in M2000 V200R002.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

22

iManager M2000 V200R012


Basic Feature Description

Description
Alarm severity redefinition on NEs allows users to change the severities of alarms and events
on NEs. After severities of alarms and events are redefined, NEs report alarms and events
according to the new severities, and the M2000 displays the alarms and events according to the
new severities.

WOFD-012400 Alarm Masking on NE


Availability
This feature was introduced in M2000 V200R002.

Description
Alarm masking on NEs allows users to set masking conditions on the M2000 and send the
conditions to NEs so that NEs do not report the alarms and events that meet the masking
conditions. Therefore, the masking for alarms and events is implemented on NEs.
The M2000 masks alarms and events according to alarm/event names and severities. When
setting conditions, users can sort NE objects according to NE types and sort alarms and events
according to alarm/event types and severities. This facilitates alarm/event selection.

Users can modify, delete, or query preset alarm masking conditions.


In addition, the M2000 allows users to import the masking conditions of alarms and events
from a file to the M2000. Users can export the preset masking conditions as a template, set
masking conditions in the template, and import the template to the M2000. Then, the M2000
generates masking conditions based on the records in the file.

WOFD-013400 Environment Alarm Setting


Availability
This feature was introduced in M2000 V200R002.

Summary
To monitor NE environments, the M2000 supports the settings of environment alarms.

Benefits
Users can customize environment alarms to learn about the faults in the equipment room
environment and remotely monitor the environment centrally. This helps ensure the normal
equipment operation.

Description
Based on the actual situations, users can set environment alarms of NEs through the M2000
client, and bind the alarms with an NE port. In addition, users can mount an environment
monitoring device on the port so that NEs can generate alarms and report the alarms to the
M2000 in real time when the environment monitoring device detects environment faults.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

23

iManager M2000 V200R012


Basic Feature Description

This feature requires alarm definition and binding information.


The alarm information to be defined includes alarm names, severities, and IDs.
Alarm binding information indicates the mapping between environment monitoring devices
and defined alarms (including alarm generation conditions). After the binding, NEs can
generate alarms based on the binding conditions and report the alarms to the M2000.
The M2000 also allows users to import and export environment alarms as XLS files. Users
export a template from the M2000, fill in required information, and import the template into the
M2000. The M2000 can then generate environment alarms based on the information in the
template.

Enhancement
The functions of importing and exporting environment alarms are added to M2000
V200R012C00.

WOFD-014100 Alarm Post-Processing on M2000


Availability
This feature was introduced in M2000 V200R002.

Summary
In alarm post-processing on the M2000, the M2000 allows users to perform a series of
operations on the alarms stored in the database, such as acknowledging alarms,
unacknowledging alarms, and collecting the statistics of alarms.

Benefits

According to the requirements of the 3GPP specifications, alarm acknowledgment, alarm


unacknowledgment, and status switch are supported to meet the requirements of network
O&M scenarios.

The M2000 collects the statistics on alarms based on different conditions and displays the
statistical results on the GUI so that users can directly learn about the alarm distribution on
the network.

Description
This feature provides the following functions:

Acknowledging and unacknowledging alarms


After users successfully acknowledge an alarm, its status automatically changes to
"Acknowledged." The M2000 supports manual acknowledgment and automatic
acknowledgment. In manual acknowledgment mode, users can select and acknowledge
alarms in the alarm browsing window. In automatic acknowledgment mode, alarms can be
automatically acknowledged according to the preset conditions.
Users can learn about the details of alarm sources in the automatic alarm acknowledgment conditions by
referring to the feature WOFD-010300 Alarm Viewer.

Users can unacknowledge the alarms that are acknowledged but not cleared. After an
alarm is successfully unacknowledged, its status automatically changes to
"Unacknowledged."
Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

24

iManager M2000 V200R012


Basic Feature Description

The M2000 records the information about the time and the user who performs the related
operations.

Collecting alarm and event statistics


Users can collect the statistics of alarms and events based on multiple conditions. The
statistical results can be displayed in a table or pie chart.
Supported statistical conditions are NE types, NEs, alarm/event names, severities, types,
and status. Users can collect alarm statistics based on a maximum of three conditions.
Users can save the statistical results as TXT, HTML, CSV, XLS or PDF files, or print the
results.
In addition, users can filter alarms before collecting statistics. The supported filter criteria
are the same as the conditions described in the feature WOFD-010300 Alarm Viewer.

WOFD-012000 Automatic Alarm Clearing


Availability
This feature was introduced in M2000 V200R002.

Description
When the fault on an NE or on the M2000 is rectified, the NE reports a cleared alarm and the
M2000 sets the status of the corresponding fault alarm to "Cleared."

WOFD-011900 Manual Alarm Clearing


Availability
This feature was introduced in M2000 V200R002.

Description
On the M2000 client, users can manually clear specified alarms. After an alarm is cleared, the
M2000 changes the status of this alarm to "Cleared" and instructs the related NE to change the
alarm status to "Cleared." This feature is used to clear the alarms that cannot be automatically
cleared or the alarms that do not exist according to user confirmation.

WOFD-013300 Alarm Checking


Availability
This feature was introduced in M2000 V200R002.

Description
This feature allows users on the M2000 client to check whether the status of a specified alarm is
consistent on the M2000 and on NEs. If the status is inconsistent, the M2000 updates the alarm
status.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

25

iManager M2000 V200R012


Basic Feature Description

WOFD-013900 Alarm Correlation View


Availability
This feature was introduced in M2000 V200R008.

Summary
This feature is used for classifying NE alarms into root alarms and correlative alarms,
depending on alarm generation causes. This feature allows O&M personnel to focus on root
alarms in the case of excessive alarms. Generally, multiple correlative alarms may result from a
root alarm. If a root alarm is cleared, most of its correlative alarms are cleared automatically.

Benefits
Device O&M personnel can clear root alarms first so that most of the correlative alarms can be
cleared automatically. Therefore, manual operations are reduced and maintenance efficiency is
improved.

Description
This feature provides the following functions:

Analyzing alarm correlations


When alarms are generated, NEs and the M2000 analyze the correlated alarms, identify
root alarms and correlative alarms, and report analysis results to the M2000.

Displaying alarm correlations


The M2000 displays the correlations between root alarms and correlative alarms in the
alarm browsing window. This helps users to quickly locate faults.
The M2000 displays correlations between root and correlative alarms in the alarm
browsing window. Users can quickly and efficiently locate faults by checking alarm
correlations. Users can disable this function if they do not require the correlated alarms
reported by NEs. After this function is disabled, the M2000 does not display the
correlations between root and correlative alarms reported from NEs.

Enhancement
The following functions are added to M2000 V200R011C01:

Controlling the switch of alarm correlation display

Dependency
This feature applies to eRAN1.0 and later versions.

WOFD-012900 Alarm Information Base


Availability
This feature was introduced in M2000 V200R002.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

26

iManager M2000 V200R012


Basic Feature Description

Description
This feature allows users to record the explanations of alarms or events and the troubleshooting
experience in the alarm information base through the M2000 client. The M2000 keeps the
records in terms of the alarm/event ID. To facilitate maintenance experience sharing, the
M2000 allows users to export the alarm information base as an XML, CSV, TXT, XLS, HTML,
or PDF file. It also allows users to import an external alarm information base as an XML file to
append to or replace the original alarm information base on the M2000.
The M2000 supports fuzzy search of maintenance experience information based on the names
of alarms and events or keywords of maintenance experience information in the alarm
knowledge library. The search criteria can be the names of alarms and events, keywords of
maintenance experience information, or the combination of the names and keywords. This imp
roves the efficiency of querying maintenance experience information.
Users can also add comments to alarms and events to record the operations performed on the
alarms and events. The change history (including the user, change time, and contents), is
automatically saved in the comments.

Enhancement
In M2000 V200R009, the M2000 supports fuzzy search of maintenance experience information
based on the names of alarms and events or keywords of maintenance experience information.

2.3 Configuration Management


WOFD-020100 Auto-Synchronization for Configuration Alteration
Availability
This feature was introduced in M2000 V200R002.

Description
If the configuration of an NE is modified, the NE reports a modification notification to the
M2000. Then, the M2000 updates the NE configuration data in the database according to the
notification. This implements the automatic synchronization of configuration data and ensures
the consistency of the configuration data between NEs and the M2000.
Users can view the information about the latest automatic configuration data synchronization of
each NE. The information contains the start time and end time of the synchronization,
synchronization types, synchronization results, and result details.

Enhancement
The function of browsing the information about automatic data configuration synchronization
is added to M2000 V200R008.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

27

iManager M2000 V200R012


Basic Feature Description

WOFD-020200 Configuration Data Synchronization


Availability
This feature was introduced in M2000 V200R002.

Summary
To ensure that the configuration data between the M2000 and NEs is consistent, the M2000
supports manual and scheduled synchronization of configuration data. Users can view the
information about synchronization tasks.

Benefits

The M2000 provides manual and scheduled configuration data synchronization. The two
synchronization modes enable users to control the synchronization progress and ensure
that the configuration data between NEs and the M2000 is consistent.

The M2000 displays the detailed information about NE configuration data


synchronization on the GUI, facilitating tracing and review of the configuration data.

Description
This feature provides the following functions:

Synchronizing configuration data


The M2000 supports synchronizing configuration data manually or on a scheduled basis.
In manual synchronization mode, users manually start a synchronization task on the
M2000 client. The M2000 updates and stores the data in the M2000 database based on the
current data obtained from NEs.
The M2000 synchronizes configuration based on the period and time set by users and the
range of NEs. If users do not set the period or time, the M2000 performs scheduled
synchronization tasks according to the default settings. Users can set synchronization
intervals by day. The intervals must be a multiple of one day. Scheduled synchronization
tasks are managed and scheduled by using the feature WOFD-071200 Centralized Task
Manager.

Browsing configuration task information


The M2000 displays, in a list, the current manual and scheduled data synchronization
information about all NEs managed by the M2000. The information listed includes the
start time, type, progress, and description of the synchronization. Users can save the
information to a local PC as a file.
After the synchronization is started, the M2000 automatically records the synchronization.
After the synchronization is complete, the M2000 automatically deletes the record.
In addition, users can view the information about the latest manual or scheduled
configuration data synchronization. The M2000 displays, in a list, the execution
information about the latest configuration data synchronization of all the NEs managed by
the M2000. The list displays the information about the start and end time of the history
configuration data synchronization tasks, synchronization types, synchronization results,
and result details.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

28

iManager M2000 V200R012


Basic Feature Description

Enhancement
The function of browsing the information about manual and scheduled configuration
synchronization tasks is added to M2000 V200R008.

Dependency
None

WOFD-020400 Configuration Data Query


Availability
This feature was introduced in M2000 V200R002.

Summary
The M2000 provides a window for viewing configuration data. It supports the functions of
searching for and exporting NE configuration data.

Benefits
The M2000 displays NE configuration data in a navigation tree and a table so that users can
easily view the logical relationships between configuration objects and detailed configuration
information.

Description
The M2000 displays NE configuration data in an interface that contains a navigation tree in the
left pane and a table in the right pane. The navigation tree displays NE configuration objects
and their logical relationships. The table displays the details about selected configuration
objects. The M2000 allows users to search for NE configuration data based on the keywords
contained in configuration object names. It also allows users to locate the search results on the
corresponding nodes in the navigation tree.
In the window for viewing configuration data, users can select an NE to export its configuration
data. The exported data can be saved as CSV and XML files.
In addition, the M2000 displays the common configuration data of some objects as labels in the
topology view. The common configuration data includes NE names, NE types, IP addresses,
current version information, link names, link types, and names of the NE nodes at both ends of
a link.

WOFD-020800 Object Management Status Monitor


Availability
This feature was introduced in M2000 V200R003.

Description
The M2000 displays the information about and status of hardware and software resources on
the GUI, which allows users to learn about the network status in real time. Users can set the

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

29

iManager M2000 V200R012


Basic Feature Description

range of the objects whose status is to be monitored. They can also add, delete, suspend, and
resume monitoring tasks. The M2000 supports sorting the monitoring results by the statuses
and names of NEs and objects.
Table 2-1 describes the resources and resource statuses that can be monitored by using this
feature.
Table 2-1 Object management status
NE Type

Object Type

Management Status

eNodeB

Cell

Administration status: unlocked, locked, shutting


down
Operating status: enable, disable

eNodeB

License status: Default, Demo, Normal,


Protected, Emergency
Operating status: Starting, Software ready,
Software not ready

Board

Administration status: unlocked, locked, shutting


down
Operating status: enable, disable
Availability status: normal, fault, uninstalled,
un-configured, inconsistent, power-off
Usage status: idle, active, busy
Standby status: active, standby

WOFD-021000 Local Device Panel


Availability
This feature was introduced in M2000 V200R003.

Description
The device panel provided by the LMT of an NE displays the subracks, boards, configuration,
and alarms of NEs on the GUI. On the boards, users can perform common operations such as
querying board statuses and resetting boards.
After starting the LMT of a specified NE in the M2000 topology view and starting the device
panel, users can check the hardware status in the topology view or perform routine maintenance
of devices through shortcut menus.
To ensure security of data transmission between LMTs and NEs, LMTs based on the iView
platform support SSL-encrypted transmission, and web LMTs support HTTPS-encrypted
transmission.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

30

iManager M2000 V200R012


Basic Feature Description

Dependency
This feature is implemented on the LMT. If the NE LMT is based on the iView platform, users
must install the NE LMT on the M2000 client before using this feature. If the NE supports a
Web LMT, users do not need to install the NE LMT.

WOFD-022300 Centralized Device Panel


Availability
This feature was introduced in M2000 V200R008.

Summary
The M2000 provides the centralized device panel function and graphically displays subracks,
boards, and the status and alarm information about subracks and boards. On the device panel,
users can perform common operations such as querying board states and restarting boards.

Benefits
The graphical display of devices allows users to maintain NEs easily and improves the usability
of the M2000. By using this feature, users can directly view the hardware status of devices and
perform common operations on the device panel.

Description
The M2000 implements centralized device panel management, which allows users to switch
device panels of different NEs on the same GUI.
The device panel graphically displays the physical locations and states of racks, subracks, and
boards. In addition, the states can be updated in real time. The M2000 displays the following
board states: null, unknown, uninstalled, unconfigured, inconsistent, starting up, power off,
blocked normal, blocked faulty, faulty, active normal, standby normal, and abnormal
active/standby. The states are identified in different colors on the device panel. In addition, on
the device panel, users can learn about the running status of boards according to the indicators
of board states, fault bar, and the indicators of active alarms.
Users can right-click a board and perform common O&M operations through shortcut menus,
such as querying board status, alarms, CPU usage, inventory information, and resetting or
blocking the board. Board status varies according to the board type, and shortcut menus
supported by boards are slightly different.
The device panel provides shortcut menus for common maintenance, such as querying board
status, alarms, CPU usage, and inventory data, and resetting or blocking boards. The shortcut
menus vary according to board states.
If a BTS is configured with RRUs, the M2000 displays the physical topology relationships
between RRUs and between RRU and BBU ports by displaying the RRU device panel, RRU
chains, and CPRI connections. The physical network topology can be updated in real time,
showing the connection status and the device status on the topology.

Enhancement
The following functions are added to M2000 V200R011C00:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

31

iManager M2000 V200R012


Basic Feature Description

Querying the inventory data on boards through the device panel

Displaying the topology of CPRIs

The following functions are added to M2000 V200R009:

Displaying the device panel of the RRU

Dependency
This feature applies to eRAN1.0 and later versions.

WOFD-022000 Configuration Report


Availability
This feature was introduced in M2000 V200R008.

Summary
The M2000 provides the NE report, core network resource report, NE statistics report, link
report, and RAN configuration report. Users can view the basic NE information, port resource
information, NE version information, link information, base station configuration information,
and cell configuration information presented by these reports through GUI. Users can also save
the reports to a local PC or print the reports.
In addition, the M2000 can periodically generate the configuration reports through centralized
task management.

Benefits
The M2000 provides various configuration reports according to configuration data types and
O&M scenarios. Therefore, users can easily learn about the NE information, port resource
information, link information, base station configuration information, and cell configuration
information. This improves O&M efficiency.

Description
The M2000 provides reports such as the RAN configuration report. Users can view these
reports through the GUI. In addition, users can save the reports as XLS, CSV, TXT, PDF, or
HTML files. They can also print the reports.
The configuration reports can be generated periodically through centralized task management.
Users can set the report generation period in the unit of day.
The data in each report is as follows:

NE report
An NE report contains basic NE information, such as NE names, types, versions, IP
addresses, physical locations, vendors, districts, maintenance areas, status of the
connection with the M2000, and capacity. The report also provides the total number of
NEs and the number of disconnected NEs by NE type.

Issue 02 (2012-04-12)

NE statistics report

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

32

iManager M2000 V200R012


Basic Feature Description

An NE statistics report allows users to query the version information about multiple NEs.
The version information includes the NE type, NE versions involved in each type of NE,
and number of NEs corresponding to each version.

Core network resource report


A core network resource report allows users to query the resource information about the
ports and CPUs information.
All the NEs support the NE report and NE statistics report.

Enhancement
The following function is added to M2000 V200R012C00:

Information about NE maintenance areas and connection status with the M2000 are added to
an NE report.
The following functions are added to M2000 V200R009:

NE report, core network resource report, NE statistics report.

Various configuration reports can be automatically generated by using centralized task


management.

WOFD-070200 Centralized MML for Configuration


Availability
This feature was introduced in M2000 V200R002.

Summary
This feature allows users to concurrently send MML commands and MML scripts to multiple
NEs on the M2000 client.

Description
The centralized command line feature allows users to send MML commands to multiple NEs of
the same type on the M2000 client. The CLI provides a command navigation tree organized by
function, supports the predictive input technique and help information, and records executed
commands. It also allows users to filter, search for, and sort NEs. Before executing a command
that may have severe negative effects, the M2000 displays a message, informing users of the
possible execution results. The M2000 executes the command only after users confirm the
operation.
The M2000 displays the execution results of MML commands on a GUI in real time. It also
provides a result redirection function so that users can directly save the command execution
results in a file.
MML commands can be processed in batches. To implement this, users edit the MML
commands to be executed in MML scripts, import the scripts to the M2000, and create a
centralized task to deliver the scripts to NEs. After a script is executed, the M2000 provides
statistics about the execution, including the number of successfully executed MML commands,
number of unsuccessfully executed MML commands, and list of unsuccessfully executed MML
commands.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

33

iManager M2000 V200R012


Basic Feature Description

The M2000 centrally manages and schedules script tasks by using the feature WOFD-071200
Centralized Task Manager. When creating a task, users need to specify a script and set the
execution mode (immediate execution or scheduled execution), running mode, redirection of
the script result and NEs. According to the preset time, the M2000 sends the MML commands
in sequence in the script to the selected NE or multiple NEs of the same type. If required, user
can cancel the task during its execution.

Enhancement
The following function is added to M2000 V200R011C00:

The M2000 displays a message, which indicates the possible execution results before
executing an MML command that may have severe negative effects.

The following function is added to M2000 V200R010:

The M2000 provides the statistical information about the task execution after an MML
script task is completed.

2.4 Performance Management


WOFD-030100 Performance Measurement Data Collection and Storage
Availability
This feature was introduced in M2000 V200R002.

Summary
Based on the measurement settings, the M2000 can obtain the measurement results of
performance counters from NEs and save the results in the M2000 database. Users can adjust
the measurement settings and use a template for the measurement settings. They can also view
the measurement status, perform measurement data synchronization, and view the
synchronization status.

Benefits

The user-friendly GUI simplifies operations and facilitates the monitoring and viewing of
the measurement status of an object.

By default, the M2000 collects and stores the measurement results of common object
counters. This can meet the data requirements in multiple O&M scenarios without any
user setting.

Description
This feature provides the following functions:

Setting measurements
The M2000 collects the data of network measurement counters and stores the data in the
M2000 database. Measurement objects, counters, and periods are three required elements
for performance data collection.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

34

iManager M2000 V200R012


Basic Feature Description

A measurement object can be a physical board, a physical subrack, or a logical cell.


Certain corresponding relationships exist between measurement objects and measurement
counters. Each type of measurement object corresponds to some measurement counters.
Measurement objects can be classified as follows:
Objects of the first category: The M2000 automatically displays these measurement
objects, and collects and saves the measurement data of all the objects of this category. No
user setting is required.
Objects of the second category: The M2000 automatically displays these measurement
objects. The M2000 collects the measurement data of these objects only after users
manually type these objects and measure them.
Objects of the third category: The M2000 does not display these measurement objects. It
displays the measurement data of these objects only after users type the data such as the
local network number of the calling party, destination and office direction, local network
number, and supplementary services.
Measurement counters are classified into common counters and extended counters.
When the network is running, the M2000 collects and stores the common counters of the
first category by default. Users can set measurement objects based on the default settings,
or cancel the measuring of common counters.
The M2000 collects and stores extended counters based on the preset measurement objects
and counters.
The M2000 suspends and activates the data collection tasks of some measurement data
based on measurement units. It does not store counter results in suspended measurement
units in the database.
A measurement period refers to the interval for NEs to report performance measurement
results. The report periods for measurement results vary according to measurement
counters of different NEs.
There are five measurement periods that are 5, 15, 30, 60, and 1440 minutes. Measurement
period varies according to NE measurement counters. By default, common counters and
extended counters are collected at the interval of 30 or 60 minutes. Users can also reset the
period to the other periods that the NE measurement counters support. The M2000 allows
users to export the measurement setting information about an NE, such as measurement
periods, objects, sets, units, and counters to XML files. The exported file can be used as a
template for measurement setting. Users can complete the measurement setting by
importing the template file. They can also modify and edit the template file.

Storing measurement data


The database stores collected performance data in the database for a maximum of 30 days.
Users can change the period.
If the M2000 performance counters are not measured based on the default settings or the
network size exceeds the management capacity of the server, the M2000 may not be able
to store the performance counters for 30 days. When the storage duration is about to expire
or the disk space usage has been exceeded, the M2000 automatically dumps performance
data to files.
Performance data dumping affects the performance of the M2000 and therefore it is
disabled by default.

Viewing measurement status


The M2000 provides a dedicate window for viewing the current measurement settings,
including measurement objects and sets, and periods and status of measurement units.
Users can export measurement status information to a TXT, HTML, CSV, or XLS file
based on NEs.

Issue 02 (2012-04-12)

Synchronizing measurement data

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

35

iManager M2000 V200R012


Basic Feature Description

To ensure the consistency of performance measurement data between NEs and the M2000,
the M2000 provides manual and automatic measurement data synchronization modes.
Manual synchronization is performed when users detect exceptions on performance data.
When an NE is disconnected from the M2000 or when the M2000 performance service is
stopped, the M2000 detects that NE performance data is missing. In this case, the M2000
starts automatic supplementary collection. If no results are reported after the automatic
supplementary collection is complete, the M2000 generates an alarm, indicating that the
performance measurement results are missing.
The M2000 also allows users to manage the status of performance data synchronization
tasks. The M2000 provides a window for users to view all the ongoing performance data
synchronization tasks. On the interface, users can also perform operations such as filtering,
sorting, canceling, and retrying synchronization tasks, and resetting their priorities.

Enhancement
Performance data synchronization task management is added to M2000 V200R008.

Dependency
None

WOFD-030500 Performance Measurement Data Query


Availability
This feature was introduced in M2000 V200R002.

Summary
Users can query the performance data imported into the database on the M2000. The M2000
displays the query results in a table, line chart, or column chart. The M2000 also allows users to
print and save the query results, query data by template, query missing data, and subscribe to
performance data.

Benefits
This feature brings about the following benefits:

The M2000 allows users to set search criteria to easily query data based on fixed
conditions and customize search criteria. Multiple data display modes facilitate the
viewing of performance data.

The M2000 allows users to analyze causes of performance result loss in most application
scenarios. This improves efficiency in locating and solving performance result loss
problems.

Description
This feature provides the following functions:

Querying data
The M2000 supports data query by condition and displays the query results in a table, line
chart, or column chart. The supported search criteria are measurement objects,
measurement counters, measurement period, sort mode, and time ranges.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

36

iManager M2000 V200R012


Basic Feature Description

The line chart displays the information about multiple counters of an object, or displays
the information about multiple objects of a counter. Line charts and column charts can be
saved as JPEG images.
Users can print the query results, and all the data in the active window is printed. They can
also save query results as TXT, HTML, XLS, or CSV files.

Query templates
The M2000 allows users to use templates for query. The templates consist of the default
templates and user-defined templates.
A default template is a predefined template provided for some NEs to facilitate the query
of common performance counter data. All the M2000 users can use the default template.
Users can create templates by copying default templates.
Users can save preferred performance data search criteria as a user-defined template.
Templates are saved according to users.
The M2000 allows users to import, export, cut, paste, copy, delete, rename, and view
user-defined templates, delete the templates in batches, and collect template usage
statistics.
When users use a template to query performance data without any modifications of the
conditions, the M2000 does it according to the default conditions of the template. Users
can also reconfigure the search criteria based on the template.

Analyzing causes of performance result loss


The M2000 analyzes causes of performance result loss and provides diagnosis reports.
Based on performance data processing procedures and common problems, the M2000
designs the following diagnosis process: performance result loss check, cause analysis,
and report summarization.
The possible causes for performance result loss are as follows:

An exception occurs when performance results are reported.

Measurement parameters are not set.

NEs are disconnected.

An exception occurs when measurement parameters are delivered.

Performance files are incomplete.

NEs delay reporting performance results.

System resources are unavailable.

A diagnosis report provides causes of performance result loss, and suggestions and
procedures for handling the problems. Users can set criteria for analyzing performance
result loss, which are the same as the result search criteria. Users can also analyze causes
of performance result loss for specified performance query results.

Subscribing to performance data


Users can subscribe to performance data by condition. The supported conditions include
NE objects, measurement periods, and measurement units.
The M2000 displays the newly generated performance data that meets the subscription
conditions in the window. One user can start only one subscription task.

Enhancement
The following function is added to M2000 V200R012C00:

Issue 02 (2012-04-12)

Analyzing causes of performance result loss

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

37

iManager M2000 V200R012


Basic Feature Description

Users can collect statistics about performance query template usage and delete the
templates in batches.

WOFD-031000 Customizable Counter Management


Availability
This feature was introduced in M2000 V200R002.

Description
This feature allows users to define new performance counters based on the raw counters
provided by default and based on the existing user-defined counters. This meets the
requirements of performance counters that exceed the range of raw counters in the network
operation and maintenance. The supported calculation rules are +, , x, /, (,) and {and}, where
{and} is used to define constants. Users can create, modify, or delete user-defined counters.
Users can create, modify, and delete user-defined counters, which include the counter name,
unit, measurement set, function unit, formula, and description information. In addition, users
can export and import user-defined counters as XML files.

Enhancement
The following function is added to M2000 V200R010:

The M2000 allows users to create, modify, and delete the description of user-defined
counters.

WOFD-031200 Performance Threshold Alarm


Availability
This feature was introduced in M2000 V200R002.

Description
This feature allows users to set performance alarm thresholds for measurement counters. When
a counter value exceeds the threshold, a performance alarm is generated. When the counter
value is within the normal range, the alarm is automatically cleared.
This feature consists of threshold definition and threshold management.
Threshold definition:

The M2000 allows users to set multiple alarm thresholds for a counter. The alarm
thresholds can be set according to objects, time segments, periods, and trends. Different
thresholds can be set for the same counter according to objects, time segments, periods,
and trends.

Users can set threshold alarms for user-defined counters.

Combined thresholds are supported. The triggering conditions for generating and clearing
threshold alarms are condition expressions. An expression can contain multiple counters.
The supported calculation rules are +, , x, /, AND, OR, =, !=, >=, >, <, (and), {and},
where {and} is used to define constants.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

38

iManager M2000 V200R012


Basic Feature Description

Thresholds can be set for cell groups. The M2000 summarizes the counter results of all the
cells in a cell group, determines the threshold conditions, and generates performance
threshold alarms for the results that meet the conditions for triggering threshold alarms.

Users can customize the threshold alarm names. After a threshold task is bound with a
user-defined alarm name, the alarms that meet the threshold conditions are reported with
the user-defined alarm names.

The M2000 supports the dynamic change of alarm severities. If alarms of the same
severity are generated consecutively, the severity of this alarm can be changed to a higher
severity. Users can set the times for generating an alarm of the same severity for raising the
alarm severity.

The M2000 generates an alarm only when the times for triggering alarms that meet the
conditions reach a certain threshold. Users can set the threshold.

After an alarm is generated, it is cleared only when the performance counter monitoring
results do not meet the condition that the times of alarm conditions reach a certain
threshold. Users can set the threshold.

Threshold management

The threshold query is supported. Users can filter thresholds according to threshold names,
NEs (or objects under NEs), periods, triggering time segments, and threshold directions.
They can also query thresholds by combining multiple conditions.

The batch activation, suspension, copy, and paste of thresholds are allowed.

NE thresholds can be suspended automatically or manually according to time.

Enhancement
The following function is added to M2000 V200R009:

The threshold alarm names can be customized.

The following functions are added to M200V200R008:

Threshold management

Threshold query

Threshold operation in batches

Suspension of NE thresholds

Dependency
None

WOFD-031600 Remote Service Validation


Availability
This feature was introduced in M2000 V200R008.

Summary
After the devices on the live network are upgraded, users need to verify that the services can run
normally after the upgrade. The remote service upgrade validation feature allows users to verify
services remotely from the network management center. Therefore, users do not need to verify
the services through site dialing tests. This reduces network maintenance cost and improves
Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

39

iManager M2000 V200R012


Basic Feature Description

efficiency. In addition, the remote service upgrade validation can be performed on all types of
NEs.

Benefits
This feature allows users to perform the verification remotely after an NE upgrade to avoid or
reduce manual dialing tests on site, reducing upgrade costs and workload.

Description
In the traditional O&M mode, after radio devices are upgraded on the communication network,
local manual dialing tests are required to check whether the services are normal. In this case, the
efficiency is low. Currently, NE upgrades are performed at the network management center
instead of on site to reduce upgrade costs and to improve O&M efficiency.
In this case, the remote service upgrade validation feature is developed. Users can use this
feature to check whether the services of NEs are normal after an upgrade by comparing the key
traffic counters before and after the upgrade. This feature is service-oriented, comprehensive,
precise and measurable, time-based, and object-based. Therefore, it can be used to verify NE
upgrades.
The M2000 verifies the upgrade after an NE upgrade is complete. When verifying the upgrade,
the M2000 obtains raw counters from the NE, calculates KPIs based on the raw counters, and
compares the best KPIs with the standard and historical reference values. Then, the M2000
provides the verification results. Users can save the verification results as an HTML, CSV,
XML, PDF, or TXT file.
Service upgrade verification is performed on a task basis. The M2000 manages and schedules
the tasks by using the feature WOFD-071200 Centralized Task Manager.

Enhancement
This feature applies to eNodeBs since M2000 V200R010.

Dependency
This feature applies to eRAN2.0 and later versions.

2.5 Security Management


WOFD-040100 Centralized User Authorization and Authentication
Availability
This feature was introduced in M2000 V200R002.

Summary
The M2000 centrally manages and authenticates O&M users on a network. The M2000
provides functions such as user account management, authority assignment, and user
authentication.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

40

iManager M2000 V200R012


Basic Feature Description

Description
Managing O&M users is the most important aspect of the security management function in the
OSS environment. The M2000 centralized user management and authentication provide
support to harden the access security of the system. The M2000 allows administrators to create,
delete, and change O&M user accounts of both the M2000 and NEs, and assign rights to the
O&M users. The M2000 supports a maximum of 500 M2000 users, including the default
superuser.
The M2000 supports role-based user group management. A user group consists of a set of users
who have the same operation permissions. Operation permissions vary according to user groups.
Basic and rights information is required for creating user accounts and groups. Basic
information includes user or user group names and types. Rights information includes
management domains, operation rights, rights rules, and bound NEs.
The M2000 assigns user rights to users in either of the following modes:

The M2000 directly assigns rights to users by copying existing user rights information.
This simplifies the process of assigning rights.

The M2000 assigns rights to user groups and then to users based on the binding
relationships between user groups and users. The M2000 can assign rights to a user group
by copying rights information about another existing user group. This improves working
efficiency. A user can belong to multiple user groups and has the rights of all the user
groups it belongs to.

The M2000 provides five default user groups: Administrators, Operators, Guests,
Maintenance, and SMManagers. Telecom operators can create other user groups and assign
rights to the user groups as required. The Administrators user group has all rights except
security management rights. The SMManagers user group has only security management
rights. Users in this group can query security logs and perform security management operations,
for example, creating new users and user groups, granting permissions to users and user groups,
and changing the permissions of users and user groups. Users in other groups do not have
security management rights. The rights of Administrators and SMManagers groups cannot be
changed.
The M2000 provides a default superuser, user admin. The default superuser can perform all
operations on the M2000. User Admin belongs to both the Administrators and SMManagers
user groups, and its user group properties cannot be modified.
All the O&M users are authenticated by the M2000. When a user logs in to the M2000 through
an M2000 client or logs in to an NE through the LMT, the M2000 authenticates the login based
on the user name and password. Only the authorized user can log in to and operate the system.
In addition to that, the M2000 authenticates operations performed on an M2000 client or the
LMT. Therefore, users can perform operations with the most restrictive authority.
The M2000 provides a tool for importing and exporting basic user and user group information
and binding relationships between users and user groups. This tool transfers user information
among multiple M2000 systems.

Enhancement
The following function is added to M2000 V200R012C00:

Importing and exporting basic user and user group information and binding relationships
between users and user groups

The following function is added to M2000 V200R011C00:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

41

iManager M2000 V200R012


Basic Feature Description

The maximum number of M2000 users is increased from 255 to 500.

Dependency
Security data is imported and exported only among M2000 systems of the same R version.

WOFD-040300 Security Policy


Availability
This feature was introduced in M2000 V200R002.

Description
This feature allows users to set security policies for the M2000 system based on the
requirements of different security levels. For example, users can set global user password and
account policies, single user password and account policies, access control lists (ACLs),
database password policies, and security-related alarms.
To ensure service data security, the M2000 encrypts stored passwords and tracing data (except
the data collected by using the Trace Server) and data transmitted using USB flash drives. By
default, tracing data is not encrypted because the complicated encryption algorithm affects the
M2000's operating efficiency.
USB flash drives are required for transmitting data to NEs in many application scenarios. The
M2000 provides a tool to prevent key data from being stolen or tampered with. The tool
encrypts data, allows encrypted data transfer using USB flash drives, and protects data integrity.
NEs verify the data integrity and decrypt the data. The tool supports the DES3_CBC,
AES192_CBC, and AES256_CBC encryption algorithms and HMAC_SHA1 and
HMAC_SHA256 integrity algorithms.
The global password policies apply to the passwords of all M2000 users. The policies are as
follows:

Min. length of common user password: The default value is 8.

Min. length of superuser password: The default value is 8.

Max. length of password: The default value is 16.

Duration for which a password cannot be reused (months): The default value is 0.

Max. valid duration for password (days): The default value is 180.

Min. valid duration for password (days): The default value is 10.

Number of days in advance a warning is given before a password expires: The default
value is 10.

Min. character difference between new password and old password: The default value is 3.

Min. number of letters in a password: The default value is 1.

Min. number of uppercase letters in a password: The default value is 0.

Min. number of lowercase letters in a password: The default value is 0.

Min. number of numerals in a password: The default value is 1.

Minimum number of special characters in a password: Special characters include ~ ! @ #


$ % ^ & * ( ) + - = { } | \\ : \ " ; ' ? , . / ` and space. The default value is 1.

Password cannot contain any space: This policy is disabled by default.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

42

iManager M2000 V200R012


Basic Feature Description

Max. number of same consecutive characters between user name and password: This
policy is disabled by default.

Password cannot contain any word given in password dictionary or any hacker language
(For example, one or several letters in a word cannot be replaced by a numeral or
numerals.) This policy is disabled by default.

Password cannot be the full user name or the reverse of user name: This policy is disabled
by default.

Password cannot contain any repeated string: Users can set both the number of characters
contained in a string and the number of times a string repeats in a password. This policy is
disabled by default.

Password cannot be numerals or letters in ascending, descending, or interval order: For


example, passwords a1z9123, a1z9cba, a1a2b3, and c1b111a are invalid. This policy is
disabled by default.

Similarity between a new password and history passwords: Both the number of history
passwords and the number of consecutive characters that cannot be repeated between a
new and history passwords can be set. The values are set to 24 and 1, respectively. This
policy is disabled by default.

The M2000 allows users to set password policies for a single user, and the settings take effect
on only this user:

Max. valid duration for password (days): The default value is 180.

Password must be changed at next login: This policy is disabled by default.

Password cannot be changed: This policy is disabled by default.

The M2000 provides the following password policies for database users:

Oracle database: An Oracle database user password must contain at least eight characters,
including at least one letter and one number.

The M2000 allows users to set global user account policies, and the settings take effect on all
M2000 users:

Min. length of a user name: The default value is 6.

Lockout Duration: Specifies the number of minutes an account remains locked when the
number of failed login attempts exceeds the specified threshold. The default value is 30.
Users can also lock a user account permanently.

Delay in case of login failure or unlocking failure (seconds): refers to the wait time in case
of re-login and re-unlocking. The default value is 3.

Max. number of user login attempts: When the number of user login attempts reaches the
maximum, the user is automatically locked. The default value is 3.

Superuser not locked permanently: This policy is disabled by default.

Copyright notice displayed after a legal user logs in.

Inactive user policy: If a user does not log in for a specified period, the user account is
hibernated or deleted. By default, the user account is hibernated if a user does not log in for
60 days.

Automatic client locking: After automatic client locking is enabled, the M2000 client is
locked if no operation is performed on it within the specified time. The default setting is 3
minutes.

The M2000 allows users to set user account policies for a single user, and the settings take
effect on only this user:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

43

iManager M2000 V200R012


Basic Feature Description

Automatic idle user logout: After automatic idle user logout feature is enabled, the user
who does not perform any operation on the M2000 client within a specified time range is
automatically logged out. This policy is disabled by default.

Max. number of online users with the same user name: If the number of online users with
the same user name exceeds the preset number, the M2000 does not allow this user to log
in any longer. This policy is disabled by default.

Inactive user policy: If a user does not log in for a specified period, the user account is
hibernated or deleted. This policy is disabled by default.

Login time restriction: A user can log in to the M2000 only within a specified time range.
This policy is disabled by default.

ACL:

The M2000 provides ACLs for users. After an ACL is set, users can log in to the M2000
only by using a specified IP address or network segment. The default superuser is
authorized to set ACLs for all M2000 users. Users in the security management user group
are authorized to set ACLs for all M2000 users except the default superuser.

Security alarms:
The M2000 and NEs generate security-related alarms. These alarms are centrally monitored by
the M2000 fault management system. NEs of different types support different alarms.
As defined in the 3GPP specifications, the M2000 and NEs support the following
security-related alarms:

Integrity violation

Operational violation

Physical violation

Security violation

Time domain violation

Security-related alarms vary according to the NE type.

The following functions are added to M2000 V200R011C01:

Encrypted storage of passwords and tracing data (except data collected by using the Trace
Server)

Support of password policies for database users

Enhancement

The following password and security policies are added to M2000 V200R010:

Encryption of data transmitted using USB flash drives

More Security-related alarm types

Encrypted password storage

More powerful password security policy

A new password must be different from history passwords.

A password cannot contain repeated strings.

A password cannot contain any hacker language. For example, one or several letters in
a word cannot be replaced by a digit or digits.

The following password and security policies are added to M2000 V200R009:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

44

iManager M2000 V200R012


Basic Feature Description

Max. number of the adjacent characters that can be the same in the user name and
password.

The numerals and letters in a password cannot be in the interval sequence of numerals or
letters.

The minimum number of characters different in the new password from the old password.

The password cannot be in reverse order of the characters in a user name.

Automatic unlocking time specified for a user account.

Delay period after a login or unlocking failure.

Superuser not allowed to be locked.

Maximum number of online sessions of one user.

ACL.

The following security policies are added to M2000 V200R008:

The system automatically logs out idle users.

The following security policies are added to M2000 V200R006:

Advance reminder of password expiry (days)

Password cannot contain consecutive and repeated characters.

Password cannot be numerals or letters in ascending or descending order.

Password cannot contain whole or part of user name.

Password cannot contain a word in the password dictionary.

WOFD-040700 Online NE User Monitoring


Availability
This feature was introduced in M2000 V200R003.

Description
The online NE user monitoring feature allows users to monitor the session status and operations
performed by all NE users. On the session status browsing window, information about session
status, such as NE name, user name, user type, and login IP address. On the user operation
monitoring window, information about user operations, such as NE name, user name, user type,
login IP address, user operations, operation time, and execution results is displayed. All the
information about session status and user operations is monitored and displayed on the
monitoring interface in real time.
This feature also allows users to kick out specified users.

WOFD-050100 M2000 Log Management


Availability
This feature was introduced in M2000 V200R002.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

45

iManager M2000 V200R012


Basic Feature Description

Summary
The M2000 records the information about system running status in logs. Users can query,
export, and collect the statistics of logs. Logs help users to monitor and audit the running status
and executed operations of the M2000.

Description
Logs record the information about the running status of the M2000. Logs are categorized into
operation logs, system logs, and security logs.
Operation logs record the information about operations performed by users on the M2000
client.
Running logs record the operating information about the M2000 system.
Security logs record the following security-related events:

Events related to account management

Events related to account login

System events such as system startup and shutdown or events that affect system security or
system logs

Resource access events such as unauthorized access

This feature provides the following functions:

Collecting and storing logs


The database stores M2000 logs for a maximum of 90 days. Users can change the period.
If the M2000 log database does not meet the standard planning or the network size exceeds
the management capacity of the server, the M2000 may not be able to store the logs for 90
days. When the M2000 reaches the end of the storage period or disk capacity limit, the
M2000 automatically dumps M2000 logs to files.

Querying logs
The system allows users to query logs according to the preset conditions and displays the
query results. The M2000 provides various types of search criteria. Therefore, users can
easily view the required log information and save the query results in HTML, PDF, CSV,
or XML files. Users can save search criteria as a template.
Search criteria vary according to log types.
The search criteria for operation logs are terminals, operations, operated objects (NEs),
time, users, and operation results.
The search criteria for running logs are sources, severity, and time.
The search criteria for security logs are event severity, users, terminals, security events,
time, objects (NEs), and operation results.

Collecting log statistics


The M2000 collects log statistics and saves the statistical results to tables. Users can
customize the statistics by setting statistical items and filter criteria. Statistical items
include log types, users, terminals, operations, and results. Filter criteria are the same as
search criteria. Users can save statistical conditions as a template.
This function helps users to quickly learn about operating status, such as the period when
most user operations are performed and the most frequently performed operations.

Collecting and dumping logs


The system saves the information about NE logs to the database.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

46

iManager M2000 V200R012


Basic Feature Description

Exporting logs
This function allows users to export log information in the database to files. Log export
tasks are managed and scheduled by the centralized task manager.
The log export function contains two sub-functions, the latest data export and expiry data
export.
The latest data export function exports the log data that is generated recently to files for
analysis. Users can set the conditions of data export, such as task names, execution periods,
task valid time, file formats, and save paths. The exported log data is not deleted from the
database.
The expiry data export function exports the log data that are generated before a preset time
to files. After the data is exported, it is deleted from the database. Users can set the
conditions of data export, such as task names, task valid start time, storage duration of log
data (days), file formats, save paths, and whether to compress the file.
Both export modes support exporting log data to an XML, HTML, TXT or CSV file.

Enhancement
Logs can be exported to HTML and TXT files in M2000 V200R011C00.

WOFD-050300 NE Log Management


Availability
This feature was introduced in M2000 V200R002.

Summary
This feature allows users to query and collect the statistics on the logs stored in the database.
The logs contain NE operation logs, NE security logs.
NE operation logs record operations performed by NE user, which help users to locate faults
caused by manual operations.
NE security logs record the security-related events such as logging in to the local maintenance
terminals (LMTs) of NEs, changing NE user rights, and adding NE users. These logs help users
to monitor the running status of NEs.

Description
This feature provides the following functions:

Collecting and storing logs


The database stores all logs collected from NEs for a maximum of 90 days. Users can
change the period. If the disk configuration for the M2000 is low or the space planned for
the NE log database is less, users may not be able to store the logs for 90 days. When the
M2000 reaches the end of the storage period or disk capacity limit, the M2000
automatically dumps NE logs to files.
The M2000 collects subscribed log data from NEs using files and stores the data in the
database. It also allows users to manually collect and import NE log data that has not been
subscribed to, into the database. Both types of NE logs can be saved for a maximum of 90
days by default. Users can change the duration. If the disk configuration for the M2000 is
low or the space planned for the NE log database is less, users may not be able to store the
logs for 90 days. When the M2000 reaches the end of the storage period or disk capacity

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

47

iManager M2000 V200R012


Basic Feature Description

limit, the M2000 automatically dumps NE logs to TXT files. NE log data dumping is
disabled by default because it affects the M2000's performance.

Synchronizing logs
By synchronizing the log information about the M2000 with that about NEs, the M2000
ensures the consistency of log information. The M2000 supports manual and automatic
synchronization. Both manual and automatic synchronization are performed through tasks.
Manual synchronization is triggered by users, and automatic synchronization is
automatically triggered through preset M2000 parameters. Automatic synchronization
tasks are managed and scheduled by using the feature WOFD-071200 Centralized Task
Manager. Users can set task parameters such as task start time, execution period, and NEs.
Users can also view the status and progress of a synchronization task.

Querying logs
The system allows users to query logs according to the preset conditions and displays the
query results. The M2000 provides various types of search criteria. Therefore, users can
easily view the required log information and save the query results in TXT, HTML, CSV,
PDF, XLSX, or XLS files. By default, the query results are saved in XLS files. Users can
save search criteria as a template.
Search criteria vary according to the log type.
The search criteria for NE operation logs are user names, user types, terminals, NEs, and
operation results and time
The search criteria for NE security logs are time, users, user types, security levels,
terminals, operation results, and NEs.
All the NEs that support NE log management support NE operation logs.

Collecting log statistics


The system collects the statistics of log data and saves the statistical results to tables. Users
can customize the statistics by setting statistical items and filter criteria. Statistical items
include log types, users, terminals, operations, and results. Filter criteria are the same as
search criteria. Users can save statistical conditions as a template.
This function helps users to quickly learn about operating status, such as the period when
most user operations are performed and the most frequently performed operations.

Exporting logs
The M2000 exports NE log data generated within the latest time range to TXT files and
provides the files for other systems or users to analyze. Users can set data export criteria
such as task names, execution periods, valid time, file formats, and save paths. The
exported log data is not deleted from the database.

WOFD-000500 OS Hardening
Availability
This feature was introduced in M2000 V200R009.

Summary
This feature enhances the security of the M2000 operating system by disabling unsecured
operating system services, restricting access to files and directories, securing user accounts and
passwords, and adjusting kernel parameters.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

48

iManager M2000 V200R012


Basic Feature Description

OS hardening policies enable the M2000 to display a warning banner when users log in to the
M2000 through FTP or SSH. In addition, the hardening policies provide system logs related to
Inetd, FTP, cron tasks, and daemon process for users to tracing and audit the operations
performed on the operating system.
Before delivery, the M2000 performs security hardening on SUSE Linux operating systems
according to default hardening policies. Some hardening policies must be manually
implemented in certain scenarios. For example, users must manually disable the remote login of
user root, set TCP Wrappers, and disable FTP services.

Benefits
The hardening policies protect operating systems against malicious attacks and enhance the
security of the M2000 system. These policies include hardening the security of application,
controlling the access to files and directories, adjusting kernel parameters, tracing and auditing
logs, and securing user accounts and passwords.

Description
The default hardening items are as follows:

Application hardening
This function lowers the system security risks by restricting the use of system services and
disabling unsecured and unnecessary services.
SUSE hardening policies include deleting unnecessary daemon processes, enabling the
Initd service, Xinet service, SSH encryption algorithm, SSHD accounts, secure SSH
authentication, and FTP security configuration, and limiting FTP users.

Log tracing and auditing


SUSE: The M2000 provides system logs for users to trace system activities. The system
logs include info event logs, cron task logs, daemon process logs, and kernel message logs.

Kernel parameter adjustment


Kernel parameters determine the network configuration status and rights for applications.
Kernel parameter adjustment enhances the security of operating systems by adjusting or
configuring network options, disabling information dumping, and enabling protocol stack
protection.

User account and password securing


Securing user accounts and passwords is an effective means of protecting operating
systems against malicious attacks.
User account and password securing policies for the SUSE operating system include
disabling system user accounts, using the hash algorithm to encrypt passwords, and
forcing users to use complex passwords.

System access, authentication, and authorization


This function enhances the security of operating systems by enabling users to set the scope
of user operations and the execution environment of key services.
The policies related to the SUSE operating system include restarting the system using the
keyboard, setting the timeout of idle sessions, setting the secure single-user mode, setting
SSH warning banners, and restricting login attempts.

Issue 02 (2012-04-12)

File and directory rights

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

49

iManager M2000 V200R012


Basic Feature Description

All applications and data in the Linux systems are stored as files. A directory that contains
files is also regarded as a file. Therefore, the security of files and directories is of great
importance to the Linux systems. This function enhances the security of operating systems
by setting rights for all the directories and files except the /proc directory.
The policies for the SUSE operating system include restricting access to system
directories, files, and executable files, setting files and directories that have no owners,
restricting the use of the crob command, restricting the access to the PATH directories
(only user root is authorized to access the PATH directories), and setting ro mounting.

Warning banners
Warning banners are the messages displayed when users log in to the system through FTP,
or SSH. The messages indicate the penalties for unauthorized access to the system. This
policy also hides system version information to protect the system against attacks.

Enhancement
The following function is added to M2000 V200R011C00:

Optional security hardening

The following function is added to M2000 V200R010:

Hardening the SUSE operating system

Dependency
None

WOFD-000600 Database Hardening


Availability
This feature is introduced in M2000 V200R012C00.

Summary
This feature enhances Oracle database security by restricting the access to files and directories,
adjusting database parameters, locking unnecessary default user accounts, and preventing
common users from accessing system tables.
Before delivery, the M2000 performs Oracle database hardening based on default hardening
policies.

Benefits
This feature combines database and operating system hardening to protect the M2000 against
external attacks and enhance M2000 system security.

Description
Oracle hardening items are as follows:

Issue 02 (2012-04-12)

Restricting access to files and directories

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

50

iManager M2000 V200R012


Basic Feature Description

This function reduces database security risks and improves database service security by
restricting access to files and directories and preventing unauthorized users from accessing
or modifying database files and directories.

Adjusting database parameters


Database parameters determine memory usage and database listener configuration. This
function enhances Oracle database security by setting database parameters such as
database listener parameters.

Securing database user accounts and passwords


Securing database user accounts and passwords is a significant means of protecting the
database against external attacks. This function can be used to lock unnecessary default
user accounts.

Authorizing operations on system tables


This function enhances system security by setting database users' operation permissions
for some system tables. The policies include preventing common users from accessing
system tables and withdrawing the permissions of modifying system configurations.

WOFD-000800 Anti-virus Solution


Availability
This feature was introduced in M2000 V200R011C00.

Summary
Main risks that threaten OSS security include viruses, worms, and spyware. To prevent OSSs
from being attacked by these threats, Huawei provides antivirus solutions for Windows and
SUSE Linux operating systems by deploying third-party software.

Benefits
This feature protects M2000 and Citrix clients and servers from being attacked by viruses,
worms, and spyware and enhances the system's antivirus capability.

Description
OfficeScan 8.0 is deployed to provide antivirus protection for M2000 and Citrix clients and
servers that run on the Windows operating system.
ServerProtect for Linux 3.0 and Control Manager are deployed to provide antivirus protection
for M2000 servers that run on the SUSE Linux operating system.

Enhancement
The antivirus solution applies to the ATAE cluster solution in M2000 V200R012C00.

Dependency
ServerProtect for Linux 3.0 provides antivirus protection only for ATAE-based M2000 servers.
OfficeScan 8.0, ServerProtect for Linux 3.0, and Control Manager are commercial antivirus
software and must be purchased individually. Third-party software and hardware configured for
the antivirus solution apply to OSS products such as the M2000, PRS, and Nastar after being

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

51

iManager M2000 V200R012


Basic Feature Description

deployed one time. Therefore, users do not need to purchase the software and hardware for each
product.

2.6 Topology Management


WOFD-060100 Topology Management
Availability
This feature was introduced in M2000 V200R002.

Summary
Topology management provides a complete overview of the M2000 network topology. The
topology view displays the networking and running status of devices. After an NE topology
object is created, it is added to the M2000 topology.

Benefits

Providing a complete overview of the LTE and EPC network topology.

Providing a system portal, through which users are given direct access to NEs, which
improves system usability.

Using subnets to represent the network hierarchy, which improving visibility. Working
with the feature WOFD-040100 Centralized User Management and Authentication, the
topology management feature allows users to operate and maintain NEs based on regions
and NE hierarchy.

Description
The topology management module displays objects such as NEs, links, and subnets in charts
and navigation trees. It also provides functions of viewing configuration, alarms, and
performance data, starting the MML clients and LMTs, and synchronizing logs, configuration,
and alarm data

Topology view
In the topology view, the M2000 uses icons to identify different types of NEs. The
topology view consists of a navigation tree in the left pane and a chart in the right pane.
The navigation tree displays topology objects and their logical hierarchy. The navigation
tree shows each topology object and the hierarchy. The topology map in the display pane
shows all the topology objects and their basic information on the existing subnet,
relationship between the objects, alarm status of the objects, and KPIs.
Users can use the fuzzy search function to find and locate a topology object by using the
following keywords: object name, IP address, version, vendor, and position, cell name.
Users can create, add, and delete a topology object in the topology view. Users can create,
add, and delete a topology object in the topology view. In the topology view, different
icons represent different NEs and users can select an icon based on its size. The length of
the topology object name displayed in the topology view can be set. The settings take
effect only on this client. Users can change the background of the topology root view and
subnet view. The M2000 supports the background image in JPG or GIF format.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

52

iManager M2000 V200R012


Basic Feature Description

Administrators can export information about the root node, links, devices, and subnets to a
CSV file. Then, the M2000 provides this file for a third-party system to re-create a
topology.

Topology object

NE
If the device can be managed by the M2000, it is termed physical NE. If the device
cannot be managed by the M2000, it is termed virtual NE.
The M2000 is a special NE in the topology view.

Link
In the topology view, links are used to represent the physical or logical connections
between NEs.
Links are categorized into physical links and virtual links. Physical links refer to the
links connecting physical NEs. Virtual links are created by users. They are used to
represent the connections between NEs in the topology view. Currently, the M2000
supports links of the following types: M3UA, H248, BICCSCTPLNK, DATALINK,
MTP3, MTP3B, and Fiber Link. M3UA, H248, and BICCSCTPLNK links are created
automatically and cannot be created manually. DATALINK, MTP3, and MTP3B links
need to be created manually.

Subnet
In the topology view, subnets are used to categorize NEs. In this way, a large network is
divided into several small subnets. Each subnet can contain a maximum of 500 NEs.

When creating objects, users need to set the properties of objects, such as name, IP address,
version, vendor, position, region, description. The properties vary according to objects.
The M2000 allows users to quickly create and delete NE objects in batches in the topology
view. In addition, the M2000 allows users to modify the longitude and latitude information
about NEs in batches in a file and import the file to the M2000 to implement the batch
modification.
The M2000 supports subnets. A well-designed physical subnet structure cannot only
picture the actual topology of the network, but also facilitate routine operation and
maintenance. The M2000 classifies a network into physical subnets by region, NE type, IP
address, and maintenance personnel.

NE and object status monitoring


The M2000 allows users to monitor NEs in the entire network in real time. Users can learn
about the status of the entire network in time by checking the alarm severities of NEs and
connection status between NEs and the M2000. The M2000 allows users to quickly view
the status of cells under GBTSs, NodeBs, and eNodeBs. It also provides shortcuts to
facilitate operations on cells, such as activating and deactivating a cell.

Enhancement
The following functions are added to M2000 V200R012C00:

The M2000 allows users to quickly view the status of cells under eNodeBs and provides
shortcuts to facilitate operations on cells

The following functions are added to M2000 V200R009:

The length of the topology object name that can be displayed can be set. The settings take
effect only on this client.

Users can change the background of the subnet view.

In the topology view, users can select an icon based on its size.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

53

iManager M2000 V200R012


Basic Feature Description

Modify the longitude and latitude information about NEs in batches by importing the file
to the M2000.

The following function is added to M2000 V200R008:

The M2000 allows users to export topology relationship data to a CSV file. The file is
provided to a third-party system for re-creating topology.

Dependency
The KPI values displayed in the topology view are provided by the feature WOFD-190100
Real-Time Performance Monitoring. If this feature is unavailable, the topology view does not
display KPI values.

WOFD-060200 NE Automatic Detection


Availability
This feature was introduced in M2000 V200R002.

Description
The eNodeB automatic detection is implemented during eNodeB automatic deployment
(WOFD-280400 eNodeB Auto-Deployment LTE). Therefore, it is not included in this feature.
The M2000 can automatically detect the CORE ATCA NEs of the specified CGPOMU on the
physical topology view. After CGPOMU is created successfully, the CGPOMU automatically
searches for its sub-NEs. The detected sub-NEs are displayed in the topology view. If the
communication between the CGPOMU and its sub-NEs is abnormal, the sub-NEs fail to be
automatically found. In such a case, user can manually trigger the Search CORE NE function of
the CGPOMU to search for the sub-NEs.

2.7 NE License Management


WOFD-070400 NE License Management
Availability
This feature was introduced in M2000 V200R002.

Description
The NE license management feature includes common NE license file management and
eNodeB license management.
The common license management functions are as follows:

Viewing detailed license information

Transferring license files

Activating license files

Deleting license files

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

54

iManager M2000 V200R012


Basic Feature Description

eNodeB license management involves the following procedures:

Applying for a license

Installing the license file

Updating the license

Viewing license status

The M2000 provides the following functions for implementing these procedures:

Viewing license information


The M2000 displays detailed NE license information (such as NE license type and status)
on a list. Users can synchronize the latest NE license information from NEs to the M2000.

Loading a license file


Users download a license file from the M2000 to an NE for the license file to take effect.

Backing up a license file

After delivering a license file to an NE, the M2000 automatically backs up the license file
to the backup directory.

Exporting information to apply for a commercial license file


Each eNodeB must be configured with an individual license file. Users export the eNodeB
type, ESN, license serial number (LSN), and the license allocation and usage information
during eNodeB commissioning to an XML file. The exported XML file serves as a
reference to applying for a new license file.

Exporting the information about adjusting a license file


After a commercial license file is configured for an eNodeB, the license file needs to be
updated because of network change or optimization.
The procedure for updating an eNodeB license file is as follows:
1.

Invalidates the license.

2.

Obtains an invalidity code.

3. Exports information such as license usage, requirement evaluation data, invalidity


code, and ESN to an XML file.
4.

Applies for a new license file based on the exported information.

Invalidating a license
The procedure for invalidating an eNodeB is similar to that for invalidating a NodeB
license. Before updating the license information about an eNodeB, users must invalidate
the existing license to obtain an invalidity code, which is mandatory for applying for a new
license.

Enhancement
The following functions are added to M2000 V200R012C00:

Providing a northbound license file interface for eNodeBs

Backing up eNodeB license files

The following functions are added to M2000 V200R009:

Managing eNodeB license information

Managing license information about BSC6900 UMTS, BSC6900 GSM, and BSC6900
GU

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

55

iManager M2000 V200R012


Basic Feature Description

Dependency

This feature applies to eNodeBs in eRAN1.1 and later versions.

By integrating with the feature WOFD-210200 Automatic File Upload, the northbound
license file interface provided in this feature allows the M2000 to upload alarm files to the
third-party and other systems.

2.8 Hardware and Software Management


WOFD-110100 NE Software Management
Availability
This feature was introduced in M2000 V200R002.

Summary
This function allows the M2000 to centrally manage the software, patches, OS patches, and
data files of NEs. Users can upload, download, load, activate, and synchronize the software,
patches, and data files, and confirm the software loading. The software upgrade can be
performed in stages.
The system supports the following upgrade modes:

Software upgrade of a single NE through the wizard

Batch software upgrade

External upgrade of one or multiple NEs

Software management expert

Benefits
This feature brings about the following benefits:

The M2000 provides a user-friendly GUI, which simplifies maintenance operations and
improves work efficiency.

Remote management is required for users to copy and operate software locally, reducing
maintenance costs.

The batch upgrade reduces a large amount of repetitive work and improves upgrade
efficiency significantly. In addition, errors caused by manual operations are reduced.

Description
NE software management allows users to manage different files of NEs. The file types are as
follows:
Software: indicates the software of the NE, including cold patches.
The patches of NE software are categorized into hot patches and cold patches. After cold patches are
loaded, NEs need to be restarted. After hot patches are loaded, NEs do not need to be restarted. Cold
patches are managed as special software.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

56

iManager M2000 V200R012


Basic Feature Description

Patch: indicates hot patches of the NE.


Data: indicates the configuration file of an NE.
Others: indicates the log files of an NE.
Upgrade risk check package: refers to the check scripts of the Software Management Expert. It
provides check items for software upgrade, such as upgrade path, version mapping, and
upgrade risk. The file types supported by the M2000 vary according to NEs. Table 2-2 provides
the details.
Table 2-2 File types supported by NEs
NE Type

Supported File Type

eNodeB

Software, patch, upgrade risk check package, and others

IP Clock Server

NE software management includes file management and software upgrade management. File
management allows users to perform certain operations on the files stored on the M2000 and
NEs to upgrade NE software. NE upgrade management provides various NE upgrade modes,
including wizard-based upgrade, task-based upgrade, software upgrade expert, and external
upgrade. These upgrade modes enable users to easily upgrade NEs. File management:

NE files can be stored on the M2000 file server for centralized management. Users can
browse and delete NE files and upload and download these files between the M2000 client,
server, and NEs. Users can create various file transfer tasks in a window for transferring
files in different directions and for different NE types and file types. In a file transfer task,
files of the same type can be transferred in one direction for the same type of NE.

Before uploading NE software from the M2000 client to the M2000 server or from the
M2000 client to the NE, the M2000 verifies the integrity of the software version according
to the digital signature in the version package. If the verification fails, users are prompted
to determine whether to continue the upload.

The M2000 allows users to perform various operations on the files stored on NEs. For
example, users can check the version information and version package status of NEs. They
can also upload files to the M2000 file server, and load, activate, deactivate, synchronize,
uninstall, and confirm the files. The supported operations vary according to the file type.

File management allows users to upgrade NE software. To implement this, users first
download the NE software of the target version from the M2000 client or server to an NE,
and load, activate, and synchronize the software.

NE software upgrade:

Task-based upgrade allows users to upgrade and roll back NE software and patches of
third-party software in batches.

Issue 02 (2012-04-12)

Providing the eNodeB and IP Clock Server with the batch upgrade task. Users can
upgrade NEs of the same type concurrently. A maximum of 600 NEs can be upgraded
at a time. To minimize the impact of the upgrade on other services, the M2000
upgrades the NEs in batches, where 60 NEs are upgraded at a time. Users can configure
both upgrade steps and modes. Upgrade modes can be set to instant tasks, manual tasks,
or scheduled tasks. The M2000 allows users to perform health check on the eNodeB at
pre- and post-upgrade stages. By comparing the pre-upgrade health check report with
the post-upgrade health check report, users can detect the impacts of the software
upgrade on devices. For details about the check items, see the feature WOFD-240100
Network Health Checking. Pre- and post-upgrade health checks are optional.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

57

iManager M2000 V200R012


Basic Feature Description

The M2000 rolls back the versions and patches of eNodeBs in batches. It uses the
specified software version saved in the main control board on the NE side to perform the
rollback without loading or activating the versions and patches. The M2000 provides the
software management expert to manage the software upgrade process of the eNodeB. This
function integrates operations such as upgrade preparations, checks during the upgrade,
and checks after the upgrade into a process that meets O&M requirements. In this way,
O&M personnel can upgrade a NodeB by performing simple operations. The M2000
manages the upgrade process as a project.
The project has three phases: upgrade preparations, upgrade, and upgrade verification.
Upgrade preparations involve checking preparation information, feasibility, risks, and
pre-upgrade health. During the upgrade phase, NEs are upgraded in a mode similar to task
mode. Users create tasks to upgrade NEs in batches and in different time ranges. During
the upgrade verification phase, the M2000 performs a health check on upgraded NEs and
compares the pre- and post-upgrade check results. For details about the supported check
items, see the feature WOFD-240100 Network Health Checking describes.
When O&M personnel plan the upgrade of a version, they create an upgrade project, set a
target version, add the NEs that need to be upgraded to the same target version to the
project, and import a package for upgrade risk check to the project. The upgrade risk check
package determines the check items required for feasibility and risk checks, such as the
upgrade path, version mapping, and upgrade risks. This function allows O&M personnel
to flexibly control the upgrade process of each NodeB in the upgrade project. For example,
they can repeatedly check the upgrade preparations of the BTS that fails to be upgraded.
They can also check a BTS that has not been checked and upgrade the BTS that meets the
upgrade requirements.

After upgrading an eNodeB in task mode or using the software management expert, users
can view the reports on the comparison of pre- and post-upgrade alarms and cell status in
CSV format on the M2000 client. This facilitates upgrade result analysis and verification.

After NE software is upgraded by using the software management expert or in


wizard-based or task-based mode, the M2000 provides an HTML upgrade report. This
report, saved on the M2000 client, records detailed upgrade procedures and execution
results, such as NE types, target versions, parameter settings, upgrade steps, and start time,
end time, and execution result of each step.

When a user creates an NE upgrade task, the M2000 performs a self-check on the CPU
usage. If the CPU usage is high, the M2000 prompts the user to choose other time for the
upgrade. Users can stop and retry upgrade tasks in batches.

Enhancement
The following functions are added to M2000 V200R012C00:

Verifying upgrades using the software management expert

Viewing pre- and post-upgrade cell status comparison reports after an eNodeB is upgraded

The following functions are added to M2000 V200R011C00:

Checking software integrity

Providing the software management expert for the eNodeB

Providing reports for wizard- and task-based upgrade and software management expert

Creating file transfer tasks in batches

Stopping or retrying tasks in batches

Checking the M2000 CPU usage before the upgrade

The following functions are added to M2000 V200R010:


Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

58

iManager M2000 V200R012


Basic Feature Description

Providing integrity check and policy-specific upgrades for eNodeB software versions

The following functions are added to M2000 V200R009:

Rolling back software and patches of eNodeBs in batches

Performing health checks on the eNodeB at the pre-upgrade and post-upgrade stages

The following functions are added to M2000 V200R008:

Managing eNodeB software

2.9 Network Monitoring and Analysis


WOFD-021100 Local Interface Tracing
Availability
This feature was introduced in M2000 V200R003.

Description
The LMTs of NEs provide the interface tracing function, which traces signaling messages and
single UE signaling messages. The LMTs trace these messages in real time. Users can save the
messages as TXT or TMF files for offline browsing.
After starting the LMT of a specified NE in the M2000 topology view, users can monitor
network status in real time, and detect and locate problems in time by creating interface and
signaling link tracing tasks.
To ensure security of data transmission between LMTs and NEs, LMTs based on the iView
platform support SSL-encrypted transmission, and web LMTs support HTTPS-encrypted
transmission.

Dependency
This feature is implemented on the LMT. If the NE LMT is based on the iView platform, users
must install the NE LMT on the M2000 client before using this feature. If the NE supports a
Web LMT, users do not need to install the NE LMT.

WOFD-021200 Local Real-Time Status Monitoring


Availability
This feature was introduced in M2000 V200R003.

Description
The LMT of the NE provides the function of monitoring the status of NE in real time. The
results can be displayed in charts or through data. The running status of ongoing services and of
the M2000 system can be monitored. In addition, this feature supports exception analysis and
device maintenance.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

59

iManager M2000 V200R012


Basic Feature Description

After starting the LMT of a specified NE through the topology view of the M2000, users can
create real-time status monitoring tasks.
The monitoring function varies according to the NE type. The CPU usage of all NEs can be
monitored. The other items that can be monitored are as follows:

eNodeB monitored items: include cell performance, user performance, RRU performance,
and transmission performance.

To ensure security of data transmission between LMTs and NEs, LMTs based on the iView
platform support SSL-encrypted transmission, and web LMTs support HTTPS-encrypted
transmission.

Dependency
This feature is implemented on the LMT. If the NE LMT is based on the iView platform, users
must install the NE LMT on the M2000 client before using this feature. If the NE supports a
Web LMT, users do not need to install the NE LMT.

WOFD-014300 Maintenance Mode Management


Availability
This feature was introduced in M2000 V200R008.

Summary
The M2000 allows users to manage the lifecycle of NEs by setting maintenance modes for NEs.
In this way, users can perform appropriate maintenance on the NEs according to their
maintenance modes. For example, users can distinguish common alarms and maintenance
mode alarms that are generated in scenarios such as network setup, expansion, and upgrade.
This reduces the impacts of maintenance mode alarms on monitoring common alarms and
improves maintenance efficiency. In addition, users can focus on the alarms that affect services.

Description
NE maintenance policies vary according to scenarios such as NE deployment, upgrade,
commissioning, capacity expansion, and normal operation. To meet maintenance requirements
in different scenarios, the M2000 provides a flexible mechanism so that users can adopt
different maintenance policies to maintain NEs based on NE maintenance modes. For example,
during deployment, upgrade, and commissioning, NEs will generate a large number of
unnecessary alarms. The statistics about the live network indicate that the ratio of the
unnecessary alarms to all generated alarms is greater than or equal to 85%. If these alarms are
not differentiated from common alarms, maintenance engineers may fail to identify important
alarms in time.
Users can set NE maintenance modes on the M2000. When the network is in a specified state,
users can set the status of an NE to the corresponding state on the M2000. The M2000 regards
NE maintenance modes as a type of index. Users can filter various NE data by maintenance
mode in scenarios such as processing maintenance mode alarms and filtering NEs in a topology
view.

Issue 02 (2012-04-12)

Maintenance mode management: Currently, the default maintenance modes are normal,
initialization, upgrade, expansion, and commissioning. To meet specified user
requirements, the M2000 allows users to set 10 extended maintenance modes based on the

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

60

iManager M2000 V200R012


Basic Feature Description

five default modes. Users can customize a maintenance mode by setting the name of an
extension mode. Users can define alias names for NE maintenance modes on the M2000,
set and query maintenance modes, and export them to CSV files.

Maintenance mode alarms: Alarms generated in other NE modes, except the "normal"
mode, are regarded as maintenance mode alarms. After the maintenance mode settings
take effect, the M2000 handles alarms based on the maintenance mode identities in the
alarms reported by NEs. By default, the M2000 does not monitor maintenance mode
alarms. After receiving a maintenance mode alarm, the M2000 does not display the alarm,
generate an audio or visual alarm message, send an alarm notification, or forward the
alarm to a third-party system. In the alarm monitoring window, users can browse, query,
and collect statistics on maintenance mode alarms by maintenance mode. This meets the
requirements in specified scenarios.

Topology filtering: The M2000 allows users to query the maintenance modes of NEs in a
topology view and allows users to filter NEs by maintenance mode.

Enhancement
The following functions are added to M2000 V200R012C00:

Defining alias names for maintenance modes

The following functions are added to M2000 V200R011C00:

Querying the maintenance modes of NEs in the topology view

Exporting the NE maintenance modes to a CSV file

The following functions are added to M2000 V200R010:

The M2000 supports filtering NEs based on maintenance modes in the topology view.

The following functions are added to M2000 V200R009:

The management of maintenance mode is available for the eNodeB.

User can customize the maintenance modes of the eNodeB.

Dependency
This feature applies to eNodeBs in eRAN1.1 and later versions.

WOFD-031700 Radio Frequency Performance Check


Availability
This feature was introduced in M2000 V200R008.

Summary
An excessive voltage standing wave ratio (VSWR) reduces communication distances, and the
power amplifier pipe may be burnt because the reflected power returns to the transmit power
amplifier. This affects normal communication. To solve this problem, the M2000 provides the
function of VSWR query, which allows users to remotely monitor base station VSWR.
This feature applies in the following scenarios:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

61

iManager M2000 V200R012


Basic Feature Description

In the early stages of base station deployment, Huawei GTS personnel use this feature to
test the project quality of the cooperation partner.

During the delivery of the entire network, users use this feature to test the project quality.

This feature is used in routine maintenance scenarios.

To improve O&M efficiency for RFs on the air interface, the M2000 introduces the functions of
detecting intermodulation interference.

Benefits
Compared with the traditional method of using measurement instruments to monitor BS
VSWRs, this feature allows users to remotely monitor BS VSWRs on the M2000 and therefore
reduces maintenance and labor costs.
The functions of detecting intermodulation interference simplify the troubleshooting process
for customers based on the experience of RF experts. They have unique values for improving
network O&M efficiency.

Description

The VSWR query feature consists of the VSWR query and threshold settings. Currently
VSWR query applies to the eNodeB.

VSWR query: Users can select one or multiple eNodeBs in the query window to view the
VSWR of theeNodeBs. They can save or print the query result. The query result is saved in a
CSV file.
Threshold settings: Users can divide VSWRs into multiple value ranges and set a display color
for each value range. After the colors are set, the M2000 displays the value ranges of the query
result in the user-defined colors.

The functions of detecting intermodulation interference involves setting detection


parameters, starting or stopping the detection, and viewing the detection progress and
results. Users can save the detection results in XLS files.

Intermodulation interference detection applies to the eNodeB.

Enhancement
The following functions are added to M2000 V200R011C00:

Detecting intermodulation interference

Querying VSWRs of eNodeBs

Dependency
The VSWR query function applies to eNodeBs in eRAN2.1 and later versions.
The intermodulation interference detection function is supported by DBS3900 series eNodeB.

WOFD-081200 Centralized Resource Monitoring in Real Time


Availability
This feature was introduced in M2000 V200R009.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

62

iManager M2000 V200R012


Basic Feature Description

Summary
The M2000 monitors the current network resource usage in real time through key counters,
such as CPU usage, GPRS user-plane traffic volume, and link status. The monitoring results are
displayed in charts. By using this function, users can learn about the device performance status
and system running status in real time.

Benefits

The M2000 supports various types of monitoring, which applies to various O&M
scenarios.

This feature allows users to learn about the device status in real time, and identify and
rectify faults in time, reducing the impacts of faults.

Description
Currently, the M2000 supports the real-time resource monitoring for eRAN NEs.
, describes the monitored items supported by the M2000.
Table 2-3 Monitored items of eRAN supported by the M2000
Monitored Item

Description

CPU usage

Monitors the CPU usage of base station boards, helping O&M


personnel learn about the CPU usage.

RRU performance
monitoring

Detects the RRU performance, including total output power, output


power of each TX channel and carrier, and temperature of the RRU
board and the power amplifier.

Cell performance

Monitors cell resource usage, including the total TX power of cells in


the downlink, service satisfaction, total throughput at the radio link
control (RLC) layer, number of services, number of UEs, resource
block (RB) usage, Inter-Cell Interference Co-ordination (ICIC),
multiple-input multiple-output (MIMO), time-domain interference,
frequency-domain interference, data radio bearer (DRB) statistics on
the air interface, downlink control information (DCI) status on the air
interface, hybrid automatic repeat request (HARQ) status, and
received signal strength indicator (RSSI) interference detection.

UE performance

Monitors UE information, including block error rate (BLER), power


headroom, channel quality, scheduling, RLC traffic volume,
throughput, active queue management (AQM), uplink power control,
and downlink power control, downlink reference signal received
power (DL RSRP), and downlink reference signal received quality
(DL RSRQ).

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

63

iManager M2000 V200R012


Basic Feature Description

Monitored Item

Description

Transmission
performance

Monitors the traffic volume in the RX direction, the traffic volume in


the TX direction, and the number of received error frames on specified
links.
Displays in tables and charts the traffic information about current
Media Access Control (MAC) links, IP links, IP paths, Stream Control
Transmission Protocol (SCTP) links, Point-to-Point Protocol (PPP)
links, and MLPPP links.
Supports User Datagram Protocol (UDP) testing and local and pass-by
traffic monitoring.

Clock quality test


and IP clock data
collection

Clock quality test collects raw phase data about the clock algorithm of
the current NE clock source, facilitating onsite troubleshooting and
maintenance.
IP clock data collection helps users to analyze the clock jitter model on
the live network, facilitating algorithm optimization.

The M2000 implements various types of monitoring functions by performing various tasks.
Users can control the monitoring process by creating, starting, stopping, or deleting tasks. The
M2000 supports a maximum of 30 concurrent monitoring tasks.
After a user selects a monitored item and set the required task parameters, the M2000 sends a
command to NEs to start a monitoring task. NEs report the monitoring results to the M2000 in
real time. Then, the M2000 parses the monitoring results and saves the parsing results in the
database.
The M2000 displays monitoring results in a list or a chart. In the list, users can view the details
of each monitoring result. In the line chart, users can view the history status and trend of
counters.
Users can view the monitoring results through playback. After this playback function is enabled,
the M2000 dynamically displays the monitoring results in the receiving sequence. During the
playback, users can perform the stop, pause, forward, or backward operation and set the refresh
frequency.
With this function, users can view and analyze messages without manually dragging.

Enhancement
The functions of monitoring CPU usage, RSSI interference detection, and DL RSRP/RSRQ for
eNodeBs .
Real-time centralized resource monitoring for eNodeBs is added to M2000 V200R011C00.

WOFD-240100 Network Health Checking


Availability
This feature was introduced in M2000 V200R006.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

64

iManager M2000 V200R012


Basic Feature Description

Summary
This feature allows users to inspect NE devices, analyze alarms, and check the M2000 system
status. It also allows users to export check reports.

Benefits

This feature can implement the total check of the devices on the live network. Therefore,
users need to view only the check report to identify hidden device problems and take
preventive measures to ensure the normal operation of devices and improve the quality of
service.

Users can set a scheduled task to check the network in non-busy hours to reduce the
impacts on network services.

Description
Network health check is performed on the basis of tasks. Users can customize health check
tasks according to the actual requirements. Users can perform operations such as creating,
copying, manually performing a task, enabling the automatic task execution, and viewing the
task status. After a health check task is complete, a check report in HTML or DOC format is
generated.
To meet the requirements in different scenarios, the system provides the following preventive
maintenance and check items:

NE device preventative maintenance


The items required for device preventative maintenance vary according to scenarios. The
M2000 allows users to manage device preventive maintenance templates based on
scenarios. By default, the M2000 provides common device preventive maintenance
templates during scenarios such as maintenance, upgrade check, and device preventive
maintenance. NEs of different types support different default device preventive
maintenance templates. Users can also customize device preventive maintenance
templates and select check items based on scenarios.
Before the M2000 conducts device preventive maintenance, it checks the NE CPU usage:

If the CPU usage exceeds the threshold, the M2000 does not conduct preventive
maintenance and periodically checks the CPU usage.

If the CPU usage is lower than the threshold, the M2000 starts preventive maintenance.

This function prevents a CPU usage decrease during device preventive maintenance.
Health check reports are in HTML or DOC format. The M2000 supports the comparison
of device preventive maintenance results. The NEs that support this check item are
eNodeB, IP Clock Server, and the M2000 itself. Each type of NE supports different
preventive maintenance items:

Check items of the eNodeB


eNodeB type, eNodeB version, hardware status, Ethernet port property, cell status,
environment status, and data consistency.

IP Clock Server check items


IP Clock Server check items include versions of active and standby software,
consistency check of configuration data, device running status, system working mode,
board routing, port status, and fault information.

Issue 02 (2012-04-12)

M2000 health check

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

65

iManager M2000 V200R012


Basic Feature Description

The check items include versions of the operating system and of the patches, version of
the database, M2000 version, NTP server status, system time zone, disk status and
partition usage, available memory, cluster status, and status of the M2000 services.

Alarm check
Both the M2000 and NEs support the alarm check function. Alarm check reports are in
HTML format. Supported check items include alarm trend, alarm TopN, alarm
comparison, alarm statistics, statistics about unacknowledged and uncleared alarms, and
statistics.

Enhancement
The network health check for the eNodeB is added to M2000 V200R008.
The following functions are added to M2000 V200R009:

Checking NE CPU usage before starting device preventive maintenance

Device preventive maintenance management based on scenarios

The network health check of IP Clock Server is added to M2000 V200R010.

WOFD-240700 Network Health Check CN

Availability
This feature was introduced in M2000 V200R009.

Summary
This feature can be used to check the running status of NEs and the network. By viewing health
check reports, users can detect potential faults in devices and take preventive measures to
ensure the normal running of the network.

Benefits
This feature brings about the following benefits:

This feature can implement the total check of the devices on the live network. Therefore,
users can detect potential device faults by viewing the check report and take preventive
measures to ensure the normal operation of devices and improve the quality of service.

After a fault occurs on the network, maintenance engineers can perform NE health check
to quickly identify the causes of the fault.

Before and after an NE is upgraded, maintenance engineers need to use the health check
function to check the NE status and check whether the result is correct after upgrade.
Maintenance engineers can also use this function to check the result of NE patch upgrade
and NE preventive maintenance.

Description
eCNS supports the network health check. For the details about the NEs that support this
function, see the feature list.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

66

iManager M2000 V200R012


Basic Feature Description

The health check items include hardware status, NE version, and patch information, interface
status, link status, circuit status, route and sub-route status, OMU status, basic configuration
data, office data configuration, and alarm information.
To facilitate the implementation of the function, the M2000 supports the health check by
scenarios. NEs and NE check items are classified into scenarios. The check items vary
according to scenarios, such as the upgrade scenario and the capacity expansion scenario.
Network health check is performed through tasks. Users can customize health check tasks
according to the actual requirements. Users can perform operations such as creating, copying,
manually performing a task, enabling the automatic task execution, and viewing the task status.
After a health check task is complete, a check report in HTML or DOC format is generated.
Network health check is performed through tasks. When configuring a task, users need to only
select a proper scenario and NEs to be checked, but do not need to specify check items. This
helps to check NEs in specified scenario. For example, when creating a task, users can select a
type of NEs or a specified NE, and set the running time of the health check task. The M2000
supports instant tasks, scheduled tasks, and periodic tasks.
After a task is completed, users can download task running report that contains the check results
for all check items.
The M2000 supports the function of comparing reports for users to learn the comparison of
check results. This function can be used to compare the check results before and after NE
upgrade.

Dependency
None

2.10 FARS
This function can be used to quickly locate and resolve problems. Normally there is no way to avoid that some user
data such as IMSI, MSISDN will be used during the troubleshooting. However, this function provides an
anonymous data processing method. Operators are obligated to take considerable measures, in compliance with the
laws of the countries concerned and the user privacy policies of your company, to ensure that the personal data of
users is fully protected.

WOFD-081400 Tracing Task Management and Message Browse


Availability
This feature was introduced in M2000 V200R008.

Summary
This feature provides tracing task management and task browsing functions. The task
management function allows users to create, start, and stop tracing tasks. The task browsing
function allows users to browse, explain, filter, play back, and store tracing messages.
The M2000 provides subscriber information anonymous policy management to encrypt IMSI,
IMEI, and MSISDN during signaling tracing. This protects subscriber data from being
disclosed.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

67

iManager M2000 V200R012


Basic Feature Description

Benefits
This feature provides the following benefits:

Providing enhanced LMT functions while inheriting existing functions

Helping users detect exceptions in a timely manner

Improving fault locating efficiency

Subscriber information anonymous policy management encrypts IMSI, IMEI, and


MSISDN for users, prevents plaintext display, storage, and transmission, and protects
subscriber data.

Description
This feature supports signaling tracing in task mode and provides task management functions.
This feature allows users to control the tracing procedure by viewing information about all
tracing tasks and performing operations such as task creation, startup, stopping, and deletion.
The information about each tracing task includes the task name, tracing type, creator, status,
start time, end time, network element, exception cause, and data source.
The M2000 supports a maximum of 100 concurrent subscriber tracing tasks. These tasks
include LTE subscriber tracing tasks.
The M2000 supports a maximum of five concurrent non-subscriber tracing tasks, including
detail subscriber tracing tasks and the non-subscriber tracing tasks of all technologies, such as
cell tracing tasks and interface tracing tasks. A maximum of one detail cell tracing task is
supported.
After a tracing task is started, NEs report traced messages to the M2000. Then, the M2000
analyzes these messages and saves analysis results to the database.
The M2000 supports the following functions on the traced messages:

Message browse
The analysis results for a tracing task are displayed in a list. The contents in the list include
message SN, report time, tracing type, message type, message direction, and message
contents. Users can set message colors according to the message direction and type.

Message explanation
Message explanation is to translate a binary message into a protocol frame structure,
which is displayed as a tree diagram. Users can view the message explanation.

Message filtering
Users can filter tracing messages by message field, message byte, or information element.
Supported fields include message type, message direction, time, and interface type. An
information element is a node carrying service messages in the message tree generated
during message explanation. An information element is identified by a path.

Message storage and printing


Users can save and print all or selected tracing messages. Tracing messages are saved in
XLS, TXT, HTML, TMF, PDF, or CSV format.

Message export
Users can export the data about a selected tracing task to a TMF file. Messages in the TMF
file can be imported into the M2000 again.

Issue 02 (2012-04-12)

Message comparison

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

68

iManager M2000 V200R012


Basic Feature Description

Users can compare messages after the M2000 translates messages into protocol frame
structures. Signaling in two messages is highlighted in different colors.

Message summarization
The M2000 displays the summary about a tracing task, including tracing type, task name,
creator, traced NE, start time and end time, total number of messages, and total number of
MRs.

Message playback
Users can view collected tracing messages using the playback function. After the playback
function is enabled, the M2000 displays tracing messages according to the sequence they
are received. During the playback, users can stop, pause, rewind, or fast forward messages.
In addition, users can set intervals for refreshing messages.
With the playback function, users can view and analyze messages without manually
dragging messages.

Subscriber information anonymization policy management provides the following functions:

Enabling or disabling the anonymization policy: Users can enable or disable the subscriber
information anonymization policy on the entire network. After this policy is enabled, the
M2000 and NEs automatically encrypt the IMSI, IMEI, and MSISDN used in creating
tracing tasks and in messages to prevent subscriber data from being disclosed.

Updating cipher keys: After a new cipher key is delivered and takes effect on the M2000
and NEs, the M2000 and NEs use the new cipher key to encrypt IMSI, IMEI, and
MSISDN.

Checking consistency: Users check the status of the cipher keys and anonymization
switches on the M2000 and NEs and synchronize the status based on the check results to
ensure that the status is consistent between the M2000 and NEs.

Enhancement
The following function is added to M2000 V200R012C00:

Saving traced messages as a TMF file

Subscriber information anonymous policy management

The following function is added to M2000 V200R011C01:

Maximum number of concurrent subscriber tracing tasks reaches to 100

The following functions are added to M2000 V200R009:

Message playback

Message filtering based on information elements

Dependency
This feature applies to all the tracing features in section 2.10 "FARS" except for the feature
WOFD-191700 Mass Trace Collection LTE.
Users can use this feature only after they have purchased the optional tracing features.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

69

iManager M2000 V200R012


Basic Feature Description

WOFD-081300 Centralized Interface Tracing LTE


Availability
This feature was introduced in M2000 V200R008.

Summary
By using this feature, the M2000 can trace and display the interface messages and the link
messages to provide the effective data support for routine maintenance, commissioning, and
fault localization of devices.
The LTE provides the following interface tracing tasks:

Tracing tasks of standard interface messages: S1 interface tracing, X2 interface tracing,


and Uu interface tracing

Tracing tasks of transport network layer protocol messages: SCTP tracing, PPP tracing,
LACP tracing, 802.1X tracing, OAM3AH tracing, GTPU tracing, MP tracing, IKE tracing,
CFM, CMPV2 tracing, and IP tracing.

By using this feature, the M2000 collects tracing data on interfaces such as the S1 and X2
interfaces in tasks. This helps users trace data and monitor task status.

This feature provides a user-friendly GUI, which allows users to quickly locate call faults
and solve problems related to device interconnection.

Benefits

Description
The maximum duration of an interface tracing task is 12 hours. Users can specify the start time
and end time. After a tracing task is started, NEs trace the messages of a specified object or of a
specified interface and report the messages to the M2000. The M2000 parses these messages
and saves the parsing results in the database.
In addition to the functions provided in the feature WOFD-081400 Tracing Task Management
and Data Browse, the M2000 also provides the function of extracting messages based on
information elements. In many scenarios, users need to export the counters or fields generated
during a call into a report and submit the report to a third party. To meet the requirements in
these scenarios, the M2000 provides message extraction based on information elements. An
information element is a node carrying service messages in the message tree that is obtained
through message explanation. An information element is identified by a unique path.
Message extraction is performed on the basis of tracing tasks. Before extracting messages,
users need to specify a tracing task and template. The template specifies the information
elements based on which message extraction is performed. After starting message extraction,
the M2000 extracts the values of all information elements specified in the template from each
message and displays the extraction results in the message list. The message list displays all
message fields, and a column is added for each information element to display the value of the
information element recorded in each message. Message extraction results can be exported to
XLS, HTML, TMF, PDF, TXT or CSV files.

Enhancement
The following function is added to M2000 V200R012C00:

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

70

iManager M2000 V200R012


Basic Feature Description

IP protocol message tracing at the transport network layer

The following function is added to M2000 V200R011C00:

Tracing of transport network layer protocol messages: PPP tracing, LACP tracing, 802.1X
tracing, OAM3AH tracing, GTPU tracing, MP tracing, IKE tracing, CFM, and CMPV2
tracing.

The following function is added to M2000 V200R010:

Message extraction based on information elements

Dependency
None

WOFD-191200 Centralized Subscriber Tracing LTE


Availability
This feature was introduced in M2000 V200R008.

Summary
The subscriber tracing refers to tracing the signaling messages of all the calls of a specified UE
(for example, a VIP UE) on the network within a certain period. By collecting and analyzing
statistics of the call signaling messages, users can locate call faults.
This feature supports subscriber tracing across multiple eNodeBs. After the subscriber tracing
is triggered on the core network, the eNodeB where the traced UE resides reports the call
message to the M2000. Then, the M2000 collects and displays the subscriber tracing messages
of multiple eNodeBs.

Benefits
This feature brings about the following benefits:

The user-friendly GUI makes operations more convenient. This helps O&M personnel
locate call faults effectively and helps telecom operators reduce O&M costs.

Real-time subscriber tracing allows O&M personnel to learn about the call messages of
VIP UEs and drive test UEs in real time. This helps O&M personnel detect and locate
faults more effectively and therefore improves user satisfaction.

The M2000 supports UE signaling tracing across multiple NEs. This allows users to trace
all the signaling of a call by creating a task.

Description
Before creating a subscriber tracing task, users need to start the subscriber tracing, obtain the
tracing reference number from the CN, and enter the tracing reference number on the M2000 to
create the tracing task. After the tracing task is started, NEs trace the call messages of a
specified UE and report the messages to the M2000. The M2000 parses these messages and
saves the parsing results in the database. The duration of a subscriber tracing task is one day by
default, and the maximum duration is seven days. Users can specify the start time and end time.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

71

iManager M2000 V200R012


Basic Feature Description

In addition to the functions provided in the feature WOFD-081400 Tracing Task Management
and Data Browse, the M2000 also provides the function of extracting messages based on
information elements.
In many scenarios, users need to export the counters or fields generated during a call into a
report and submit the report to a third party. To meet the requirements in these scenarios, the
M2000 provides message extraction based on information elements. An information element is
a node carrying service messages in the message tree that is obtained through message
explanation. An information element is identified by a unique path.
Message extraction is performed on the basis of tracing tasks. Before extracting messages,
users need to specify a tracing task and template. The template specifies the information
elements based on which message extraction is performed. After starting message extraction,
the M2000 extracts the values of all information elements specified in the template from each
message and displays the extraction results in the message list. The message list displays all
message fields, and a column is added for each information element to display the value of the
information element recorded in each message. Message extraction results can be exported to
XLS, HTML, TMF, PDF, TXT or CSV files.

Enhancement
The following function is added to M2000 V200R010:

Message extraction based on information elements

Dependency
None

WOFD-191600 Centralized Cell Tracing LTE


Availability
This feature was introduced in M2000 V200R010.

Summary
Cell tracing is a process of tracing the call signaling of UEs that are live in one or multiple
specified cells. The M2000 collects the cell tracing data to provide data source for users to
evaluate the performance of the live network or diagnose network faults.
The cell tracing feature applies to the following scenarios:

Sampling and analyzing network performance to optimize the network or identify and
rectify network faults

Performing drive tests during site deployment to locate network problems

Adjusting and verifying cell configuration parameters

Benefits
The user-friendly GUI simplifies operations and helps O&M personnel to effectively identify
and rectify call faults. It also helps telecom operators to reduce O&M costs.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

72

iManager M2000 V200R012


Basic Feature Description

Description
Using the centralized cell tracing feature, users can collect call signaling tracing messages
generated in one or multiple cells within a specified period. In addition, users can collect radio
measurement data during calls. Signaling tracing messages include standard messages specified
by the 3GPP specifications and traced at the application layer over S1, X2, and Uu interfaces.
Radio measurement data includes MRs for Uu interfaces.
Centralized cell tracing allows users to collect data at three levels specified by the 3GPP
specifications: minimum, medium, and maximum. Users can collect MRs only at medium and
maximum levels. The maximum duration for a tracing task is seven days. Users can set start
time and end time for a task. In addition, users can specify the period for collecting periodic
events on the M2000.

Enhancement
The following function is added to M2000 V200R012C00:

Allowing users to specify the period for collecting periodic events.

The following functions are added to M2000 V200R011C01:

A tracing task can run for a maximum of seven consecutive days.

The following function is added to M2000 V200R011C00:

Supporting the data browse function in the feature WOFD-081400 Tracing Task
Management and Data Browse.

Dependency
None

2.11 Base Station Commissioning Management


WOFD-280400 eNodeB Auto-Deployment LTE
Availability
This feature was introduced in M2000 V200R008.

Summary
The M2000 provides an eNodeB deployment wizard, which implements eNodeB self detection,
eNodeB self configuration, and self RET commissioning according to the eNodeB deployment
list and deployment data.
The M2000 allows users to monitor the process of eNodeB deployment in real time. As a result,
users can learn about the progress, status, and execution reports of the deployment.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

73

iManager M2000 V200R012


Basic Feature Description

Benefits
The deployment wizard simplifies the eNodeB deployment and reduces human errors,
improving the efficiency of deploying eNodeBs. The M2000 works with NEs to implement
automatic eNodeB deployment in batches, reducing manual interventions, improving the
capability of network deployment.

Description
This feature applies to eNodeB deployment, capacity expansion, and reparenting. This feature
implements end-to-end eNodeB deployment. During the deployment, the M2000 automatically
monitors eNodeB status and performs health check, which simplifies manual operations.
The following preparations must be made before eNodeB deployment:

The target software version, commissioning license, and configuration data of the eNodeB
are uploaded to the M2000.

The transmission between the eNodeBs and the M2000 is proper.

Automatic eNodeB deployment involves the following procedures, which can be customized
based on application scenarios:

Automatic eNodeB detection and automatic IP address assignment


O&M personnel import an eNodeB deployment list to the M2000. The list contains data
required for eNodeB deployment, such as eNodeB names, target version number, ESNs,
and IP addresses. The M2000 creates eNodeBs in a topology view, based on the
deployment list. After O&M personnel select target eNodeBs on the M2000 GUI and start
deployment, the M2000 automatically checks whether the required data is available. If no
exception occurs, the M2000 automatically performs eNodeB deployment without human
intervention.
The M2000 assigns IP addresses to the selected eNodeBs using DHCP and automatically
sets up O&M channels to the eNodeBs. To simplify IP address planning, the M2000
provides an IP address pool. O&M personnel need to configure only a network segment
for eNodeB IP addresses. Then, the M2000 automatically assigns available IP addresses in
the IP address pool to eNodeBs.

Automatic eNodeB configuration


The M2000 instructs the eNodeBs to start software upgrade. Then, the eNodeBs
automatically download software and configuration data from the M2000, and perform
software upgrade and data loading.

Delivery of commissioning licenses


During initial eNodeB deployment, the M2000 cannot allocate commercial licenses to the
eNodeBs because network planning is uncertain. After the eNodeBs perform software
upgrade and data loading, the M2000 delivers commissioning licenses to the eNodeBs.
This ensures that the eNodeBs provide services properly before commercial licenses are
available.

Automatic RET commissioning


After the eNodeBs are configured, RETs must be commissioned to ensure proper cell
coverage. The M2000 integrates RET commissioning into eNodeB deployment, which is
automatically performed by the M2000. In this way, RET commissioning is automated and
manual interventions are reduced.
The M2000 instructs the eNodeBs to start RET commissioning. Then, the eNodeBs
automatically download software and configuration data from the M2000, and perform
software upgrade and data loading. The eNodeBs then calibrate the downtilts of the RETs.

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

74

iManager M2000 V200R012


Basic Feature Description

eNodeB status monitoring


The M2000 checks installation and deployment quality and continuously monitors
eNodeB alarms and cell availability status. The M2000 starts an eNodeB health check
immediately after detecting an available cell. The health check items include eNodeB
hardware status, cell status, environment status, and data consistency. After confirming
that all the health check items in the check report pass the check, O&M personnel need to
confirm that eNodeB deployment is complete. In addition, the M2000 allows users to view
alarm information based on object categories, such as cells, boards, and links. They can
also start antenna fault diagnosis based on problem locating requirements.

During the whole eNodeB deployment process, engineers can obtain the deployment report at
any time. The report records the information such as operation results and unsolved problems.

Enhancement
The following functions are added to M2000 V200R011C00:

eNodeB status monitoring

The following functions are added to M2000 V200R010:

Supporting the O&M IP pool function: After users set the network segment of the O&M IP
pool, the M2000 automatically assigns O&M IP addresses to eNodeBs.

Automatically commissioning license distribution and RET commissioning.

Dependency
None

Issue 02 (2012-04-12)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

75

iManager M2000 V200R012


Basic Feature Description

Acronyms and Abbreviations

Numerics
3GPP

3rd Generation Partnership Project

A
ACL

access control list

ALD

antenna line device

ATAE

Advanced Telecommunications Application Environment

C
CORBA

Common Object Request Broker Architecture

D
DST

daylight saving time

E
ESN

electronic serial number

eSAU

evolved service aware unit

F
FDN

Full Distinguished Name

FTP

File Transfer Protocol

G
GPS

Issue 02 (2012-04-12)

Global Positioning System

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

76

iManager M2000 V200R012


Basic Feature Description

GSM

Global System for Mobile Communications

GUI

graphical user interface

H
HTTP

Hypertext Transfer Protocol

I
ICIC

inter-cell interference coordination

L
LDAP

Lightweight Directory Access Protocol

LTE

Long Term Evolution

M
MD5

message digest algorithm 5

MDT

Minimization of Drive-Tests

MLB

mobility load balancing

MML

man-machine language

MOCN

multioperator core network

MR

measurement report

MRO

mobility robust optimization

N
NTP

Network Time Protocol

O
O&M

operation and maintenance

OPEX

operating expense

OSMU

OSS self-maintenance unit

OSS

operations support system

P
PC

Issue 02 (2012-04-12)

personal computer

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

77

iManager M2000 V200R012


Basic Feature Description

R
RAN

radio access network

RAT

radio access technology

RLF

radio link failure

S
SAIC

single antenna interference cancellation

SNMP

Simple Network Management Protocol

SNTP

Simple Network Time Protocol

SSH

Secure Shell

SSL

Secure Sockets Layer

SSO

single sign-on

T
TCP

Transmission Control Protocol

U
UDP

User Datagram Protocol

UMTS

Universal Mobile Telecommunications System

V
VPN

virtual private network

VSWR

voltage standing wave ratio

W
WCDMA

Issue 02 (2012-04-12)

Wideband Code Division Multiple Access

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

78

Anda mungkin juga menyukai