Documente Academic
Documente Profesional
Documente Cultură
Contents
3 Security Management................................................................................................................3-1
3.1 Overview.......................................................................................................................................................3-2
Figures
Tables
1.1 Overview
The universal signaling access unit (USAU) adopts the Client/Server structure.
Each maintenance terminal is the client of the entire system, and provides the maintenance
and operation functions.
The back administration module (BAM) is the server of the entire system, and provides the
multi-point maintenance and remote maintenance.
As the server, the BAM performs two main functions, as follows:
z The function of database
Implementing the storage and transferring data such as alarm information, traffic
statistics data
z The function as the bridge of communication between the USAU host and the
maintenance terminal
Sending the maintenance and operation commands from a client (remote/local) to the
USAU host and receiving the execution results from the host
The BAM server application software includes a service process manager (BAM Manager)
and several processes (such as Warn and Dataman) based on:
z Windows 2000 Server operating system
z MS SQL Server 2000 database system
Starts the selected service Before using these shortcut keys, you have to
choose a process in the list.
Stops the selected service z If the selected process is running, the Start
icon is disabled.
z If the selected process is stopped, the Stop
icon is disabled.
Stops all running services None.
Closing the BAM Manager will lead to interruption of communication between the BAM and all the
maintenance workstations (WSs), the network management software, and the host.
The main window of the BAM Manager consists of four list items as shown in Table 1-2.
Option Description
Start a specified z From the BAM Manager window, choose the process to be started.
process
z Then choose File > Start menu or click on the tool bar. The
selected process will be started.
Stop a specified z From the BAM Manager window, choose the process to be stopped.
process
z Then choose File > Stop menu or click on the tool bar. A
message is displayed prompting you to confirm stopping the process.
When you click Yes, the selected process will be stopped.
Stop all
Choose File > Stop All menu or click on the tool bar.
processes
The Start and Stop options in the File menu are enabled or disabled based on whether the selected
process is running or stopped. That is:
The Start option is enabled only when the process is stopped.
The Stop option is enabled only when the process is running.
To enable real-time monitoring, choose Options > Realtime Monitor or click on the
tool bar.
To configure the startup information, choose Options > Startup menu or click on the
tool bar. The dialog box as shown in Figure 1-2 will pop up.
Step 2 Right-click on BAMService, and choose Properties in the shortcut menu. The BAMService
Properties window is displayed as shown in Figure 1-4.
There are three options for Startup type, as shown in Table 1-4.
----End
The initialization information of the BAM is saved in the BAM configuration file
STXBAM.ini. The information is of great importance to the operation of the BAM; therefore,
in normal cases do not modify the values, especially those values with remarks specifying that
the value cannot be modified.
If you must modify the value of a certain registration item, it is better to close the
corresponding application before modifying.
Before modifying the STXBAM.ini text file, you must back it up and rename it for the sake
of recovery operation if an error occurs in the modification. And then double-click the
STXBAM.ini file. An editor window pops up, as shown in Figure 1-5. Modify the content of
the sub-item according to actual needs. After you finish the modification, restart the process
this sub-item belongs to, and it will make the modification take effect.
In the STXBAM.ini file, start time for automatic backup of BAM database and registry can be set by
modifying the following setting in the DataMan:
BkpDbStartHour (start hour for database backup)
BkpDbStartMin (start minute for database backup)
The DataMan process has to be restarted for the new setting to take effect after the automatic backup
time is modified.
In the format YYYYMMDD, YYYY stands for the year, MM stands for the month, and DD stands for
the date. For example, 20041230 stands for Dec. 30, 2004.
Step 2 Suppose the name of the BAM is L24094B (Windows NT). Browse to Console Root >
Microsoft SQL Servers > L24094B (Windows NT) > Databases. Right-click on Databases.
A menu pops up as shown in Figure 1-7.
Step 3 Choose All Tasks > Backup Database. A window pops up as shown in Figure 1-8.
Step 4 Choose Bam from the Database box to specify the database to be backed up.
Step 5 Under Backup, specify to back up all the data or data that has been modified.
Step 6 Under Destination, choose the default data backup file name and click Remove to remove the
value. Then click Add to set the path where the backup file is located and the file name as
shown in Figure 1-9.
Step 7 Under Overwrite, choose Overwrite existing media if you want to overwrite on the existing
data. If you do not want to overwrite the data, choose Append to media and then click OK.
Figure 1-9 Selecting the path and name of the backup data file
Step 8 The backup is started after confirmation. The progress of the backup process is displayed as
shown in Figure 1-10.
Step 9 After the data are backed up successfully, a prompt will pop up to indicate the success.
For BAM database backup, the system does not back up the data in the transaction log in the
case of BKP DB command while it does in the case of SQL Server Enterprise Manager.
The file generated from manual backup is named based on the date. If it is necessary to take
backups several times within one day, the file name of the last backup has to be modified
manually.
Before BAM database backup, run the command for supplementary service data backup to
ensure that the data of the services stored in the BAM database is the latest one.
----End
Step 3 Choose the path to save the file and enter the file name. Click Save.
----End
BAM Service will surely restart Windows 2000 when it detects the BAM system has stopped running
during data recovery. However, the BAM must stop running during the data recovery. To avoid Windows
2000 from being restarted, BAM Service must be stopped before data recovery.
Step 2 Right-click on BAMService, and choose Properties option on the shortcut menu. The
BAMService Properties window is displayed as shown in Figure 1-13.
Step 3 If the Service status is Started, click Stop to end the service. In the Startup type combo box
choose Disabled option. Click Apply and then click OK.
----End
Step 2 Click to end the SQL Server. A message is displayed prompting you to confirm
stopping the SQL Server. Click Yes. The communication between the host and the BAM of
the USAU will be interrupted.
Step 3 Choose All Tasks > Restore Database in the shortcut menu. A dialog box is displayed as
shown in Figure 1-16.
Step 4 Choose Bam in the Restore as database combo box. Under Restore, choose From device.
Specify other parameters based on actual requirements (complete database restoration,
restoration of different databases, and so on.). In general, the latest backed up device data file
is displayed under Devices. If the device data file to be recovered is correct, skip Step 5.
Otherwise, go to Step 5.
Step 5 If the device data in the window as shown in Figure 1-16 are not the backed up device data,
follow the steps below:
Click Select Devices and then the Choose Restore Devices dialog box is displayed as shown
in Figure 1-17.
Choose device files in the list and click Remove All. Then click Add. A dialog box is
displayed as shown in Figure 1-18.
Choose the Backup device button and choose the device to be recovered from the drop-down
list box according to the equipment name. Click OK.
Step 6 Choose the data backup file to be recovered and click OK. The recovery is started and a
window pops up showing the progress of the data recovery.
Step 7 After the data recovery is completed, set the BAM Service to automatic start mode and then
restart the BAM.
----End
Start Conditions
The conversion relationship between each serial port and TCP/IP created by the
communication gateway software is called a connection. The software supports several
connection instances with each of them monitored by a conversion thread, which can be set
up or closed at any time.
The software can directly run on the BAM, or run on the LAN where the BAM is located, or
even on any machine capable of TCP/IP communication with the BAM on WAN, and the
serial port of the machine can be used to provide services to the client WS.
If there are some connections made successfully in the previous running process, the system
will auto record the connection configuration information in the registry (path:
HKEY_LOCAL_MACHINE > SOFTWARE > huawei > USAU > convert). If the
automatic reconnection function is set for some of them, those connections will be auto
created upon restart according to the information saved in the registry and be configured in
accordance with the information saved after the previous successful connection creation.
Creating a Connection
Choose Operation > Create connection or click on the tool bar. The Create a new
connection dialog box is displayed as shown in Figure 1-20.
Serial port Number of serial port to It is used to choose the serial port number
be used used for the current connection.
BAM IP IP address of the BAM It is used to choose the IP address of the
Address Server to be connected wanted BAM Server. If the communication
gateway software runs on BAM, 127.0.0.1
may be used.
Client Client application type The class of the serial device, such as
Application Graphic User Interface (GUI), Alarm box
class and 112 test system.
Serial Port Serial port configuration It is used for setting the communication
Configuration information serial port.
By default, the values of Baud and Data bit
are 9600 and 8 respectively while Parity is
None and Stop bit is 1.
Compress Compressed It is used to specify whether the current
transmission information transmission is to be
compressed or not. It is not compressed by
default.
Auto Reconnect Reconnecting to server It indicates whether to auto create the
automatically previous connections after the
communication gateway software is
restarted.
Use modem dial Use modem and dial by If modem is required for the connection,
by hand hand choose Use modem dial by hand check
box; meanwhile specify the telephone
number under Modem configuration.
Click Create after the above steps and the system will create the conversion connection
according to the setting.
Any of the following abnormity will lead to the failure in a connection:
z The selected serial port does not exist.
z The configuration information of the serial port is not correct.
z The IP address of the BAM is wrong.
z The BAM is not started normally even if its IP address is correct.
z The selected serial port has been seized.
Ensure the hardware devices involved in the application of this tool are correctly installed and
configured.
Ensure the IP address of the BAM Server is correctly configured, since repeated connection
will be made without any check in case of an incorrect one.
The compress involves compressing and decompressing.
Ensure BAMs alarm console operates normally before the alarm box is used.
When a gateway application instance is running, startup of another one will result in the end
of the former one, namely, only one gateway instance is kept running.
Terminating a Connection
Choose Operation > Interrupt Connection to pop up a dialog box as shown in
Figure 1-21. Specify the proper serial port and click OK. The connection will be terminated.
2.1 Overview
As shown in Figure 2-1, the terminal maintenance system running on the USAU WS includes
SAU Operation and Maintenance Center (Client), SAU Alarm Management System
(Alarm WS), SAU Print Service, SAU Trace Viewer, and so on. This chapter describes how
to log on to SAU Operation and Maintenance Center (Client) and explains the interface
elements.
If the USAU signaling access sever program is installed on the SAU BAM, there will be two more items:
SAU Server and SAU AutoLogin Tool on the menu.
The USAU Client (hereafter referred to as the Client) is a friendly graphical interface that
facilitates maintenance besides supporting MML commands.
Only IP address can be modified, as a new office direction will be added if the office name is changed.
z The account of the system administrator is fixed as "Admin". The account of the common operator is
defined by the operator according to actual situations.
z When repeated login occurs at a WS, the system prompts " This BAM has already been login by
other maintenance system, Please select another BAM!", as only one user can use the same WS.
z If the user logs in the maintenance WS without setting any office data, the system pops up a dialog
box prompting the user to run the alarm panel to set the office data before logging in the system.
z If a password is input repeatedly wrongly for five times (default), you should not use this account to
log in to the system.
2.4.2 Logging in
The Operator Login dialog box pops up as shown in Figure 2-3 every time you log in the
client.
Input the appropriate values for Operator Name and Password. Choose the proper Office
Name if several offices exist. The Client will be entered after confirmation. In the case of
failure, please check if the IP address, user name or password is correct.
The operator names and passwords of ordinary operators are set by the system administrator.
The Operator name and Password are case-sensitive .
If the WS with USAU maintenance system is not in the same network segment as the BAM, choose
Start > Programs > SAU Operation and Maintenance Center > SAU Workstation Gateway Tool to
set the IP address of the gateway.
After successful login, the main interface of the Client pops up as shown in Figure 2-4, where
routine operations are available through menus and shortcut keys.
The shortcut keys on the MML Client are as listed in Table 2-1.
The functions of F1, F7, F8 and F9 are available only in the MML command input box.
Table 2-2 lists the meaning of the shortcut icons in the tool bar.
ExpiryDayofPa The expiry days of the password. Its value range is 1365 (the unit is
sswd day). The default value is 90.
ThresholdProm The threshold of prompting the expiry days of the password. Its value
ptDay range is 1365 (the unit is day). The default value is 10.
RepeatPassWd The repeatability of the password, that is, how many passwords that have
Num been used in the nearest past cannot be used again as the new one. Its
value range is 112 (the unit is times). The default value is 5.
AllowLoginFai The number of acceptable login failure. Its value range is 15 (the unit is
lTimes times). The default value is 5.
LockCC08Min The locked duration for the administrator account Admin. Its value range
utes is 160 (the unit is minute). The default value is 5.
The at least length of password. Its value range is 615,The default value
PassWdLength
is 6.
Choose System > Re-login on the USAU Client main interface or click on the tool bar
to log in again. Choose System > Logout to log out.
The user name of the system administrator is set during the installation of BAM terminal system. It is
Admin by default.
The user names of ordinary operators can be defined as per the requirements.
In the window, you can set the number of rows for maintenance, alarm, traffic statistics and
test output. You can also choose To printer to output the result to the printer. Click to
choose the file path and file name. The default path of the file is D:\SAU\Output.
z The default file name of maintenance output is MML-OUTPUT.txt.
z The default file name of alarm output is ALARM-OUTPUT.txt.
z The default file name of traffic statistics output is STATISTICS-OUTPUT.txt.
z The default file name of test output is DEBUG-OUTPUT.txt.
If you choose the file to be saved, the box behind the file name will be auto selected,
indicating that the report will be output to the specified file. When setting the file name, pay
attention that the name is not repeated, thus avoid overwriting the old record.
You can set the MML Command Time Out and Monitor Command Time Out in the
window as follows:
z MML Command Time Out
A MML command will be treated as a failure if it costs more time than being specified
by this value from submitting of this command to returning of the results. The variable
ranges from 20 to 600 and it is 80 seconds by default.
z Monitor Command Time Out
A binary command will be treated as a failure if it costs more time than being specified
by this value from submitting of this command to returning of the results. The variable
ranges from 10 to 100 and it is 20 seconds by default.
The binary commands are usually some commands for maintenance operations, for example, the GUI
operations or query of the CPU occupation rate. They are not the operations through the MML
commands.
required. We recommend you to use the default path. After confirmation, the Log
Commands menu under System changes to Stop Logging Commands.
Step 3 Input and run a batch of commands in the MML command input box. Choose System > Stop
Save Input Commands and then the batch of commands will be auto saved under the default
directory D:\SAU\Output. Meanwhile, the Stop Save Input Commands menu will change
to Save Input Commands. After that, you are free to read the batch file in text format under
the specified directory.
----End
Step 3 Choose the batch file to be executed and specify an execution mode.
z Immediate execution: The batch commands will be run immediately.
z Timely execution: The batch commands will be run at the specified time on the
specified date. When selecting this option, you must also specify the date and time when
the batch commands need to be run. Click Add to add a batch command file to be
executed.
You can specify multiple batch command files to be executed at different periods on different days, but
at one time point on one date, the system permits only one batch file to be executed.
Step 4 If a batch command file is specified to be executed at a particular time on a particular date, it
will be automatically and continuously executed at the very time. Meanwhile, System >
Execute Batch Commands will become disabled while System > Stop Execute Batch
Commands will become enabled. The execution can be stopped once this option is selected.
If a batch command file is specified to be executed immediately, confirmation will lead to an
Execute Batch Process Immediately window as shown in Figure 2-8.
Step 5 Click Browse to choose the batch command file to be executed. In order to easily view the
process of the execution, choose an appropriate execution type from the following items
under the Execution Type frame.
z Execute All: All command lines in the file are auto executed one after another.
z Execute Step by Step: The commands are executed one after another with manual
intervention.
z Execute with Break Point: The commands are auto executed until it comes to a
specified breakpoint. If the execution is expected to continue, click Go, and the
execution will continue until the next breakpoint. When this option is selected, you must
set break points in the expected command file by clicking Set Break Point. There will
be a visible red circle before the specified command line (see Figure 2-9). If a command
line already labelled as a breakpoint is selected, its breakpoint label will be removed by
clicking Set Break Point.
z Execute Range From Line: The commands falling within a range of rows/lines will be
executed. If this option is selected, it is required to define the range of command lines in
the text file.
Step 6 Click Go to run the batch commands and meanwhile both execution success and failure (with
quantity and location for failure) are displayed in the result display bar.
----End
> Command Window or click on the tool bar or press F4. The MML Client window
pops up as shown in Figure 2-10.
1) Result output area 2) Command input box 3) Assistant command input area
this area followed by pressing F9 or clicking ; you can also create a script command file
with the help of Notepad and then copy it to this area for execution.
Navigation Window
Navigation window contains the logical grouping of commands in a tree structure, which is
known as Navigation Tree. A set of related commands are grouped under a node; a set of
related nodes are grouped under a main node. The navigation tree consists of many such main
nodes, nodes and commands. When you expand and click a command in the Navigation tree,
the command is automatically entered into Command Input window (but not executed) and
the corresponding help information is displayed in the help window.
Help Window
The help information related to a command is displayed here. You can navigate between help
and result window by pressing CTRL+Tab keys or clicking on the required tab. The help
information of a particular can be obtained in three ways, as shown in Table 2-4.
Pressing F1 You can type a command in the Command Input window and
press F1 to see the related help.
Clicking on the If you know under which node (in the navigation tree) the
command in the command is listed, you can expand the nodes and sub-nodes and
Navigation tree click the command to view the help.
Searching You can search for help by typing the name of the command in the
Search window.
Search Window
It enables you to find the commands and related help information. By default the Search
window will be behind the Navigation window and thus will not be visible. To view the
Search window you should click Search tab (present below toolbar) in the MML Input Tool
window.
The shortcut icons used for command execution in the MML Client are as listed in Table 2-5.
Generates the input interface (It can also be done by pressing Enter after the
command is input.).
Run the command.
Selects the next command. Any of the 30 commands operated previously are
available.
Selects the previous command. Any of the 30 commands operated previously are
available.
The shortcut keys available in MML Input Tool are described in Table 2-6.
The F1, F7, F8 and F9 can function only when the cursor is in command line input window.
3 Security Management
3.1 Overview
Authority management in USAU Client falls into three classes, as follows:
z Operator management
z Workstation management
z Command group management
By using these applications, the authorized operator can perform operations or maintenance
on the equipment within a valid scope so that the equipment can run normally and stably.
The system administrators account is set during the installation of BAM maintenance system.
Operator Name A serial of char, it cannot be null and it cannot be the same as any
registered one. It is case-sensitive.
Start time and End Specify the time duration. The operators authority will only be
time valid in this duration, which is called Time Limit. The system
administrator and Guest have no Time Limit. For the ordinary
operators, if the two fields are not set, they will have no Time Limit.
Password The password is a string of 615 valid characters, It contains at least
six characters that are composed of letters (upper case together with
lower case) and numbers.
Operator Command The USAU system administrator is entitled to have the highest
Group authority (G_SYS authority command group) and to use any
command.
It is also possible to add an operator account by executing ADD OP in MML input window. After
adding the operator account, the SET OPCG and SET OPTM commands must be executed to set
operator command group and operation time limit.
----End
The accounts of the system administrator (Admin) and Guest cannot be deleted.
It is also available to delete an account by running RMV OP in the MML input window.
----End
--- END
----End
Only the system administrator has the right to delete a WS. After the deletion, the authorities formerly
attached to it will also be deleted.
BAM super WS cannot be deleted.
If the WS being deleted is being used, the current authority of the operator using this WS will be reduced
to the level of G_GUEST.
It is also possible to modify a WS by running RMV WS in the MML input window.
----End
Manual Locking
Choose System > Lock System on the main interface of USAU Client. The system will lock
the WS and display a prompt box for unlocking the WS, as shown in Figure 3-3.
Automatic Locking
The USAU maintenance system will be auto locked if no operation is performed on it for a
specified period of time.
Choose System > Auto Lock Setting and modify Lock Time to specify interval for auto
locking the WS, as shown in Figure 3-4.
Only system administrator has the right to perform various operations regarding authority management.
System administrator has the right to modify commands in any command group, while such operation
can only be performed through the super WS. If it is done on any other WS, a message will be displayed
indicating the WS does not have the adequate authority.
It is also possible to set a command group by running ADD CCG in the MML input window.
----End
z Device management
z Memory management
Step 2 Double-click the Device Management. The Device Management window is displayed as
shown in Figure 4-2.
Step 3 Double-click the shelf you want to view, and then a device panel is displayed as shown in
Figure 4-3.
The board in green indicates that the active board is normal; the board in blue indicates that
the standby one is normal; the board in red indicates abnormity.
The indicator of a pinch board or a backplane in green indicates normal; the indicator of a
pinch board or a backplane in red indicates abnormity.
The meanings of the icons in the window are as shown in Table 4-1.
----End
Displaying a Board
The procedure of displaying a board is as follow:
Step 1 On the device panel, right-click on the board to be viewed. A shortcut menu pops up as shown
in Figure 4-4.
Step 2 Choose the Display Board option, and then a window pops up, displaying the board
information such as board name, status, CPU usage, memory usage and so on.
----End
Resetting a Board
To reset a board is to send the hot startup command to the board processor through the BAM.
The processor will restart the board after receiving the command and initializing the board
program.
The resetting operation is to restore a board which is not normal due to some logical disorder
in the program running process. However, if the board is physically damaged, resetting will
be of little help.
The resetting procedures are as follows:
Step 1 On the device panel, right-click on the board to be reset. A shortcut menu pops up as shown in
Figure 4-4.
Step 2 Choose Reset Board. You are prompted to confirm board resetting.
Step 3 Click Yes.
Resetting should be performed with caution, as it may cause short-time effect on the service
subscribers on the board.
It is prohibited to reset a board frequently.
If a board is working normally, do not reset it.
----End
Swapping a Board
Board swapping refers to the operation of changing between the active board and the standby
board. After the board is swapped, the active becomes standby and the standby becomes
active.
The swapping procedures are as follows:
Step 1 On the device panel, right-click the board to be swapped. A shortcut menu pops up as shown
in Figure 4-4.
Step 2 Choose Swap Board to pop up a dialog box. You are prompted to confirm board resetting.
Step 3 Click OK.
In normal cases, do not swap a board. This operation should be performed with caution.
----End
Step 7 Choose the Module Number of the board whose memory usage you want to query.
Step 8 Click Add, the task is added to the memory usage query list.
The result of memory usage is as shown in Figure 4-7.
----End
Step 8 Choose the Frame Number and Slot Number of the board whose memory contents you want
to query.
Step 9 Enter Start Address and No of bytes (in hexadecimal) of the memory you want to query.
Step 10 Click Query, the information of the memory is listed as shown in Figure 4-11.
----End
Dump Memory
This feature enables you to save the board memory contents into a file. It can be used later for
analysis and debugging in the case of occurrence of a fault in the system. This function is
particularly useful when a fault occurs in the remote office. In such a scenario the
maintenance personnel can send the dumped memory to the technical support for debugging
and analysis.
The procedure of dumping memory is as follow:
Step 1 Double-click the Memory Dump as shown in Figure 4-1, a dialog box for dumping memory
pops up as shown in Figure 4-12.
The value of Start Address should be smaller than End Address; otherwise, the system will prompt
"Start Address should be less than End Address".
Step 4 In Main or Back Up, choose Main or Backup according to the module status.
Step 5 In File Location and Name, set the path and name of the dump file.
The default name of the dump file is Memory Dump-YY-MM-DD-mm-ss.DAT. Y means year, M means
month, D means date, m means minute, and s means second. They are all of two digits.
Step 6 Click Query, the memory data is dumped to the dump file. At the same time, the box below
displays the content of the dumped data. When the dumping is completed, the Dump
Finished dialog box pops up.
----End
5.1 Overview
Alarm management is a part of fault management, performing the following operations to
handle the abnormity of the device modules that are managed:
z Detection
z Isolation
z Correction
When a fault on the device side may affect the service provided for the subscriber, the device
modules generate an alarm, and the alarm management module of the BAM reports the alarm
information to the user, such as:
z Detection of transmission data errors
z Violation of a performance threshold
z Detection of faulty equipment
Based on the alarm reported from the BAM, the user can take proper actions to set right the
problem in the device. In this way, the alarm reporting provides the BAM with the ability to
monitor the device module failures in real time.
The alarm WS can be used for:
z Viewing the real-time Fault/Event alarms
z Browsing the Fault, Recovery, Event and History alarms
z Querying the alarms based on the query condition
z Deleting the history alarms
z Filtering alarm
z Shielding alarms
z Querying the additional parameters (detailed information) based on the alarm number
z Setting alarm configuration information
z Querying the statistics of alarms according to alarm box type and network management
type
z Setting and querying the screen level of the alarm box
z Setting the colours for alarms of different severity
Enter the Operator Name and Password. Choose the Office Name, and then click OK.
Every office in the alarm board has a corresponding alarm WS associated with it. You have to choose the
office and log in to the alarm station to view detailed alarm information in the BAM Server.
Step 2 Set the colours for each type of alarm based on your needs. Set the initial and maximum
display alarm amount and the system lock time (unit: minute). Choose the Display Cleared
alarms check box to display the recovery alarms.
Step 3 Click OK to save the settings.
z Click Restore default color value to revert back to the default colour settings.
z Click Default value to revert back to the default value settings.
----End
If the Display Cleared alarms check box is not selected in the System Setup dialog box, recovery
alarms will not be displayed in the Fault browse window.
The title of the Fault browse window displays the total number of recovery alarms and fault alarms of
each level.
Event Alarm
Choose Alarm Browse > Event Alarm to pop up the Event browse window as shown in
Figure 5-4.
History Alarm
Choose Alarm Browse > Historical Alarm to pop up the History alarm browse window as
shown in Figure 5-5.
Shortcut Menu
Shortcut menu enables you to execute many operations such as:
z Stopping scrolling
z Acknowledging the alarm
z Clearing all/part of recovery alarms
When you right-click a particular alarm in the following two windows, the shortcut menu
containing related operations on the alarms is displayed as shown in Figure 5-6:
The shortcut menu for event alarms is slightly different. When you right-click on a particular
alarm in the Event browse window, the shortcut menu pops up, as shown in Figure 5-7.
For the alarms indicating the destination signaling point (DSP) is not reachable, a link is faulty, or the
routing is faulty, the detailed information such as the DSP name, the link name, or the route name is
displayed; therefore, the information for locating the fault is clear. For example, as shown in Figure 5-8,
the explanation of a broadband link fault alarm is displayed, where, the Location info shows that the
corresponding link name is link-test. In this way, the detailed information is displayed to ease the alarm
locating.
Step 2 Click REMARK to add your remarks for the selected alarm.
Step 3 Type your remarks in the text box as shown in Figure 5-9 and click Save.
----End
Saving an Alarm
You can save the alarm information in a file for future reference in the following two file
formats:
z Text (.txt)
z Microsoft Excel (.xls)
The procedure of saving alarm information is as follows:
Step 1 Right-click a particular alarm to be saved to view the shortcut menu as shown in Figure 5-6.
Step 2 Choose Txt files or xls files from the Save as drop-down list box as you want to.
Step 3 The Save As dialog box pops up as shown in Figure 5-10.
Step 4 Choose the folder where you want to save the file and click Save.
----End
Filtering Alarm
Alarm filtering function can be used to make settings to view alarms based on specific
criteria.
Step 1 Choose Alarm Browse > Alarm Filter Browse to pop up the Alarm filter setting dialog
box, as shown in Figure 5-11.
Step 2 Choose the alarm type and alarm level. Set the module number and the network management
type.
Step 3 Click OK. The alarm filter browse window is displayed based on your settings.
----End
Step 2 Set the parameter on the dialog box according to Table 5-1.
Parameter Description
Alarm type Choose one from the four options: Fault, Recovery, Event and
History.
Alarm level Choose one or more alarm levels such as Critical, Major,
Minor, and Warning.
Time and date of start It specifies the time period for which the alarm information
and end will be queried. When you choose this check box, you must set
the Start and End time in the corresponding fields.
Module number Choose this check box and enter a valid value, if you want to
query the alarm information based on module number.
Alarm ID If you know the number of the alarm to be queried, choose this
check box and enter a valid value.
Parameter Description
Start Serial Number If you know the serial number of the alarm, choose this check
box and enter a proper value.
End Serial Number If you know the end serial number of the alarm, choose this
check box and enter a proper value.
Network management If you want to query the alarm information based on the
network management type, choose this check box and enter a
proper value.
Alarmbox alarm type If you want to specify the alarm type of the alarm box to be
queried, choose this check box and enter a proper value.
Step 3 Click OK to pop up the Alarm query result window, as shown in Figure 5-13.
----End
Step 2 Choose the Start date and End date, and then click OK to delete the alarms in the period.
----End
Shielding Alarms
When there are many alarms from the BAM and the alarms of some modules or some types
are not important, you can shield them. The procedure is as follows:
Step 1 Choose Alarm Management > Alarm Mask to pop up the Mask of Alarm dialog box, as
shown in Figure 5-15.
Step 2 To add an alarm mask, enter the shielding condition and then click Add. If the Alarm mask
query window exists, it will update the newly added alarm mask condition and add it to the
list.
Step 3 To unmask the alarms that are already masked, enter the unmask condition and click Delete.
If the Alarm mask query window exists, it will update the newly added alarm mask
condition and the selected alarm mask conditions will be deleted from the list.
Step 4 To query the alarm masked, enter the query condition and then click Query. The Alarm
mask query window is displayed as shown in Figure 5-16.
The purpose of alarm masking (or shielding) is different from that of alarm filtering. The purpose of
alarm masking is to send the mask command to the BAM directly so as to stop it from sending the
masked alarms to the alarm console. But the purpose of alarm filtering is only to filter some alarms to
prevent them from being displayed on the alarm window.
----End
Step 2 To query the alarm information of a specific alarm number, choose Alarm ID check box and
enter the alarm number.
Step 3 Click OK to pop up the query results as shown in Figure 5-18.
----End
Step 2 Enter the module number and choose one option in the Function operation according to
Table 5-2.
Options Description
Reset alarmbox Reset the alarm box. Its function is equivalent to manually
pressing Reset on the alarm box panel.
Stop alarm tone Stop the alarm tone produced by the buzzer of the alarm
box.
Darken alarmbox status light Turn off the alarm indicator on the alarm box. When you
choose this option you must also set Alarm type and
Position of darkening light.
----End
----End
Step 2 Set the Alarm level and click Apply to set the alarm screen level.
----End
Deleting Alarm
You can forcibly delete a fault alarm from the GUI through the operation.
The procedure is as follows:
Step 1 On the alarm window, right-click an alarm to be deleted to pop up a shortcut menu, as shown
in Figure 5-24.
The Delete Alarm option will only be available if at least one fault alarm is selected.
You can delete one or multiple fault alarms. If, however, you choose some recovery alarms as well as
some fault alarms, recovery alarms will not be deleted from the BAM Server.
The colour of the deleted alarms will be changed on the GUI, if you have set a different colour for
deletion of alarm. The alarm type will be changed from Fault to Cleared. If you want to delete this, click
Clear Part of Cleared Alarm on the shortcut menu or click Refresh to refresh the alarm information.
The change of the colour reflects in all windows that have this alarm.
----End
Acknowledging Alarm
You can acknowledge an alarm from the GUI through this operation.
The procedure is as follows:
Step 1 On the alarm window right-click on an alarm to be deleted to pop up a shortcut menu, as
shown in Figure 5-24.
Step 2 Choose Acknowledge Alarm.
----End
This option will only be available if there is at least one recovery alarm.
z Clearing selected recovery alarm
On the alarm window right-click on an alarm to be deleted to pop up a shortcut menu, as
shown in Figure 5-24. Choose Clear Part of Cleared Alarms.
This option will only be available if there is at least one recovery alarm.
You can also choose some recovery alarms and some fault alarms. In that case, fault alarms will not be
deleted from the alarm station.
Step 2 Choose the required Alarm type, Alarm level and Network management type and enter the
Module number.
Step 3 Click OK to save the settings.
----End
Real-time Printing
You can print the alarm information in real time according to the set filter conditions. Just
choose System > Real Time Print.
The real-time alarm report is not printed immediately. It will be printed only when there is sufficient
number of alarms filling a single page.
If you want to print the real-time alarm immediately, choose System > Flush Printer after the real-time
alarm has been generated.
Flush Printer
To print the alarms in the buffer, you must choose System > Flush Printer.