i can-magazine of access network documentation(01)

Upload: shehab-eldien-tarek

Post on 05-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    1/11

    Introduction to the Information Systemof Access Products

    Improvement on Alarm Reference

    Improvement on Command Reference

    Sponsored by Accsess & Service Information Development Dept

    Hot Issues

    01

    Information Can guide you

    08/2009NO.1

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    2/11

    PilotageDevelop the best information

    Polish the products

    Ease our customers

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    3/11

    1

    Description

    Internal work

    This document describes the functions, features,and status of various documents for the equipment of the access network.

    Key words: Advantage, usage, and highlight

    Access NetworkDocumentation System

    Operation

    One hit

    Reference

    Well-informed

    DocumentationGuide

    Guide to thedocumentation

    Product Description

    Function dictionary

    HardwareDescription

    Encyclopediaof hardware

    Feature Description

    Complete collectionof features

    Planning GuideA must for planningand design

    Installation GuideQuick Installation

    Guide

    Commissioning Guide

    Configuration Guide

    Administrator Guide

    Routine Maintenance

    Troubleshooting

    Parts Replacement

    NorthboundInterface User Guide

    golden book for softwareand hardware installation

    Serial picturesof installation

    Golden book fordeployment

    Golden book for operationson the equipment

    N2000 manager

    A health checkupon equipment

    Guardian ofequipment health

    Last resort

    Guide to OSSservice provisioning

    Command Reference

    Treasure box ofcommands

    Performance IndexReference

    Dictionary ofperformance indexes

    Introduction to the Information Systemof Access ProductsIntroduction to the Information Systemof Access Products

    Alarm and PerformanceEvents ReferenceRed indicatorterminator

    Information .Catches the current trends of the Access Network information

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    4/11

    Documentation Guide A guide to the documentationAdvantage: It describes the main contents of all the documents.

    Product Description A function dictionary

    Feature Description A complete collection of featuresAdvantage: It describes the definition, specifications, principles, and configuration of each feature ofthe product.

    Planning Guide A must for planning and designAdvantage: It describes the requirements and principles for network planning and design.

    Installation Guide A golden book for software and hardware installationAdvantage: It describes the methods of installing the hardware for the equipment and the softwarefor the EMS.

    2

    Hardware Description An encyclopedia of hardwareAdvantage: It describes each part of the equipment in every aspect.

    Configuration Guide A golden book for operations on the equipment

    Administrator Guide A manager for the N2000 BMS

    Advantage: It describes the methods of configuring and operating the equipment onthe N2000 and the related precautions.

    Parts Replacement The last resortAdvantage: It describes the operations for replacingcomponents and boards.

    Information .Catches the current trends of the Access Network information

    Usage: Reading the Documentation Guide helps understand the roles and functions of all thedocuments so that you can find your desired information in the documents more quickly.Highlight: The Documentation Guide provides the recommended documents for theaudience who assume different responsibilities.

    Advantage: It covers all the technical characteristics, features, and functions of the product.Usage: This document is preferred if you need to quickly know the capability and features of theproduct.Highlight: The Product Description provides all the technical specifications of the product.

    Usage: It tackles each scenario by focusing on each product feature.

    Usage: You can query any information about the cabinet, shelf, boards, cables, and electromechanicaldevices in this document.Highlight: The Hardware Description provides a quick reference to some common information. Readthis document, and maybe you can find your desired information.

    Usage: This document provides a guide to your network planning and design, and NE configuration.

    Usage: Hardware installation engineers are required to read this document.

    Highlight: The companion volume for the document is the Quick Installation Guide, which is ofhigh-quality pictures and written explanations, simple and easy to read.

    Advantage: It describes the method of commissioning during deployment.

    Usage: Commissioning engineers are required to read this document.

    Commissioning Guide A golden book for deployment

    Usage: The N2000 operators are required to read this document.

    Advantage: It describes how to manage the N200 BMS.

    Usage: It is a guide to the N2000 BMS administrators for managing the N2000 BMS.

    Routine Maintenance A health checkup on the equipmentAdvantage: It describes the routine check items and operations.

    Usage: You can have a health checkup on the equipmentaccording to this document.

    Highlight: It guards against possible new threats to theequipment.

    Troubleshooting A guardian of equipment healthAdvantage: It describes the methods and operations fortroubleshooting.Usage: With this document, you can check the faultcauses step by step according to different scenarios andfault phenomena.Highlight: Read this document in advance. Then, youcan draw inferences about other cases from one

    Usage: When the fault is located as damage to thehardware, refer to this document to replace the relatedHighlight: Parts replacement is the last resort duringtroubleshooting. Therefore, exercise caution when using it.

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    5/11

    3

    Northbound Interface User Guide

    An assistant in OSS service provisioning

    Advantage: It describes how to provision the service through thenorthbound interface of the N2000 BMS.

    Alarm and Performance Events Reference A "red indicator" terminator

    Advantage: It describes the procedure for handling all alarms.

    Command Reference A treasure box of commands

    Advantage: It describes the usage of all the commands for the equipment.

    Information .Catches the current trends of the Access Network information

    Usage: This document is a guide to the service provisioning when the OSSof a third party is used.

    Usage: You can locate the alarm cause and eliminate the "red indicator" according to theinstructions in this document.

    Highlight: This document removes the mystery of alarm parameters.

    Usage: In this document, you can query the function, format, parameter description,mode, level, usage guidelines, and system response of each command in thesystem.

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    6/11

    The number of alarms is too large.

    Once in a central office, thousands of alarms were generated in a day, which was inconvenientfor the customer to focus on the key problems.

    The alarms are not accurately defined, resulting in poor guidance.

    Some alarms are minor, but are defined as critical alarms. In this case, the number of criticalalarms is large, so the workload for handling the critical alarms is heavy; meanwhile, it is difficult

    to use these alarms. The points of failure indicated by some alarms are ambiguous, so that it isdifficult for the customer to understand and troubleshoot them. As a result, the troubleshootingefficiency is low.

    The guidelines in the documents matching the alarms for handling the

    alarms are not as clear as possible.

    The possible causes of some alarms are neither clear nor complete. Meanwhile, the procedurefor handling the alarms in different situations is not described step by step. Therefore, it is verydifficult for the customers to understand the alarms and troubleshoot the related faults accordingto the guidelines.

    The alarms are not managed in a unified way.

    The developers fail to comply with the alarm change control procedure, and they add or modifyalarms without authorization. As a result, a large number of redundant alarms exist in the alarmslist and in the equipment.

    Present condition

    Improvement on

    Alarm Reference

    In the past, the most impressive thing about the alarms for the access equipment was what a largenumber of the alarms! As a result, it was taken for granted that the maintainability of the alarms was poor.There is a procedural guide for the alarm change control, but the related restraint mechanism is notavailable. Therefore, the implementation is not satisfactory. Now, by optimizing the alarms and introducingthe change control tool, the access network has taken the lead in alarms in the network product line.

    Key words : sharp increase in the number of alarms, separating events fromalarms, change control, and unified alarm library management.

    4

    Information .Catches the current trends of the Access Network information

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    7/11

    5

    After optimization

    The alarms are defined according to the rules.

    The notification of the system after its detection of a fault is defined as an alarm. The normal conditiondetermined by the customer or the active notification of the system for the customer when the system worksin the normal state is defined as an event. When an alarm occurs, the customer is generally required totroubleshoot the fault according to the related handling procedure so that the alarm can be cleared. Anevent, however, need not be cleared.

    The information about the alarm is correct and complete.The attributes of an alarm are complete and match the related fault.

    The alarm can be cleared because the related fault can be rectified according to

    the handling procedure in the alarm reference.

    The handling procedure in the alarm reference is written in the step-by-step way, so that the fault can berectified quickly.

    The information about alarms can be filtered according to various conditions.

    The alarms can be filtered according to different parameters. For example, you can filter an alarm in allscenarios by its alarm ID, or you can filter an alarm on a certain port.

    The alarm store will not be generated.Upon the system alarm optimization, the traffic of alarms that are reported during a short period of time isstable, and no burst traffic will be generated, which prevents the alarm storm.

    The number of alarms is evidently reduced.

    After the system alarm optimization, some alarms that are not clearly defined are deleted or combined. As aresult, the number of alarms is reduced by 40% in comparison with the earlier version.

    The alarms are managed in a standardized way and the change is under control.

    The alarm baseline is created and the alarms for all the versions are managed in a unified way by theResman tool. The application for changing an alarm must be filed through the Resman tool for review bythe experts in the related fields. The alarm library, alarm codes, and alarm document are updated

    Information in the Alarm Reference before andafter system alarm optimization

    Before optimization

    ALM-0x15411024 Fan Block Alarm

    Description

    Attribute

    Parameters

    Possible

    Handling

    Parent topic:

    Information .Catches the current trends of the Access Network information

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    8/11

    6

    After optimization

    0x15411024 Fan Blocked

    Description

    Attribute

    Impact on System

    Possible

    Handling Procedure

    Related Information

    reset

    display fan alarm

    0x15421024 Fan Block Recovery Alarm

    0x15411025 Temperature Too High

    Information .Catches the current trends of the Access Network information

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    9/11

    Improvement onCommand Reference

    The new Command Reference is a new experience to you. We are confident that theCommand Reference can be an indispensable assistant to your work!Key words: Command Reference, function, parameter description, and usageguidelines

    7

    Origin

    The Command Reference is the document that is used most frequently. Its contents, however, are too simple to be aguide to the operations. In this case, the customers lose confidence in using the document. As a result, the customersatisfaction with the document is low.The major problems concerning the Command Reference are as follows:

    The command functions and parameters are not clearly described, so the document cannot be a guide to theoperations.

    The use guidelines are too simple to instruct the customers to perform the related configurations.

    Analysis of major problems concerning the Command Reference:

    1. The Function is simply described.

    In the Function section,the function of the command is described,but the description is very simple. For example:

    power off

    2. The Parameters are described simply and the customers are doubtfulabout the contents in the Value.

    Paramet Description Value

    Load-off-state load-off-state

    battery-off-statebattery-off-stateload-off-voltage

    load-off-voltage

    Battery-off-voltagebattery-off-voltage

    Sets the load power-off status.

    Sets the power-off voltage for a batterygroup.

    Sets the load power-off voltage.Sets the power-off voltage for a batterygroup.

    permit and forbid Default: forbid.

    35.0-44.9 V Unit: V.

    Default: 43.5 V.

    Information .Catches the current trends of the Access Network information

    permit and forbid Default: permit.

    35.0-44.9 V Unit: V.Default: 43 V.

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    10/11

    3. The User Guidelines are lack of some important information, so they are not instructive.

    Description

    After optimization

    1.The template for the Command Reference is optimized, and the Function is enhanced.The detailed function of the command is described. In addition, the scenario where the command is used andthe result after the command is executed are also described. For example:

    2.The Parameters are described in detail.The parameters are described in detail, and such contents as the principles and type of

    the parameters are also described.

    3.The User Guidelines are improved.

    The information related to the command is described in detail, including the related concepts, specifications, andprecautions of the command. This makes the Command Reference more instructive. For example:

    8

    Usage Guidelines

    How to obtain the documentation :Documentation CD-ROM: http://support.huawei.com/

    The set battery group power-off voltage must meet that: DC over-voltage - 1 V > even charging voltage > float chargingvoltage + 2 V and DC under-voltage > load power-off voltage > battery power-off voltage.

    power off

    FunctionThis command is used to set the power-off parameters for a load or a battery group. When the mains powers off, thesystem adopts the battery to supply power. When the load power-off is permitted and the load voltage reaches the loadpower-off voltage, the system reserves the 10 A output branch and disconnects the 50 A, 20 A output branchesautomatically. When the battery group power-off is permitted and the battery voltage reaches the battery power-offvoltage, the system automatically disconnects the connection between the battery and all loads. To set the power-offfunction for the load and the battery group to ensure that the device can work normally in the case of the mainsdisconnection, run the command. After that, all parameters take effect immediately.

    Parameter Description Value

    load-off-state load-off-state

    battery-off-statebattery-off-state

    load-off-voltageload-off-voltage

    Battery-off-voltagebattery-off-voltage

    Sets the load power-off status. When the system has no powermodule and the total line bank voltage is smaller than the power-off voltage, set the parameter as permit if the power monitoringsystem needs to perform the power off operation on the load.Otherwise, set the parameter as forbid.

    Sets the power-off voltage for a batter y group. When the systemhas no power module and the total line bank voltage is smallerthan the power-off voltage, set the parameter as permit if thepower monitoring system needs to perform the power offoperation on the load. Otherwise, set the parameter as forbid.

    Sets the load power-off voltage. The set load power-off voltagemust meet that: DC over-voltage - 1 V > even charging voltage >float charging voltage + 2 V and DC under-voltage > loadpower-off voltage > battery power-off voltage.

    Sets the power-off voltage for a battery group. The set batterygroup power-off voltage must meet that: DC over-voltage - 1 V> even charging voltage > float charging voltage + 2 V and DCunder-voltage > load power-off voltage > battery power-off

    voltage.

    Enumerated type. Options: permit and forbid.Default: forbid.

    Default: permit.

    Numeral type. Range: 35.0-44.9 V .Unit: V.

    Default: 43.5 V.

    Numeral type. Range: 35.0-44. 9 V. Unit: V.

    Default: 43 V.

    All the matched traffic streams are deleted when the specified traffic stream is deleted.Each xDSL port supports up to 8 PVCs.Each service board supports up to 256 PVCs.The service virtual port cannot be deleted under the following conditions:

    O The port is encapsulated as PPPoA, IPoA or as Auto.

    O The port is added to the BTV user.

    O The port is bound with the IP address or the MAC address.

    O The port is configured with the static MAC address.

    When you create the access traffic stream in the xDSL and ATM modes and if you do not specify the VPI and VCI, the system willallocate a VPI and VCI automatically. The initial value of the VPI is 0 and that of the VCI is 32.

    When the service virtual port needs to carry multiple services:

    O If the multiple services are differentiated based on the service encapsulation type, you need to input the service encapsulation type onthe user side.

    O If the multiple services are differentiated based on the VLAN ID on the user side, you need to input the VLAN ID on the user side.

    O If the multiple services are differentiated based on the user side priority on the user side, you need to input the user side priority.

    Each physical port has up to one autosense traffic stream and it cannot exist with the common traffic stream at the same time.

    Information .Catches the current trends of the Access Network information

  • 8/2/2019 I Can-Magazine of Access Network Documentation(01)

    11/11

    11

    The documentation for the SmartAX MA5600T V800R005C03 is recommended here. The positioning andfeatures of, and the element management system (EMS) and documentation for the MA5600T are introduced. Toknow details of the product, please refer to the documents for the product.

    1. Positioning of the MA5600T

    2. Benefits and features of the MA5600T

    The SmartAX MA5600T is a multi-service access device of Huawei. It provides the integrated broadband andnarrowband access services of large capacity, high rate, high bandwidth, and high quality. In addition, it providessubscribers with the FTTx optical access service. As a multi-service access platform, the MA5600T supports multiplenetworking modes to satisfy the networking requirements of subscribers in different scenarios and for different services.

    Abundant interfacesUpstream interface, service interface, and maintenance interface.

    Operable IPTV serviceThe MA5600T supports the following specifications:IGMP V2/V3

    IGMP proxy and IGMP snooping

    1024 multicast groups

    Multiple modes for authenticating multicast users to meet the requirements of different multicast operators

    owerful GPON access capabilityThe MA5600T supports the following specifications:Both static bandwidth allocation (SBA) and dynamic bandwidth allocation (DBA)

    Passive optical transmission to resolve the bandwidth bottleneck of the access over the twisted pair cables

    Downstream rate of 2.488 Gbit/s and upstream rate of 1.244 Gbit/s

    Maximum physical reach of 20 km

    A split ratio of 1:64

    erfect voice featureThe MA5600T supports the following specifications:H248 and MGCP protocols

    PSTN basic services and supplementary services

    Transparent transmission of fax and modem services

    Voice coding and decoding protocols, such as G.711 (A-law/-law), G.723.1, and G.729 (A/B)

    Local announcement services

    Echo cancellation

    Media Gateway Controller (MGC) dual homing

    trict securityThe MA5600T supports the following specifications:Prevention of DoS attacks on the system

    Access control list (ACL)-based access control

    Layer 2 (L2) user isolation and controlled mutual access

    Encrypted broadcast transmission in the downstream direction for different users, such as Advanced Encryption Standard (AES) 128-bitencryption

    3. EMS for the MA5600T

    EMS for the MA5600T V800R005C03: N2000 BMS V200R011C03

    4. Documentation for the MA5600T

    31183207-MA5600T Electronic Documentation-(V800R005C03_01,MSAN)

    31183209-MA5600T Electronic Documentation-(V800R005C03_01,GPON)

    Information .Catches the current trends of the Access Network information

    Hot Issuesot Issues