Ericsson Telephone LBI 39169 User Manual

LBI-39169  
User’s Guide  
EDACS NETWORK  
MANAGEMENT  
ericssonz  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TABLE OF CONTENTS  
Section/Paragraph  
Page  
1. PREFACE........................................................................................................................................................... 9  
1.1 MANUAL ORGANIZATION.................................................................................................................... 9  
2. DOCUMENTATION......................................................................................................................................... 11  
2.1 HEWLETT-PACKARD DOCUMENTATION.......................................................................................... 11  
2.2 RELATED ERICSSON PUBLICATIONS................................................................................................. 11  
3. INTRODUCTION.............................................................................................................................................. 13  
3.1 FAULT MANAGEMENT.......................................................................................................................... 14  
3.2 CONFIGURATION MANAGEMENT ...................................................................................................... 14  
3.3 ACCOUNTING MANAGEMENT............................................................................................................. 14  
3.4 PERFORMANCE MANAGEMENT ......................................................................................................... 15  
3.5 SECURITY MANAGEMENT ................................................................................................................... 15  
3.5.1 Access Levels ................................................................................................................................... 15  
3.5.2 System Access .................................................................................................................................. 16  
3.6 HIERARCHICAL MAPS ........................................................................................................................... 16  
3.7 EDACS NM MENUS AND THEIR FUNCTIONALITY.......................................................................... 17  
4. NETWORK MANAGER BASICS................................................................................................................... 18  
4.1 PULLDOWN MENU SELECTION PROCEDURE USING THE MOUSE.............................................. 18  
4.2 PULLDOWN MENU SELECTION PROCEDURE USING THE KEYBOARD ..................................... 18  
4.3 EDITOR OPTIONS.................................................................................................................................... 18  
4.4 MAP TRAVERSAL ................................................................................................................................... 19  
5. STARTUP PROCEDURES............................................................................................................................... 21  
5.1 STARTING A NETWORK MANAGER WORK SESSION..................................................................... 21  
5.2 ENDING A NETWORK MANAGER WORK SESSION ......................................................................... 22  
5.2.1 LOGGING OUT OF THE NETWORK MANAGER SESSION ..................................................... 22  
5.2.2 LOGGING OUT OF THE HP VUE SESSION................................................................................ 22  
6. RETRIEVING THE SOFTWARE VERSION................................................................................................ 23  
6.1 SUBCOMPONENT SOFTWARE VERSIONS ......................................................................................... 23  
6.2 NETWORK MANAGER SOFTWARE APPLICATION VERSIONS...................................................... 24  
7. EDACS HELP .................................................................................................................................................... 25  
7.1 TASK HELP............................................................................................................................................... 25  
7.2 FUNCTION HELP ..................................................................................................................................... 25  
8. MONITORING EDACS FAULT CONDITIONS........................................................................................... 26  
8.1 DETECTING AND ISOLATING FAULTS (ALARMS) .......................................................................... 26  
8.1.1 Notification through the Event Notification Interface....................................................................... 26  
8.1.2 Notification Through Icon Color ...................................................................................................... 26  
8.1.3 Fault Propagation.............................................................................................................................. 28  
8.2 REPORTING FAULTS (ALARMS).......................................................................................................... 28  
8.2.1 Fault Configuration........................................................................................................................... 28  
8.2.2 Latching Transient Events ................................................................................................................ 29  
8.2.3 Associating Actions With Events...................................................................................................... 29  
8.2.4 Disabling Events at Remote Agent Devices...................................................................................... 29  
8.2.5 UnManaging Devices........................................................................................................................ 30  
8.2.6 Managing Devices ............................................................................................................................ 30  
8.2.7 Fault Updating Managed Devices..................................................................................................... 30  
8.2.8 Setting-up Threshold Oriented Events at RTM Devices................................................................... 30  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TABLE OF CONTENTS  
Section/Paragraph  
Page  
8.3 IDENTIFYING THE CAUSE OF ALARMS.............................................................................................31  
8.3.1 Using Hierarchical Maps...................................................................................................................31  
8.3.2 Using The OpenView Event Browser ...............................................................................................32  
9. CONFIGURING EDACS DEVICES................................................................................................................36  
9.1 INTEGRATED CEC/IMC MANAGER .....................................................................................................36  
9.1.1 Starting The CEC/IMC Session ........................................................................................................37  
9.1.2 Sample CEC/IMC Manager Screens.................................................................................................38  
9.2 TELNET SESSIONS TO THE PI, BCU, CAL, AND EDG.......................................................................39  
9.3 TELNETING TO THE SYSTEM MANAGER..........................................................................................39  
9.4 USER ACTION LOGGING .......................................................................................................................41  
10. TRANSFERRING DEVICE FILES ...............................................................................................................42  
11. MONITORING PERFORMANCE TRENDS...............................................................................................46  
11.1 USING TWO-DIMENSIONAL LINE GRAPHS.....................................................................................46  
11.1.1 Line Graph Example .......................................................................................................................47  
11.1.2 Customizing Line Graphs................................................................................................................47  
11.2 TRACKING EDACS DEVICE UTILIZATION.......................................................................................49  
11.3 TRACKING EDACS DEVICE ACCESSIBILITY ..................................................................................50  
11.4 COMPARING PERFORMANCE FROM MULTIPLE SITES OR NODES............................................51  
12. MONITORING REAL-TIME CALL ACTIVITY........................................................................................52  
12.1 USING THE MULTISITE MONITOR APPLICATION .........................................................................53  
12.1.1 Filtering Call Traffic .......................................................................................................................54  
12.1.2 Viewing Call Type Colors...............................................................................................................56  
12.1.3 Displaying Site Statistics Rows.......................................................................................................56  
12.1.4 Indicating Quiet Drops....................................................................................................................56  
12.2 USING THE SITE MONITOR APPLICATION......................................................................................57  
12.2.1 Turning On Statistics Rows.............................................................................................................58  
12.2.2 Adding The Phone Digits Column ..................................................................................................58  
12.2.3 Setting The Time Fields..................................................................................................................58  
12.2.4 Enabling Quiet Drops......................................................................................................................58  
12.2.5 Changing Phone Call Keying Update Parameters...........................................................................58  
13. USING OPENVIEW NETWORK NODE MANAGER................................................................................59  
13.1 LOADING/UNLOADING MIBS.............................................................................................................59  
13.2 VIEWING/GRAPHING PERFORMANCE PARAMETERS ..................................................................59  
13.3 ADDING CUSTOM MENU ITEMS........................................................................................................59  
13.4 COLLECTING AND GRAPHING PERFORMANCE DATA.................................................................59  
13.5 THRESHOLD TRAPS ON COLLECTED DATA...................................................................................60  
13.6 VIEWING HISTORICAL TRENDS ........................................................................................................60  
13.7 EVENT HISTORY ...................................................................................................................................60  
13.8 CUSTOMIZING EVENT MESSAGES AND ACTIONS........................................................................60  
13.9 BACKGROUND GEOGRAPHICAL MAPS ...........................................................................................61  
13.10 MAP SNAPSHOTS ................................................................................................................................61  
13.11 MULTIPLE EDACS NETWORK MANAGER SESSIONS..................................................................62  
13.12 INTEGRATION WITH OTHER NETWORK MANAGER APPLICATIONS.....................................62  
13.13 CUSTOMIZING ICONS ........................................................................................................................63  
13.13.1 Icon Labels....................................................................................................................................63  
13.13.2 Object Descriptions.......................................................................................................................63  
13.13.3 Icon Bitmaps .................................................................................................................................63  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TABLE OF CONTENTS  
Section/Paragraph  
Page  
13.14 LOADING MIBS.................................................................................................................................... 63  
14. PROCEDURES ................................................................................................................................................ 64  
14.1 REBOOTING THE NETWORK MANAGER......................................................................................... 64  
14.2 SYSTEM SHUTDOWN PROCEDURES ................................................................................................ 64  
14.3 DEVICE POLLING INTERVAL............................................................................................................. 64  
14.3.1 Polling Interval Setup ..................................................................................................................... 65  
14.3.2 Clock Synchronization.................................................................................................................... 65  
14.3.3 Clock Polling Interval..................................................................................................................... 65  
14.4 MODIFYING EVENT DESCRIPTIONS................................................................................................. 65  
14.5 ADDING SYMBOLS TO EDACS MAPS............................................................................................... 66  
14.6 DELETING SYMBOLS........................................................................................................................... 66  
14.7 ADDING A CONNECTION.................................................................................................................... 66  
14.8 CUSTOMIZING MSM/SM SITE/DEVICE LABELS............................................................................. 67  
14.9 ADDING DESCRIPTIONS TO OBJECTS.............................................................................................. 68  
14.10 DELETING ORPHANED SUBMAPS................................................................................................... 68  
14.11 VERIFYING AN OBJECT WAS DELETED FROM THE OPENVIEW DATABASE ....................... 68  
14.12 VIEWING/MODIFYING EDACS IDENTIFIERS................................................................................ 69  
14.13 VIEWING/MODIFYING TRAP SEVERITY LEVELS........................................................................ 69  
14.14 MODIFYING EVENT DESCRIPTIONS............................................................................................... 69  
14.15 RESTORING DEFAULT EVENT DESCRIPTIONS............................................................................ 70  
14.16 MAPPING SEVERITY LEVEL TO ICON COLOR ............................................................................. 70  
14.17 CREATING A FULL SYSTEM IMAGE BACKUP.............................................................................. 70  
14.18 RESTORING A FULL SYSTEM IMAGE FROM THE BACKUP....................................................... 71  
15. TROUBLESHOOTING................................................................................................................................... 72  
15.1 CD-ROM DOES NOT WORK................................................................................................................. 72  
15.2 MSM/SM DOES NOT SHOW PI TRAFFIC ........................................................................................... 72  
15.3 ATTEMPT TO LOG IN FAILS ............................................................................................................... 72  
15.4 EDACS ICON IS BLUE........................................................................................................................... 73  
15.5 EDACS ICON IS BROWN ...................................................................................................................... 73  
15.6 RPC FAILURES....................................................................................................................................... 73  
15.7 MAP GENERATION VERIFY OPERATION IS NOT WORKING PROPERLY ................................. 73  
15.8 POPUP STATES NO NODE LICENSE .................................................................................................. 74  
15.9 PERFORMANCE NOT SHOWING TRAFFIC....................................................................................... 74  
15.10 POOR SYSTEM PERFORMANCE....................................................................................................... 74  
15.11 APPLICATION DOES NOT RESPOND TO VERIFICATION REQUEST WHEN ADDING ICON. 75  
15.12 IFOR/LS CONFUSED............................................................................................................................ 75  
15.13 SYSTEM MANAGER SNMP “SETS” FAILING ................................................................................. 75  
15.14 IMC DETECTED LINK FAILURES..................................................................................................... 76  
15.15 MSM/SM OUT OF COLOR MAP ENTRIES........................................................................................ 76  
15.16 POPUP WARNING................................................................................................................................ 77  
15.17 MULTINODE TRAFFIC NOT SEEN CORRECTLY ON MSM SESSIONS....................................... 77  
16. GLOSSARY...................................................................................................................................................... 78  
17. INDEX............................................................................................................................................................... 88  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
LIST OF FIGURES AND TABLES  
Figure  
Title  
Page  
Figure 1 - EDACS Menu on Main Menu Bar...........................................................................................................17  
Figure 2 - Example of Map Traversal.......................................................................................................................19  
Figure 3 - Example of Exploding a Switching Center and Site Icon ........................................................................20  
Figure 4 - Network Manager Login Dialog Box.......................................................................................................21  
Figure 5 - Network Manager Login Dialog Box.......................................................................................................21  
Figure 6 - Software Version Screen Example...........................................................................................................23  
Figure 7 - EDACS Help Menu .................................................................................................................................25  
Figure 8 - Event Category Window..........................................................................................................................26  
Figure 9 - Event Configuration.................................................................................................................................29  
Figure 10 - Using Hierarchical Maps to Identify Fault Events.................................................................................31  
Figure 11 - EDACS Fault Menu...............................................................................................................................32  
Figure 12 - EDACS Event Browser Example...........................................................................................................33  
Figure 13 - Event Description ..................................................................................................................................34  
Figure 14 - CEC/IMC Client-Server Paradigm ........................................................................................................36  
Figure 15 - EDACS Configuration Menu.................................................................................................................36  
Figure 16 - CEC/IMC Manager Main Window and Menu Bar ................................................................................37  
Figure 17 - CEC/IMC Manager Login .....................................................................................................................37  
Figure 18 - System Options for Digital Console Pre-empt Example Screen ............................................................38  
Figure 19 - Site Channel Configuration Example Screen.........................................................................................38  
Figure 20 - Console User Profile Configuration Example Screen............................................................................39  
Figure 21 - System Manager Login Screen ..............................................................................................................40  
Figure 22 - System Manager User Menu..................................................................................................................40  
Figure 23 - Transferring PI Activity Data Using FTP ..............................................................................................43  
Figure 24 - Transferring a BCU Billing Record Using FTP.....................................................................................44  
Figure 25 - Transferring System Manager Activity Data Using FTP .......................................................................45  
Figure 26 - Example of a 2-Dimensional Line Graph...............................................................................................47  
Figure 27 - EDACS Performance -> Utilization Menu ............................................................................................49  
Figure 28 - EDACS Performance / Accessibility Menu ...........................................................................................50  
Figure 29 - EDACS Performance -> Compare Menu...............................................................................................51  
Figure 30 - EDACS Performance -> Monitor Menu ................................................................................................52  
Figure 31 - Multisite Monitor Display Example.......................................................................................................53  
Figure 32 - Multisite Monitor Menu Bar..................................................................................................................54  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
LIST OF FIGURES AND TABLES  
Figure  
Title  
Page  
Figure 33 - Traffic Filter Window............................................................................................................................55  
Figure 34 - Multisite Monitor Legend......................................................................................................................56  
Figure 35 - Site Monitor Display Example ..............................................................................................................57  
Figure 36 - Site Monitor Menu Bar..........................................................................................................................58  
Figure 37 - Modify Event Screen.............................................................................................................................60  
Table 1 - Status Colors/Levels .................................................................................................................................27  
Table 2 - Event Naming Convention Prefix .............................................................................................................33  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
This page intentionally left blank  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
PREFACE  
LBI-39169  
1. PREFACE  
This is one of four manuals for the EDACS Network Manager. This manual provides operating instructions for users  
and administrators of the Network Manager system.  
Additional documentation for the Network Manager is available in the following publications:  
EDACS Network Management System Manual (LBI-39215):  
This manual provides a system level overview of EDACS Network Management.  
EDACS Network Management Enterprise Management Information Base (MIB) Reference Manual (LBI-39170):  
This manual contains the EDACS common MIBs and defines each item identified within the MIB groups.  
EDACS Network Management Installation Manual (LBI-39171):  
This manual contains detailed information for installing, configuring, and customizing the Network Manager  
application and the EDACS SNMP Agent platforms.  
1.1 MANUAL ORGANIZATION  
The manual is divided into the following sections:  
Section 1  
Preface - The preface section identifies the other manuals in the Network Manager manual set  
and introduces the reader to the organization of this manual.  
Section 2  
Documentation - This section provides a list of Ericsson documents for the associated EDACS  
elements which might interface with the Network Manager. It also provides a list of manual and  
documents which may be obtained (or are provided) by vendors and outside sources.  
Section 3  
Section 4  
Section 5  
Section 6  
Introduction - This section provides an overview of the Network Manager, listing its functions  
and features.  
Network Manager Basics - This section describes some of the basic processes the operator will  
use when running the Network Manager application.  
Startup Procedures - This section provides step by step procedures for starting and stopping the  
Network Manager application.  
Retrieving Software Version - This section provides instructions for obtaining the current  
revision levels of software running on the Network Manager platform and associated devices.  
Section 7  
Section 8  
EDACS Help - This section provides information on using the EDACS Help function.  
Monitoring EDACS Fault Conditions - This section provides instructions for using the  
Network Manager to detect, isolate, and report alarm or fault conditions associated with the  
various Network Elements.  
Section 9  
Configuring EDACS Devices - This section provides instruction for running and configuring  
devices directly connected to the Network Manager, such as CEC/IMC Manager for Windows  
NT and the System Manager.  
Section 10  
Section 11  
Transferring Device Files - This section information for using the Accounting: File Transfer  
option, and provides examples on its use.  
Monitoring Performance Trends - This section provides instructions for invoking two-  
dimensional line graphs, the MultiSite Monitor, and the Site Monitor. This allow the user to  
evaluate the network’s past and present performance and to identify any adverse trends or areas  
requiring optimization.  
Section 12  
Monitoring Real-Time Call Activity - This section provides instructions for using the MultiSite  
Monitor and Site Monitor to monitor real-time call activity. The monitors are customizable to  
meet the user’s needs.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
PREFACE  
Section 13  
Section 14  
Section 15  
Using OpenView Network Node Manager - This section provides supplemental information on  
using some of the features available through HP OpenView Network Node Manager.  
Procedures - This section provides procedures for customizing, configuring, and maintaining the  
Network Manager application.  
Troubleshooting - This section presents a list of problems which may be encountered and  
possible corrective action.  
Section 16  
Section 17  
Glossary - Contains a glossary of terms.  
Index - This section provides a quick reference to key functions throughout the manual.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DOCUMENTATION  
LBI-39169  
2. DOCUMENTATION  
In may be necessary to consult one or more of the following documents when operating the Network Management  
system.  
2.1 HEWLETT-PACKARD DOCUMENTATION  
The following Hewlett-Packard (HP) manuals provide additional information on the HP products used with the Network  
Manager:  
HP 9000 Series Owner’s Guide  
B1171-90079 HP Visual User Environment User’s Guide  
J2316-90001  
J2316-90000  
J2310-90002  
J2311-90001  
J2311-90004  
HP OpenView Network Node Manager User’s Guide  
HP OpenView Windows User’s Guide  
HP OpenView Windows Application Design and Style Guide  
HP OpenView SNMP Programmer’s Guide and Reference  
HP OpenView SNMP Management Platform Performance and Configuration Guide with HP  
Network Node Manager Examples for Release 3.3  
J2319-90002  
J2319-90009  
HP OpenView Programmer’s Guide  
HP OpenView Programmer’s Reference  
B2355-90037 HP Remote Access Manual  
2.2 RELATED ERICSSON PUBLICATIONS  
The following Ericsson publications provide additional information on EDACS elements which interface directly or  
indirectly with Network Management System:  
Console Electronics Controller (CEC) and Integrated MultiSite and Console Controller (IMC)  
Documentation:  
LBI-38662  
-
EDACS Console Electronics Controller (CEC) and Integrated MultiSite and Console Controller (IMC)  
Digital Audio Switch  
LBI-38939  
LBI-39031  
LBI-39041  
LBI-39062  
LBI-39100  
LBI-39124  
LBI-39224  
-
-
-
-
-
-
-
CEC/IMC Customer-Specific System Documentation Overview  
EDACS StarGate Controller Digital Audio Switch Maintenance Manual  
EDACS CEC/IMC Digital Dispatch DVIU Equipment Maintenance Manual  
EDACS C3 Maestro Console System Maintenance Manual  
EDACS C3 Maestro Console System with Enhanced Audio Enclosure  
EDACS CEC Manager operations Guide, V4.0l  
CEC/IMC Manager for Windows NT  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
DOCUMENTATION  
System Manager Documentation:  
LBI-38703  
-
EDACS VAX/VMS System Manager Installation, Setup, and Troubleshooting Technical Reference  
Manual  
LBI-38984  
-
EDACS VAX/VMS System Manager User’s Guide  
AE/LZT 123 1908/1 - Keyboard Mapping Template.  
Billing Correlation Unit (BCU) and Centralized Activity Logger (CAL) Documentation:  
LBI-38965  
LBI-38967  
-
-
EDACS BCU/CAL System and Installation Manual  
EDACS Billing Correlation Unit/Centralized Activity Logger (BCU/CAL) User Interface Manual  
Data Gateway Documentation:  
LBI-38961  
LBI-38962  
LBI-38963  
LBI-38964  
-
-
-
-
EDACS Data Gateway Technical Description  
EDACS Data Gateway Installation and Maintenance Manual  
EDACS Data Gateway User’s Reference Manual  
EDACS Data Gateway Configuration Reference Manual  
Jessica PBX Gateway Documentation:  
LBI-39000  
LBI-39001  
LBI-39039  
LBI-39040  
LBI-39080  
-
-
-
-
-
EDACS Jessica PBX Gateway Systems Manual  
EDACS Jessica PBX Gateway Operator’s Manual  
EDACS Jessica PBX Gateway MD110 Configuration Manual  
EDACS Jessica PBX Gateway PI User’s Manual  
EDACS Jessica PBX Gateway Operator’s Manual (Pocket Guide)  
Miscellaneous Ericsson Documents:  
ECR-1895  
-
Glossary of Mobile Radio Terms including Acronyms and Abbreviations.  
Protocol Standards:  
rfc-1213  
-
Management Information Base for Network Management of TCP/IP-Based internets: MIB-II.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INTRODUCTION  
LBI-39169  
3. INTRODUCTION  
The International Organization for Standards (ISO) Network Management forum identifies five functional areas of  
network management, often referred to simply as “FCAPS.” This model serves as the basis for the Network Management  
system. The five management areas are as follows:  
Fault Management  
Configuration Management  
Accounting Management  
Performance Management  
Security Management  
In addition to the functional areas listed above, the EDACS Network Manager also provides the following:  
Using an integrated client on the EDACS Network Manager platform, administrators  
can view the same data, using the same windows that are available to technicians who  
configure and debug locally. In this mode, the CEC/IMC Manager acts as the server,  
while the application on the EDACS Network Manager participates as a client. The  
EDACS Network Manager and CEC/IMC Manager platforms provide a client-server  
applications that have a common look and feel.  
Integrated CEC/IMC  
Manager  
The customer is responsible for maintaining the configuration of the other Network  
Management applications. The EDACS Network Element icons may exist on the same  
map as the customer’s OpenView T1/Microwave/PBX network icons to form an  
integrated network management map.  
Integration with Other  
OpenView Network  
Management  
Applications  
The EDACS Network Manager application is available on a variety of HP  
workstations/servers so that large and small networks can be supported cost  
effectively.  
Scaleable Network  
Manager Platform  
The EDACS Network Manager allows multiple simultaneous users to be logged in and  
viewing network information via X-sessions, either from X Stations or PCs running X-  
terminal emulation.  
Multiple EDACS  
Network Manager  
Sessions  
The EDACS Network Manager Application uses the UNIX Native Language Support  
(NLS). This feature supports other languages without recompiling the application.  
Currently, English is the only language supported.  
Internationalization  
A report can be generated listing the past and present alarms.  
On-line help for the EDACS Network Manager application.  
Alarm Log/Reports  
Basic Help Menu  
This feature supports other languages without recompiling the application. Currently,  
English is the only language supported.  
Internationalization  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
INTRODUCTION  
3.1 FAULT MANAGEMENT  
Fault Management is responsible for detecting, isolating, and reporting anomalous conditions affecting network  
operation. Central to the concept of a fault is the fact that some corrective action must be taken, whether automatically over a  
Local Area Network (LAN) or by manual intervention by technicians at a site.  
The following features are available through Fault Management:  
EDACS platforms send all alarm and status event information to a central point. The  
Network Manager can periodically poll remote devices for missed events. Events are  
logged at the EDACS Network Manager and displayed on the Hierarchical map.  
Popup messages or automatic notification actions, such as email, are customizable.  
Fault Notification  
Each Network Management Station is provided a consistent, integrated view of the  
alarm status of its entire EDACS network. Alarms are propagated from lower network  
layers all the way up to the top-level map.  
Hierarchical Network  
Map for Fault  
Notification  
On-line help is provided describing the fault and, where possible, suggesting the  
corrective action. In addition, to the EDACS-provided alarm information, site-specific  
alarm help/corrective action suggestions are customizable.  
Alarm Help  
A report can be generated listing the past and present alarms.  
Alarm Log/Reports  
3.2 CONFIGURATION MANAGEMENT  
Configuration Management is responsible for identifying and controlling the state of elements within the network,  
including subscriber access to the services provided by the network. This management area performs the following:  
Using a local client Graphical User Interface to configure a device.  
Using a Telnet session to configure devices in their native format.  
Reboot, Restart, or Shutdown certain EDACS devices.  
Configuration control of the CEC/IMC is through the CEC/IMC Manager for Windows NT. The CEC/IMC Manager for  
Windows NT employs the client-server paradigm. The server, which interfaces to the CEC/IMC, runs on the Windows NT  
platform while the client may run on either the Windows NT platform or the EDACS Network Manager UNIX platform.  
This allows the CEC/IMC Manager user interface to be run either on the EDACS Network Manager or on the CEC/IMC  
Manager PC.  
Configuration Management of other devices is via native access i.e., Telnet session into the System Manager, BCU/CAL,  
and PI. Each device retains its password protection, therefore users must have login privileges. The ability to log in to  
multiple platforms and operate in their native modes from one terminal provides a migration path for devices converting to the  
client-server paradigm.  
Remote ability to perform shutdown, restart, and reboot operations to selected EDACS devices is provided. The  
execution of these actions is recorded in the same log used for alarms.  
3.3 ACCOUNTING MANAGEMENT  
Accounting Management is responsible for capturing the usage of network resources by end users.  
Billing subsystems are available on the BCU (stand-alone), BCU option on the PI platform, and Enhanced Local  
Interconnect (ELI). Only the BCU and PI are accessible from the EDACS Network Manager (via File Transfer Protocol) to  
retrieve billing records.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INTRODUCTION  
3.4 PERFORMANCE MANAGEMENT  
LBI-39169  
Performance Management is responsible for characterizing the usage and efficiency of the network. This area is  
conceptually composed of three major areas:  
-- Provides information regarding which aspects of, and the degree to which, the network interfaces are  
Utilization  
being used.  
-- Provides information which may be used in determining that the network services are meeting  
Accessibility  
customer expectations.  
-- Provides information which may be used to evaluate adjustments to the network to increase utilization and  
accessibility.  
Tuning  
EDACS devices provide various performance values via SNMP Management Information Bases (MIBs). The EDACS  
NM requests and receives these values for display and/or collection. The performance values required, and the network  
element(s) responsible for providing them, are given in the following subsections on a per map object basis.  
Graphs to address Utilization and Accessibility may be invoked via menu items. See Section 0. Other parameters may  
be useful when troubleshooting.  
EDACS Network Administrators can monitor system performance at node and site  
levels. Results may be saved to disk and later displayed. Performance graphs may  
also be saved. Performance graphs are available with the Billing Correlation  
Unit/Centralized Activity Logger (BCU/CAL) or as a separate Jessica Private Branch  
Exchange Interface (PI) option.  
Graphical Performance  
Monitoring  
The Multisite Monitor oversees call activity for an entire node. It is available with  
BCU/CAL or as a separate PI option.  
Multisite Monitor  
Site Monitor  
The Site Monitor oversees call activity for an individual site. It is available with  
BCU/CAL or as a separate PI option.  
3.5 SECURITY MANAGEMENT  
The Network Manager provides security of both user and system access. There are three levels of users authorized to use  
the Network Manager system. These are classified as Administrator (or SuperUser), Technician, and User.  
System Access is controlled by assigning user account passwords, assigning unique community names to devices, and  
through the profile configuration of remote elements.  
3.5.1 Access Levels  
The classifications of Network Management users are:  
- The Administrator has a full menu set and write access to OpenView, thus complete control over  
Administrator  
the Network Management system. This allows the administrator to retrieve, view, and change Network Management  
system attributes. However, only one write copy of OpenView may be operating at any one time. All other  
simultaneous sessions will be read only.  
- The Technician has a full menu set and read only access to OpenView. This allows the Technican to  
retrieve and view network data, but restricts the Technician from making unauthorized changes to the Network  
Management system attributes.  
Technician  
- The User has a reduced menu set and read only access to OpenView. This limits the users access to critical  
EDACS functions and editing features in OpenView.  
User  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
INTRODUCTION  
3.5.2 System Access  
Security Management is responsible for administering user access to network resources, including the Network Elements  
(NEs) themselves. The approach will encompass:  
Password Protection: Native Access Mode -- Native access refers to currently existing security measures, such as  
account-password validation. This mode applies to local (i.e., user console) and remote (i.e., Telnet and File  
Transfer Protocol) access procedures implemented by Network Elements.  
SNMPv1 protocol protection: SNMP provides some inherent security mechanisms. This will mainly serve as  
protection against data corruption due to application errors.  
To enhance SNMPv1 security, the directly connected NE supports a community name profile which allows  
restriction of IP Addresses to specific community names with specific read-write access.  
3.6 HIERARCHICAL MAPS  
The Network Management graphically illustrates an EDACS network by using a set of hierarchical map levels. By  
traversing down the maps, a greater level of detail is revealed.  
Four network levels are suggested:  
EDACS  
Multi-Node  
Node  
Site  
All submaps are created such that the icons may be moved freely about the map, there are no restrictions regarding  
placement of EDACS icons on maps. Thus, all icons could be on one submap if desired. For customers without all the  
network levels listed above, the EDACS icon will explode into the first available level. The EDACS, Node, and Site icons  
are explodable icons, meaning that double-clicking on them will bring up the next lower level. See the examples of the Map  
Traversal Screens shown in Figures 2 and 3.  
The EDACS Map Generation Application assists in setting up EDACS maps and is described in the Installation manual,  
LBI-39171.  
A new term “Switching Center” is being introduced with the Network Manager. To represent 30 consoles, 32 sites,  
BCU/CAL, CEC/IMC Manager, System Manager, EDG, and PI on one map would make the map very busy. Therefore, the  
term “Switching Center” was coined to represent the devices physically located at the IMC Node. This includes the IMC,  
consoles, BCU/CAL, EDG, PI, CEC/IMC Manager, and System Manager. As an analogy to this, the Site represents the  
devices physically located at the site such as channels, TU, ACU, SC, PMU, and ELI.  
All EDACS “symbols” will require identifiers to uniquely identify them. These identifiers are specified in the “EDACS  
Identifiers” attribute section of the Describe/Modify popup window.  
The following is a summary of map features:  
When the following symbols are added, popup windows prompt for information to  
generate the map hierarchy: IMC Node, CEC Node, Remote CEC Node, Switching  
Center, and Site.  
Assisted Map  
Generation  
As the EDACS NM application leverages HP OpenView Network Node Manager,  
EDACS icons can be positioned anywhere on the submap. Although Map Generation  
places icons on default submaps, the customer may create his own hierarchical view.  
Icons for non-EDACS devices may be placed on EDACS maps.  
Customized Maps  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INTRODUCTION  
LBI-39169  
Background Network  
Map Overlays  
This standard HP OpenView Network Node Manager feature allows customers to  
flexibly place network icons on top of actual area maps. Topological maps (in  
standard GIF format) are easily added, but are not provided.  
Customizable Icons  
The labels on icons may be modified. The user may add text to an icon’s object for  
customer-specific information such as the site contact, location, etc.  
3.7 EDACS NM MENUS AND THEIR FUNCTIONALITY  
There is a common set of pull-down menu options available to icons. Menu options are grayed out for functions that are  
not applicable for a specific icon. The EDACS Network Manager’s EDACS-specific functionality can only be activated by:  
1) Selecting an icon that represents an EDACS manageable element, and  
2) Activating the EDACS menu located on the Main Menu bar at the top of the screen.  
If an icon is not selected, the EDACS menu option may be grayed out, meaning that it is inaccessible. Figure 1 shows the  
initial set of submenus which include Faults, Configuration, Accounting File Transfer, Performance, and Software Version.  
Refer to the following text for additional details on each EDACS menu option.  
Faults. Provides alarm information about  
the EDACS device represented by the icon.  
Help  
EDACS  
File...  
Faults  
Accounting: File Transfer. Allows  
device-specific accounting records or  
configuration files to be transferred  
to the EDACS Network Manager  
using File Transfer Protocol (FTP).  
Configuration. Presents  
configuration functions  
associated with the EDACS  
device represented by the icon.  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
Software Version. Displays the  
software version information for  
each directly connected device  
and its subcomponents.  
Performance. Presents performance  
information about the EDACS  
device represented by the icon.  
Figure 1 - EDACS Menu on Main Menu Bar  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
NETWORK MANAGER BASICS  
4. NETWORK MANAGER BASICS  
4.1 PULLDOWN MENU SELECTION PROCEDURE USING THE MOUSE  
Select one of the two options below to select the Pulldown Menu:  
Position the cursor to the desired menu option, and quickly press/release the left mouse button once. The pulldown  
menu will fix itself to the screen. Position the cursor to the next desired option, and press/release the left mouse  
button once.  
OR  
Position the cursor to the desired menu option, press (but do not release) the left mouse button. Drag the cursor to  
the next desired option and release the left mouse button.  
4.2 PULLDOWN MENU SELECTION PROCEDURE USING THE KEYBOARD  
Each menu option contains a mnemonic (one-letter hot key) that is shown visually with an underline. To select an option  
on the main menu bar, press the ALT key and the mnemonic simultaneously. A pulldown menu will appear. Press the  
mnemonic of the next desired option to select it.  
4.3 EDITOR OPTIONS  
vuepad editor - HP VUE editor, menu-driven, simple, intuitive  
> /usr/vue/bin/vuepad filename  
NOTE: Also available via an icon on the VUE menu pad. Automatically invoked via the File Manager utility  
when the user chooses to edit a file.  
NOTE: To edit a file, the file must have write privileges for your user type. See the Unix man pages for the  
chmod / chown commands to reset file permissions and ownership.  
vi editor - standard Unix editor, command-driven  
> vi filename  
NOTE: Recommend book by O'Reilly & Associates, Inc. entitled Learning the vi Editor  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
NETWORK MANAGER BASICS  
LBI-39169  
4.4 MAP TRAVERSAL  
The following submaps are examples of map traversal. The first two submaps contain background graphics, while the  
last two do not. Background graphics may be loaded in all submaps.  
Exploding the EDACS  
icon brings up a screen similar to that shown below.  
Exploding the IMC Node 37 icon brings up the IMC Node 37 submap screen similar to the one shown above.  
Figure 2 - Example of Map Traversal  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
NETWORK MANAGER BASICS  
Exploding the Switching Center icon (SW Ctr #37) on the IMC Node 37 submap brings up a Switch Center 37 submap  
similar to the screen shown below.  
Exploding a Site icon (such as Site 1) on the IMC Node 37 submap brings up the Site 1 submap similar to the screen  
shown below.  
Figure 3 - Example of Exploding a Switching Center and Site Icon  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STARTUP PROCEDURES  
LBI-39169  
5. STARTUP PROCEDURES  
Use the following procedures to login and start a Network Manager work session. A Network Manager work session is  
described as the time between logging in and logging out.  
5.1 STARTING A NETWORK MANAGER WORK SESSION  
The Ericsson Login Screen is the gateway to the Network Management System. After entering your login name and  
password, the session will start by displaying HP VUE (Visual User Environment) screen containing the HP VUE Front  
Panel.  
Login into the Network Management system by using the following procedures:  
1. Select the Login box and enter your login name.  
Press the <ENTER> button or use the mouse and  
place the cursor in the Password box.  
2. Type in your password. Press the <ENTER>  
button or click on OK.  
If the Login Manager does not recognize your  
name or password, click on CLEAR and reenter  
the information.  
3. Successfully logging into the HP OpenView  
session will result in displaying the HP VUE  
Front Panel.  
Figure 4 - Network Manager Login Dialog Box  
EDACS Icon  
Figure 5 - Network Manager Login Dialog Box  
4. Start the Network Manager application by clicking on the EDACS icon. The terminal will display a READ version  
Network Management Home submap.  
Additionally, a popup message will be displayed indicating the Polling Status and the Clock Synchronization Source.  
5. You are now able of retrieve and view those Network Management attributes authorized by your Network  
Administrator.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
STARTUP PROCEDURES  
5.2 ENDING A NETWORK MANAGER WORK SESSION  
Use the following procedures to properly end a work session.  
CAUTION  
When you finish a working session, DO NOT turn off the Network Manager Station. This equipment is part of a  
multi-user network, and other people may be using it. If you turn off the Network Manager station, you will deny  
them access to it.  
NOTE  
If a complete system shutdown is required, refer to the System Shutdown Procedures after logging out.  
5.2.1 LOGGING OUT OF THE NETWORK MANAGER SESSION  
To exit the Network Management session, perform the following:  
1. From any Network Management submap, select File->Exit from the menu bar.  
2. OpenView will display a Warning popup menu, indicating your session is ending. Click on OK to end the session.  
3. OpenView will close all applicable files and return to the HP VUE screen.  
5.2.2 LOGGING OUT OF THE HP VUE SESSION  
To completely exit the HP VUE session, perform the following:  
1. Click on the EXIT button on the HP VUE Front Panel.  
2. The Session Manager will prompt you with the Logout Confirmation popup menu.  
This popup menu will indicate “This session not saved. Instead your Home Session will be restored upon startup.”  
This is normal operation configured into the system during installation. If it is necessary to make changes to the  
Startup Session, consult with your Network Administrator.  
3. Click OK to continue the logout process.  
4. After logging out, the terminal will return to the Login screen.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RETRIEVING THE SOFTWARE VERSION  
LBI-39169  
6. RETRIEVING THE SOFTWARE VERSION  
The Software Version feature allows you to obtain the versions of software installed on the Network Manager platform  
and software installed on directly connected devices and the devices they proxy for.  
6.1 SUBCOMPONENT SOFTWARE VERSIONS  
All software versions for the directly connected device and its subcomponents are available by using the following  
procedure:  
1. From the hierarchical map, select the icon representing the desired subcomponents.  
NOTE: If an icon is not selected, the EDACS->Software Version menu may be greyed out.  
2. The Network Manager will respond with the Software Table screen showing the software versions of all devices (or  
boards) directly connected to the selected device.  
For example, the response to an inquiry about the software version of the CEC/IMC Manager includes the versions  
of its boards as shown in Figure 6. The IP Address or host name of the directly connected EDACS device is listed in  
the IP Address field.  
3. Select the CLOSE button at the bottom of the screen to exit the Software Table screen.  
Figure 6 - Software Version Screen Example  
Part Number  
The Part Number field identifies the Ericsson Part Number of the software. If the software is installed on  
a ROM chip, then the part number will be preceded by the ROM’s reference designator (or location).  
Major Version  
The Major Software vision is an integer number representing the major software revision number, for  
example the number “2” in 2.1.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
RETRIEVING THE SOFTWARE VERSION  
Major Version  
The Minor Software vision is an integer number representing the minor software revision number, for  
example the number “1” in 2.1.  
Description  
The description field provides a brief description of the software component.  
This field will identify the ROM or the location of the software on the disk.  
Software Path  
6.2 NETWORK MANAGER SOFTWARE APPLICATION VERSIONS  
A list of software applications installed in the Network Manager and their software version can be obtained by using the  
following procedure:  
1. Select Help -> On Version from the Main Menu Bar.  
2. The Network Manager will display a list of software installed in the Network Manager and their software versions.  
A list of software applications, their software version, copyright data, and description can be obtained by using the  
following procedure:  
1. Select Help -> Index -> Application from the Main Menu Bar.  
2. The display will list the application software installed in the Network Manager platform.  
3. Select the desired application and the pertinent data will be displayed.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
EDACS HELP  
LBI-39169  
7. EDACS HELP  
EDACS Help has been integrated into the OpenView Network Node Manager help system. EDACS Help items are  
preceded with “EDACS” to make them easily identifiable.  
. Explains the OpenView  
On Help  
Help system.  
Help  
File...  
. Provides a graphical list of icons and their  
Display Legend  
On Help  
color associations.  
Provides on  
Glossary.  
Provides detailed  
Index->Application.  
Display Legend  
line definitions for many  
OpenView terms.  
information on each software application  
installed on the platform, including  
version and description.  
Index  
Glossary  
Application  
Tasks  
F1  
Provides a list  
On Version.  
On Version  
of application software  
installed on the platform  
and their version numbers.  
Functions  
Provides a list of  
OpenView tasks and task procedures.  
Index->Task.  
Provides a list of  
Index->Functions.  
OpenView Functions and their capabilities.  
Figure 7 - EDACS Help Menu  
7.1 TASK HELP  
On-line help is available for performing various EDACS and OpenView tasks. The Task Index provides a list of  
OpenView and EDACS menu bar and Map Generation help files and when opened, provides detailed procedures for  
performing the task. Perform the following when requesting task assistance.  
1. Select Help -> Index -> Tasks from the Main Menu Bar.  
2. The display will list the various OpenView and EDACS tasks.  
3. Select the desired task and the click on the Open button.  
4. OpenView will provide a description of the task and suggested procedure.  
7.2 FUNCTION HELP  
On-line help is available for performing various OpenView functions. The Function Index provides a list of OpenView  
and EDACS Functions and when opened, provides detailed procedures to perform the function. Perform the following when  
requesting on assistance.  
1. Select Help -> Index -> Function from the Main Menu Bar.  
2. The display will list the various OpenView functions.  
3. Select the desired function and the click on the Open button.  
4. OpenView will provide a description of the function and recommended usage.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING EDACS FAULT CONDITIONS  
8. MONITORING EDACS FAULT CONDITIONS  
Fault Management is responsible for detecting, isolating, and reporting alarm or fault conditions affecting the various  
Managed Elements (ME) in the EDACS network.  
8.1 DETECTING AND ISOLATING FAULTS (ALARMS)  
Fault (alarm) or event status notification results from the Network Manager either receiving information from the EDACS  
platforms or as a response to polling. When an event is received the user is notified of the event through the Event  
Notification Interface or by changing the color of the appropriate icon on the hierarchical maps.  
EDACS Fault Management tracks five user-configurable severity levels for each managed EDACS Network Element:  
Normal  
Warning  
Minor  
An application sets the status to “normal” when the object is in a normal operational state.  
An application sets the status to “warning” when an object may face a potential problem.  
An application sets the status to “minor/marginal” when an object has a minor problem; this  
status should not, however, impede the normal use of the device.  
Major  
An application sets the status to “major” when an object has serious problems; these problems are  
likely to impede normal use of the device.  
Critical  
An application sets the status to “critical” when a device is not functioning or is not accessible by  
the EDACS Network Manager.  
Table 1 lists the severity levels, descriptions, and associated colors. The severity levels and colors are configured  
according to HP OpenView Network Node Manager conventions. Each alarm received is tracked internally. The color of the  
icon does not change until all alarms received at that severity level have cleared, or an alarm at a higher severity level is  
received. For the EDACS Network Manager application, green icons indicate there are no known managed faults against the  
device represented by the icon.  
Fault Management can periodically poll remote elements for missed traps. Elements on unlicensed nodes or sites will  
have Restricted status, and any corresponding traps will be ignored. Refer to FCAPS section in LBI-39215 for the actual fault  
items and Table 1 for the meaning of icon colors. The meaning of icon colors may also be obtained by selecting the Help ->  
Display Legend from the main menu.  
8.1.1 Notification through the Event Notification Interface  
Once an alarm is generated, it is logged into the Event Logs. After the event is logged, the alarm specifics are available  
through the Event Notification Interface. The Event Notification Interface includes the Event Categories window and the  
multiple Event Browser windows.  
The Event Categories Window acts as an event notification window. The push  
buttons in this window light up to indicate when events have been received and have  
not been deleted from the Events Browser. The color of the push button reflects the  
most severe event in the category, or background color if no events are present. The  
“All Events” category contains all the events which are present in the other  
categories. The “EDACS Events” category is added by the Network Manager  
application software.  
8.1.2 Notification Through Icon Color  
After the Network Manager logs the event, it will change the appropriate map  
icon(s) color if necessary, and if enabled, display a popup window reporting the  
event and its severity.  
Figure 8 - Event Category Window  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING EDACS FAULT CONDITIONS  
LBI-39169  
Table 1 - Status Colors/Levels  
Category  
Status  
Condition  
Status Meaning  
Icon Color  
Administrative  
Unmanaged Users can set this value, which indicates that  
the object should not be monitored and that the  
status should be ignored. When the user sets  
the object back to “managed.” the EDACS-  
Off-white  
>Fault->Update operation must be performed.  
Administrative  
Testing  
An application sets the status to “testing” when  
an object is undergoing temporary diagnostic  
or maintenance procedures. This category is  
not used by the EDACS Network Manager  
application.  
Salmon  
Administrative  
Administrative  
Restricted  
Shutdown  
An application sets the status to “restricted”  
when a valid associated CEC/IMC/RCEC/SG  
node license does not exist for this element.  
Tan  
An application sets the status to “shutdown”  
when an object is inactive (although there may  
not be anything necessarily wrong with the  
object). This category is not used by the  
EDACS Network Manager application.  
Dark Brown  
Operational  
Unknown  
An application sets the status to “unknown”  
when the status of an object cannot be  
Blue  
determined. EDACS icon may be blue if there  
is another icon with the same Network Number  
and Node Number or if polling does not detect  
a physical device corresponding to this icon.  
Operational  
Operational  
Operational  
Normal  
An application sets the status to “normal” when  
the object is in a normal operational state.  
Green  
Cyan  
Warning  
An application sets the status to “warning”  
when an object may face a potential problem.  
Minor/  
An application sets the status to  
Yellow  
“minor/marginal” when an object has a minor  
problem; this status should not, however,  
impede the normal operation of the network.  
Marginal  
Operational  
Operational  
Major  
An application sets the status to “major” when  
an object has serious problems; these  
problems are likely to impede normal use of  
the network.  
Orange  
Red  
Critical  
An application sets the status to “critical” when  
a device is not functioning or is not accessible  
by the EDACS Network Manager.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING EDACS FAULT CONDITIONS  
The user is able to determine the Managed Element’s operating condition at a glance by observing the icon’s color.  
Upon receiving an alarm, the event is logged and the icon color is changed to the color representing the severity of the alarm.  
To ensure alarms are not missed, the fault color propagates up to the top-level icon on the root map. The top level icon will  
always reflect the color of the most severe fault propagated up from its submaps.  
An EDACS Icon is managed if it has one of the following states: restricted, normal or alarm. The OpenView Help-  
>Display Legend gives the association of state to color. An icon will be brown (indicating restricted) unless it has an  
associated licensed IMC/CEC/RCEC/StarGate icon with the same EDACS Identifiers (Network Number and Node Number).  
An EDACS icon will be blue if all of the elements on its submaps are restricted or unmanaged. An EDACS icon will also  
be blue if there is another icon with the same EDACS identifiers. The last one added with those EDACS identifiers will be  
managed.  
An icon may be red if it is inaccessible from this Network Manager station. The EDACS->Fault->Summary menu item  
will give a descriptive message regarding the state of the remote element.  
The Network Manager application counts the number of unique outstanding alarms at each severity level: Critical,  
Major, Minor, Warning, and Normal. The icon color should be the same as the highest severity level and should not change  
until all alarms at that severity level have cleared. When all alarms at the highest severity level have changed, the icon color  
should change to the next lowest severity level.  
8.1.3 Fault Propagation  
If there are no outstanding alarms, the icon color should correspond to the normal level. Icon color will propagate up the  
hierarchical levels. There are options to propagate the most critical or the average alarm level. Select EDIT-  
>Describe/Modify Map and set Map to Propagate Most Critical.  
8.2 REPORTING FAULTS (ALARMS)  
OpenView Network Node Manager provides choices for alarm propagation. The parent icon may be configured to  
reflect the highest alarm state, an average alarm state, or a threshold.  
8.2.1 Fault Configuration  
The  
menu item generates the OpenView Network Node Manager Event Configuration  
EDACS->Faults->Configuration  
dialog box with an associated help button. This feature allows actions and popup windows to be associated with events,  
modifications of the category, and severity level. However, it does not allow configuring the threshold-oriented alarms.  
When configuring threshold-oriented traps at the Network Manager station, refer to the Options -> Data Collection menu  
item. When configuring Threshold-oriented traps at a remote element, use the procedures in the section titled Setting  
Threshold Traps On Collected Data.  
The action(s) to be performed following the receipt of an alarm is user-selectable on a per alarm basis. Multiple actions  
may be selected simultaneously. The list of possible actions is shown below.  
Log the event with an entry describing the alarm, time of occurrence, source, and severity.  
Display a popup window describing the alarm, time of occurrence, source, and severity.  
Output to a printer describing the alarm, time of occurrence, source, and severity.  
Execute a user-defined application resident on the EDACS NM or another network device via a remote procedure  
call. This can include such tasks as issuing a data message to an EDACS data terminal, sending an e-mail message,  
calling a pager, or making a telephone call.  
Produce an audible beep.  
The EDACS NM application provides a default alarm definition, description, severity level, and category. The alarm  
definition and descriptions can be restored to their default values by executing  
/usr/OV/bin/xnmevents -load  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING EDACS FAULT CONDITIONS  
LBI-39169  
/usr/EDACS/conf/C/ed_trapd.conf. The severity levels and category will not be restored and will remain as customized by  
the user. The restore operation will not erase the actions which have been associated with individual alarms.  
NOTE  
Modifications to severity level will be made to all devices with that alarm. If the alarm is currently active, the icon  
will reflect the severity level change.  
8.2.2 Latching Transient Events  
If faults are setting and clearing is a short time frame, they may not be visually obvious. Of course the events would be  
listed in the Event History. A popup message may be associated with any event to capture the transient nature. Link failures  
that come and go are candidates for this action.  
To associate a popup message with a particular event one may either invoke the EDACS->Fault Configuration menu  
item, which requires the user to locate the event under the enterprise agent providing the event, or select the event in the event  
browser and select the event browser Actions->Event Configuration, which points the user to the event the user wishes to  
add the popup to. Either procedure will bring up the Event Configuration window.  
NOTE: If the event has the concept of setting and clearing, like a link failure, then the popup will occur on both the  
setting and clearing event.  
8.2.3 Associating Actions With Events  
Any command executable from the UNIX command  
prompt may be associated with an event including a  
email message or a beep.  
To associate an action with a particular event one  
may either invoke the EDACS->Fault Configuration  
menu item, which requires the user to locate the event  
under the enterprise agent providing the event, or  
highlight the event in the event browser and select the  
Event Browser Actions->Event Configuration, which  
points the user to the event the user wishes to add the  
action to.  
NOTE: If the event has the concept of setting and  
clearing, like a link failure, then the popup will occur on  
both the setting and clearing event.  
8.2.4 Disabling Events at Remote Agent  
Devices  
Erroneous events, which may be caused by broken  
hardware, may be disabled at the remote platform. In  
general, each event with the concept of setting and  
clearing may be individually disabled at the remote  
platform. Note: this disables the event number. For  
example, if the SM_Site_Link event is disabled at the  
System Manager, than all SM_Site_Link events are  
Figure 9 - Event Configuration  
disabled even if only one site link is a problem.  
You may not individually enable/disable events reported by the IMC Manager. However, it does support a  
enable/disable all. Refer to the System Manual, LBI-39215, for a listing of Events and the MIB Objects used to disable them.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING EDACS FAULT CONDITIONS  
8.2.5 UnManaging Devices  
If a device is undergoing maintenance, it may be desirable to unmanage its associated icon to prevent its state from  
propagating up the map levels.  
To unmanage a device, perform the following:  
1. Select the icon.  
2. Select the  
menu item.  
Options->Unmanage Object  
3. Verify that the device’s icon color turns off-white. This indicates that the status of the device is is being ignored.  
8.2.6 Managing Devices  
To manage a device which was previously designated as Unmanaged, perform the following:  
1. Select the icon.  
2. Select the  
menu item.  
Options->Manage Object  
3. Verify that the device’s icon color turns blue. This indicates that the device is being monitored, but its current status  
has not been updated and is unknown. To determine the device’s current status, perform the Fault Update procedure.  
8.2.7 Fault Updating Managed Devices  
This menu item allows you to manually update EDACS managed icons with the latest status reported to the EDACS  
Network Manager. When an icon transitions from unmanaged to managed, this menu item must be used to update the menu  
items.  
Use the following procedure to update the status of a managed device:  
1. Select the icon representing the device.  
2. Select the  
menu item to manually update the device’s current status.  
EDACS->Fault->Update  
3. The device’s icon will change to the color corresponding to last status reported to the Network Manager.  
8.2.8 Setting-up Threshold Oriented Events at RTM Devices  
The BCU/CAL and PI devices are threshold-oriented alarming mechanisms. This thresholding allows the configuring of  
such parameters as rising or falling trap and the conditions for generating traps. The OpenView MIB Browser is used to  
configure these traps. For additional informatio, refer to the section on Setting and delecting alarm thresholds in LBI-39171.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING EDACS FAULT CONDITIONS  
8.3 IDENTIFYING THE CAUSE OF ALARMS  
8.3.1 Using Hierarchical Maps  
LBI-39169  
After the Network Manager alerts the user to an alarm either by changing an icons color or through a popup window, it  
will be necessary to identify the responsible element causing the fault indication and isolate the cause.  
The hierarchical maps display a greater level of detail as the maps are traversed. To prevent missing fault status, fault  
colors propagate to the top level icon on the root map. The easiest method of identifying the element causing the fault is to  
traverse down the maps until the element in question is displayed.  
Events can be one shot or possess the concept of setting and clearing. Only events possessing the concept of setting and  
clearing, such as linkup/down or board fail/normal, change icon color. For a given map object, the Network Manager can  
display the current alarms affecting icon color for that object.  
1. Traverse down the hierarchical maps by double-clicking with the left mouse button on the faulted icon. This will open  
any submap associated with the icon.  
2. Continue traversing down through the submaps until the managed element causing the alarm has been identified.  
3. Select (highlight) the icon with the fault color using the left mouse button.  
4. Select the  
menu item.  
EDACS -> Faults -> Summary  
The summary popup window listing all known actively managed faults received asychronously or detected by EDACS  
Double click on faulted icon to  
traverse to next lower level.  
Highlight faulted icon, and select  
the EDACS->Faults->Summary  
to view the Alarm Summary for  
the icon selected.  
Alarm Summary  
Figure 10 - Using Hierarchical Maps to Identify Fault Events  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING EDACS FAULT CONDITIONS  
device polling will be displayed. The display is in a short report (list) format, with each entry in the report listing the  
time stamp, alarm description, and severity level of the event.  
5. If an object in the map has an operational status color other than normal or unknown, it is likely that events have been  
generated from that object. To access event information for these objects, select the object in the map and then access  
the menu item Monitor -> Events. This will bring up the All Events Browser filtering out all events except those for the  
selected object.  
NOTE: If the All Events Browser window appears empty, it may be due to the incorrect filter settings or previous  
deletion of events related to the object. To set the filter, open the View -> Set Filters and set the desired filters. To  
access previously deleted events for the node, use the menu item File -> Load Event Log -> Filtered.  
Help  
EDACS  
File...  
Faults  
Event Configuration. This option  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
involves adjusting the criticality level for  
alarm propagation, and choosing the  
appropriate optional fault notification  
actions (such as, popup message, email,  
beep, or pager option.  
Configuration  
Summary  
Update  
Update allows user to manually update  
all icons status as known by the EDACS  
Network Manager Station.  
Summary presents a textual  
summary of the current alarm  
status for this device.  
Figure 11 - EDACS Fault Menu  
8.3.2 Using The OpenView Event Browser  
The Event Browser allows the user to perform the following activity:  
Browse incoming events and events contained in the events log.  
Filter displayed events based on severity, time, source, message and or event type.  
Get event help.  
By using the Event Browser you can gain insight into the source and types of events, and isolate and correct problems  
that have generated events. If you have a read-only Event Notification Interface and delete any events, the deleted events will  
reappear next time the Interface is started, since deleted events are not saved from a read-only Interface.  
Each category in the Event Category has its own Event Browser window. The Event Browser window contains a scrolled  
list of events belonging to the associated category. Events are displayed in different fonts, based on their severity These fonts  
can be modified, but by default critical and major severity events are displayed in bold font. The Event Browser window also  
contains status on the number of events in the window, their severity, and any filtering information.  
The Event Browser window lists all undeleted events for the indicated category. The events are in chronological order  
with the most recent event at the bottom of the list.  
For each event, the list shows the following.  
Severity  
Date/Time  
Source  
The severity of the event.  
The day of the week, date and time when the event occurred.  
An identifier (such as a node name) for the network object where the event originated.  
A brief description of the event.  
Message  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING EDACS FAULT CONDITIONS  
LBI-39169  
8.3.2.1 Notification of New Events  
To know when events have been received, examine the event notification indicator lights in the Event Categories  
window. The indicator lights will change to corresponding color of the most severe alarm logged.  
To see new events as they arrive (real time), open up the EDACS or All Events Browser. Place the scroll bar at the  
bottom of the browser list; as new events arrive, they are appended to the end of the list.  
A listing of EDACS events may be found in LBI-39215. According to the established naming convention, each event  
name is prefaced with letters that generally represent the reporting EDACS device. See Table 2 for the Letter associations.  
8.3.2.2 Selecting Events Within a List  
Table 2 - Event Naming Convention Prefix  
To perform an operation on specific events, select events by  
clicking the mouse button when the pointer is on top of them.  
When an event is selected, the text appears in reverse video.  
Letter Designations  
EDACS Device  
PI  
Jessica PBX Interface  
BCU/CAL  
BC  
To select one event, use the mouse select button (usually  
left button) to click on the event line. This action  
deselects all other events.  
SM  
IM  
System Manager  
CEC/IMC Manager for NT  
CEC/IMC/StarGate  
Site Controller  
To select multiple events that are not next to each other in  
the list, press [CTRL] and hold it down, and then use the  
mouse select button to select the events you want. This  
action enables you to select additional events without  
deselecting the others.  
CI  
SC  
GETC  
ACU  
PMU  
TU  
GE Trunking Card  
Alarm and Control Unit  
Power Monitor Unit  
Test Unit  
To select a contiguous range of events, press the mouse  
select button while dragging the pointer across desired  
events. This action deselects all events outside the range.  
To toggle a range of events, press [CTRL] and the mouse select button while dragging the pointer across events you  
want toggled. This action does not affect events outside the range.  
Figure 12 - EDACS Event Browser Example  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING EDACS FAULT CONDITIONS  
8.3.2.3 Deleting Events  
Events continue to appear in an Event Browser list until you delete them or the maximum number of events for the  
browser has been reached. The primary reason to delete events is so you can determine when new events occur. If you do not  
delete events, the buttons in the Event Category window will continue to show status color, and you will not know when  
newer events of the same or lower severity level occur. If you want to keep the event, but not delete it, you can assign it to a  
new category or new severity level. In this way you can “acknowledge” the receipt of the event, but keep the event around to  
look at later. If you have installed the Network Node Manager product, you can create a new category using the event  
configurator. Call this new category “Acknowledged Events”, and assign acknowledged events to that category.  
Once deleted, the same events does not re-appear. Though an event will appear in an event category list and the “All  
Events” category list, you need only delete the event from one list.  
8.3.2.4 Filtering Events  
Within any Event Browser window, you can filter based on one or more criteria. These criteria are severity, source,  
and/or event. You use filtering to reduce the number of events displayed. The status of the filtering is shown at the bottom of  
the Event Browser window, showing how many events are in the category, as well has how many of each severity are  
displayed. If filtering is on, the status will change to indicate that a subset of the events in the category is displayed. You can  
then perform operations based on the filtered events, the selected events, or all the events in the category.  
As an example, to see all the Critical events:  
1. Select the “All Events” category.  
2. From the “All Events Browser” pick View -> Set Filters..., then chose Critical severity.  
You now see all the critical events. After resolving all these events, you will want to delete them.  
3. If you select Action ->Delete -> Filtered Events, the event category indicator light will change from red to the next most  
severe color.  
8.3.2.5 Locating Source of Event  
To locate the source of a specific event perform the  
following:  
1. Select the event and then choose Action->Highlight  
Source on Map.  
This will bring up a submap containing the source of the  
event. The label for the source object will be highlighted.  
2. Select the source object and use the menu items in the  
OVW map menu bar to obtain more information or to fix  
the problem that has caused the event.  
8.3.2.6 Obtaining Detailed Event Information  
Use the following procedure to obtain additional detailed  
information regarding the cause of the alarm and possible  
corrective action:  
1. Highlight the event, and select the View->Event  
Description from the Event Browser menu bar.  
Figure 13 - Event Description  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING EDACS FAULT CONDITIONS  
LBI-39169  
The Network Manager will display the Event Description window providing the technical details associated with the  
event and possible corrective action.  
2. If the event is associated with a site, the user may optionally consult the System Manager Alarm Control Display (screen  
40) using the Telnet features described later in this manual.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
CONFIGURING EDACS DEVICES  
9. CONFIGURING EDACS DEVICES  
The Network Manager provides a single point of control and can configure devices by either bringing up clients running  
on the Network Manager or by logging into devices with the native access mode. The PI, BCU/CAL, and EDG are accessed  
in the native access mode. These devices do not have local editors. The Accounting: File Transfer (ftp) menu item may be  
used to move configuration files to the Network Manager for editing and then transferred back to the device.  
The EDACS Configuration Menu presents configuration functions associated with the EDACS device represented by the  
icon. The following submenus are accessible from the Configuration menu.  
Configure:  
Connect:  
Reboot:  
Brings up the local client Graphical User Interface to configure the device.  
Connects to the EDACS device (i.e., via Telnet) to use the device’s native configuration utilities.  
Automatically reboots the EDACS device.  
Restart:  
Restarts traffic after a shutdown.  
Shutdown:  
Shuts down traffic without losing connectivity.  
. Brings up the local client  
Configure  
Graphical User Interface to configure  
the device.  
Help  
EDACS  
Faults  
File...  
. Connects the EDACS  
Connect  
Configuration  
Accounting: File Transfer  
Performance  
device (i.e., via Telnet) to use the  
device’s native configuration  
utilities.  
Configure  
Connnect  
Software Version  
Telnet (xterm)  
Reboot  
Telnet (VT420)  
Restart  
Restarts traffic after a shutdown.  
Restart.  
Shutdown  
Automatically reboots  
Reboot.  
Shuts down traffic without  
losing connectivity.  
Shutdown.  
the EDACS device.  
Figure 15 - EDACS Configuration Menu  
9.1 INTEGRATED CEC/IMC MANAGER  
The CEC/IMC Manager client is invoked using the EDACS-  
>Configuration->Configure menu item with the IMC Manager icon  
selected. The CEC/IMC Manager for Windows NT employs the  
client-server paradigm.  
The server, which interfaces to the  
G ra p h ic a l U se r In te rfa c e (G U I)  
(C L IE N T )  
CEC/IMC, runs on the Windows NT platform while the client may  
run on either the Windows NT platform or the EDACS Network  
Manager UNIX platform. The CEC/IMC Manager HP-UX client has  
the ability to dynamically change between the Motif and Windows  
environment appearance. The CEC/IMC Manager communicates  
from its Graphical User Interface (GUI), or client, to its underlying  
engine via Open Systems Foundation (OSF) compliant Remote  
Procedure Calls (RPCs). This strategy implies that if the Ethernet link  
between the IMC Manager and the EDACS Network Manager goes  
down (which should be highly unlikely), then the EDACS Network  
Manager interface for the IMC will only be able to report that the link  
is down.  
R P C  
R P C  
C E C /IM C M a n a g e r A p p lic a tio n  
(S E R V E R )  
O th e r  
C O M M  
R S -2 3 2  
Figure 14 - CEC/IMC Client-Server Paradigm  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING EDACS DEVICES  
9.1.1 Starting The CEC/IMC Session  
LBI-39169  
From the Network Manager, invoke the CEC/IMC Manager client using the following procedure:  
1. On the Switch Center submap, highlight the IMC Manager icon.  
2. From the Main Menu bar, select the  
menu item. The Network Manager will  
EDACS->Configuration->Configure  
display the CEC/IMC Manager HP-UX Client dialoag box indicating that the CEC/IMC Client is initializing.  
NOTE: The CEC/IMC Manager program must be running for this process to succeed. (Refer to LBI-39224,  
EDACS CECX/IMC Manager, Version 5.0 for Windows NT if required.)  
3. From the CEC/IMCManager HP-UX Client dialog box, click on  
main menu (Figure 16).  
. This brings up the the CEC/IMC Manager  
OK  
The bottom status bar displays several messages that are helpful or important to the CEC/IMC Manager user. "For  
Help, press F1" or the current menu choice and the current time are displayed at each end of the status bar. System  
status—"No System Errors" or "System Errors"—and Link status—"Mom Link is Up" or "Mom Link is Down"—  
provide the user with important information concerning system operation.  
Figure 16 - CEC/IMC Manager Main Window and Menu Bar  
4. Select one of the CEC/IMC functions from the Menu Bar.  
Selecting any of the choices from the CEC/IMC Manager menu bar (Configure System, Monitor System, Help)  
will display the Login dialog box. You will be prompted to enter a user name and password before execution of the  
program will continue. The default user name is "NMUSER" and the default password is "GUEST." These log-in  
defaults are provided in the PASSWORD.DAT file that is part of the CEC/IMC Manager installation.  
Figure 17 - CEC/IMC Manager Login  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
CONFIGURING EDACS DEVICES  
Before proceeding, it is recommended that the user be completely familiar with using the CEC/IMC Manager for  
Windows NT. Complete instructions may be found in LBI-39224.  
9.1.2 Sample CEC/IMC Manager Screens  
Some sample CEC/IMC Manager screens for configuration follow.  
Figure 18 - System Options for Digital Console Pre-empt Example Screen  
Figure 19 - Site Channel Configuration Example Screen  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING EDACS DEVICES  
LBI-39169  
Figure 20 - Console User Profile Configuration Example Screen  
9.2 TELNET SESSIONS TO THE PI, BCU, CAL, AND EDG  
Telnet access into each device is password-protected. Therefore, the user requesting access must have login privileges  
for the remote device. The normal Telnet capability of the HP workstation provides VT100 emulation, which is the normal,  
generic emulation for simple applications. Generic VT100 emulation is used for the PI, BCU, CAL, and EDG for Telnet  
connections. This level of terminal emulation is bundled with HP-UX.  
1. On the Switch Center submap, highlight the device’s icon.  
2. From the Main Menu bar, select the EDACS -> Configuration -> Connect -> Telnet(xterm) menu item.  
3. Enter the your username and password to gain access to the device. Refer to the device’s User manual for additional  
information.  
9.3 TELNETING TO THE SYSTEM MANAGER  
Telneting to the System Manager uses VT220 emulation because it is a VAX/VMS system running a screen-oriented  
application. From the Network Manager, invoke the System Manager program using the following procedure:  
1. On the Switch Center submap, highlight the System Manager icon.  
2. From the Main Menu bar, select the EDACS -> Configuration -> Connect -> Telnet (VT420) menu item.  
The Network Manager will display the System Manager log on screen as shown in Figure 21.  
3. Enter the Username (default Username is “EGESYSMGR”) and press the <Enter> key.  
4. Enter the Password (default Password is “EGESYSMGR”) and press the <Enter> key.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
CONFIGURING EDACS DEVICES  
This brings up the the System Manager User Menu screen (Figure 22). From this point on all System Manager  
operations are as described in LBI-38984.  
NOTE  
When telneting into the System Manager, the keyboard is remapped for use with the VAX/VMS operating system.  
A keyboard template (AE/LZT 123 1908/1) is available and may be ordered through our publications department.  
Figure 21 - System Manager Login Screen  
Figure 22 - System Manager User Menu  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING EDACS DEVICES  
9.4 USER ACTION LOGGING  
LBI-39169  
The EDACS Network Manager logs the EDACS Configuration functions reboot, restart, and shutdown. Each logged  
action includes the host name, user name, time, date, description of action, and targeted EDACS IP Address. User action log  
information is written to the same file displayed by the Event Browser.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TRANSFERRING DEVICE FILES  
10. TRANSFERRING DEVICE FILES  
Occassionally, it may be necessaary to transfer device files; such as configuration files for editing, activity data for  
billing, etc. Device files may be transfered from the device’s storage location to a more easily accessible location by using the  
Accounting: File Transfer function. This process allows the Network Manager to connect to the EDACS device and initiate a  
file transfer using File Transfer Protocol (ftp), thus allowing device-specific accounting records or files to be transferred to  
another location (such as the user’s home directory) for use by the EDACS Network Manager or a third party billing package.  
The following figures provide examples of FTP sessions on the PI, BCU and System Manager. In these examples, the  
activity data is transfered via FTP, using a GET command, for use with another program. A listing of FTP commands is  
available in LBI-38987 and LBI-38963.  
1. Highlight the device’s icon on the Network Manager’s submap.  
2. From the Main Menu bar, select the EDACS -> Accounting: File Transfer menu item.  
The Network Manager will display the devices login prompt. In all cases, it will be necessary to enter your User  
name and Password before proceeding with the transfer.  
NOTE  
Files are transferred to the directory OpenView is invoked from. This is usually the user’s home directory. If,  
however, OpenView is invoked from the command line in a write protected directory, then the file transfer will fail.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TRANSFERRING DEVICE FILES  
LBI-39169  
PI Activity Data Transfer Example  
This is an example of transferring the PI activity record sep01.log to the users HOME directory.  
Connected to 192.168.201.30.  
220 192.168.201.30 pSOSystem FTP server (NTL68K/1.0.4) ready.  
Name (192.168.201.30:lab): user  
331 Password required for user.  
Password:  
230 User user logged in.  
Remote system type is pSOSytem.  
ftp> cd activity  
250 CWD command successful.  
ftp> ls  
200 PORT command successful.  
150 Opening ASCII mode data connection for ..  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
194684 Sep 01 1996 23:44 sep01.log  
207286 Sep 02 1996 23:47 sep02.log  
619989 Sep 03 1996 23:09 sep03.log  
12241 Jan 30 1996 16:07 fatal.log  
737526 Sep 04 1996 23:16 sep04.log  
324909 Sep 05 1996 13:35 sep05.log  
286160 Feb 08 1996 14:00 summary.log  
5318 Jun 06 1996 14:05 error.log  
-rwxrwxrwx 1 root 2621385 Jan 17 1996 17:25 isdx.log  
-rwxrwxrwx 1 root 9180 Aug 30 1996 16:34 isdn.log  
WARNING! 10 bare linefeeds received in ASCII mode  
File may not have transferred correctly.  
226 Transfer complete.  
ftp> get sep01.log  
200 PORT command successful.  
150 Opening ASCII mode data connection for sep01.log (194684  
bytes).  
226 Transfer complete.  
197586 bytes received in 9.18 seconds (21.03 Kbytes/s)  
ftp> bye  
Figure 23 - Transferring PI Activity Data Using FTP  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TRANSFERRING DEVICE FILES  
BCU CDR Data Transfer Example  
This is an example of transferring a CDR record, t2250609.CDR, from the BCU to the user’s home directory. The user  
may then use a third party application that reads CDR records.  
Connected to 192.168.201.20.  
220 192.168.201.20 pSOSystem FTP server (NTL68K/1.0.4) ready.  
Name (192.168.201.20:lab): user  
331 Password required for user.  
Password:  
230 User user logged in.  
Remote system type is pSOSytem.  
ftp> cd cdr  
ftp>ls  
200 PORT command successful.  
150 Opening ASCII mode data connection for ..  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
176803 Aug 12 1996 23:59 t2250609.CDR  
34001 Aug 10 1996 23:59 t2230051.CDR  
-rwxrwxrwx 1 root 2574762 Aug 15 1996 23:59 t2272359.CDR  
-rwxrwxrwx 1 root 1625170 Aug 17 1996 23:59 t2292359.CDR  
-rwxrwxrwx 1 root 2944632 Aug 14 1996 23:59 t2262359.CDR  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
-rwxrwxrwx 1 root  
22736 Aug 18 1996 23:59 t2310018.CDR  
906761 Aug 16 1996 23:59 t2290647.CDR  
411755 Aug 19 1996 23:59 t2320008.CDR  
208131 Aug 20 1996 23:59 t2322359.CDR  
214850 Aug 21 1996 23:59 t2340002.CDR  
182558 Aug 22 1996 23:59 t2350122.CDR  
206159 Aug 23 1996 23:59 t2360025.CDR  
31337 Aug 24 1996 23:59 t2370001.CDR  
61214 Aug 25 1996 23:59 t2380025.CDR  
145377 Aug 26 1996 23:59 t2390704.CDR  
211990 Aug 27 1996 23:59 t2392359.CDR  
116084 Aug 29 1996 23:59 t2421216.CDR  
1295 Aug 28 1996 14:10 t3401651.CDR  
174 Aug 29 1996 12:16 t3411457.CDR  
105984 Sep 05 1996 13:46 t2490040.CTM  
241220 Aug 06 1996 23:59 t2190020.CDR  
175904 Aug 07 1996 23:59 t2200014.CDR  
202655 Aug 08 1996 23:59 t2210026.CDR  
157541 Aug 09 1996 23:59 t2220015.CDR  
21800 Aug 11 1996 23:59 t2232359.CDR  
878304 Aug 13 1996 23:59 t2252359.CDR  
145408 Aug 28 1996 14:03 t2410004.CDR  
162410 Aug 28 1996 23:59 t2411410.CDR  
198611 Sep 03 1996 23:59 t2470205.CDR  
WARNING! 35 bare linefeeds received in ASCII mode  
File may not have transferred correctly.  
226 Transfer complete.  
ftp> get t2250609.CDR  
200 PORT command successful.  
150 Opening ASCII mode data connection for t2250609.CDP (176803 bytes).  
226 Transfer complete.  
178936 bytes received in 8.04 seconds (21.73 Kbytes/s)  
ftp> bye  
Figure 24 - Transferring a BCU Billing Record Using FTP  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TRANSFERRING DEVICE FILES  
LBI-39169  
System Manager Activity Data Transfer Example  
This is an example of transferring an Activity data file, ACT_01-SEP-1996.03;1, from the System Manger to the user’s  
home directory. The user may then use a third party application that reads CDR records.  
Connected to 192.168.201.10.  
220 smgtgt MultiNet FTP Server Process V3.5(15) at Thu 5-Sep-96 2:09PM-EDT  
Name (192.168.201.10:lab): egesysmgr  
331 User name (egesysmgr) ok. Password, please.  
Password:  
230 User EGESYSMGR logged into DKA300:[EGESYSMGR] at Thu 5-Sep-96 2:09PM-EDT, job  
23c  
Remote system type is VMS.  
ftp> dir  
200 Port 10.30 at Host 147.117.47.240 accepted.  
150 List started.  
DKA300:[EGESYSMGR]  
ERRLOG.DAT;3  
1429 14-MAY-1996 09:41 [1,1] (RWED,RWED,RWED,)  
ERRLOG_SUPPORT_OFF.COM;5 1 16-AUG-1994 21:32 [1,1] (RWED,RWED,RWED,)  
ERRLOG_SUPPORT_ON.COM;15 1 16-AUG-1994 21:31 [1,1] (RWED,RWED,RWED,)  
FTP_SERVER.LOG;1  
LOGIN.COM;32 2 7-AUG-1996 09:38 [1,1] (RWED,RWED,RE,)  
NETSERVER.LOG;2 5 1-MAR-1994 18:40 [1,1] (RWED,RWED,RE,)  
0 5-SEP-1996 14:09 [1,1] (RWED,RWED,RE,)  
UNTDIS_DEBUG.TXT;3 1 23-APR-1993 09:29 [1,1] (RWED,RWED,RWED,)  
Total of 1439 blocks in 7 files.  
226 Transfer completed.  
ftp> cd smact:  
250 Connected to EGE_SMACTROOT:[SMACT].  
ftp> dir *sep*  
200 Port 10.59 at Host 192.168.201.2 accepted.  
150 List started.  
EGE_SMACTROOT:[SMACT]  
ACT_01-SEP-1996.03;1 102 1-SEP-1996 12:26 [1,1] (RWED,RWED,RE,)  
ACT_01-SEP-1996.04;1 612 1-SEP-1996 00:18 [1,1] (RWED,RWED,RE,)  
ACT_01-SEP-1996.05;1 102 2-SEP-1996 16:41 [1,1] (RWED,RWED,RE,)  
ACT_01-SEP-1996.06;1 408 1-SEP-1996 00:11 [1,1] (RWED,RWED,RE,)  
ACT_02-SEP-1996.04;1 612 2-SEP-1996 01:50 [1,1] (RWED,RWED,RE,)  
ACT_02-SEP-1996.05;1 102 2-SEP-1996 16:41 [1,1] (RWED,RWED,RE,)  
ACT_02-SEP-1996.06;1 408 2-SEP-1996 01:09 [1,1] (RWED,RWED,RE,)  
ACT_05-SEP-1996.06;1 204 5-SEP-1996 00:57 [1,1] (RWED,RWED,RE,)  
Total of 3774 blocks in 14 files.  
226 Transfer completed.  
ftp> get ACT_01-SEP-1996.03;1  
200 Port 10.60 at Host 192.168.201.2 accepted.  
150 ASCII retrieve of EGE_SMACTROOT:[SMACT]ACT_01-SEP-1996.03;1 started.  
226 Transfer completed. 7038 (8) bytes transferred.  
7038 bytes received in 0.59 seconds (11.73 Kbytes/s)  
ftp> bye  
Figure 25 - Transferring System Manager Activity Data Using FTP  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING PERFORMANCE TRENDS  
11. MONITORING PERFORMANCE TRENDS  
Performance trends can be used to determine utilization and accessibility or to tune system performance. Trends can be  
viewed on a per site or Radio Switch basis. The results of these trends are presented on the 2-D line graphs.  
This data collection feature allows individual data trend items to be monitored for exceeding a user defined threshold.  
The data points used in the trend may be saved or discarded. Popup messages or automatic actions can occur, such as email  
message, when a threshold is exceeded. NOTE: If data points are saved then disk space must be monitored.  
The EDACS Network Manager Performance menu provides 2-D line graphs that measure the overall node and site level  
performance via various predefined groupings of performance parameters.  
Utilization:  
Accessibility:  
Compare:  
Provides totals for call types pertaining to this EDACS device.  
Displays queued, busy, and denied call information for this EDACS device.  
Displays a single MIB value for multiple nodes or sites.  
The EDACS Performance Menu presents performance information about the EDACS device represented by the icon.  
NOTE: In the Performance menu items shown below the choices for node and site are the same; therefore, only the node  
path is shown.  
NOTE  
All performance parameters are from the perspective of the CEC/IMC.  
The performance graphs and call activity initiated from the Main Menu bar may get performance data from several  
sources. The following hierarchy will be used to determine the source of the data:  
BCU/CAL platform  
Jessica PI platform  
NOTE  
Real-time system monitoring requires a PI or a BCU/CAL on the node being monitored.  
11.1 USING TWO-DIMENSIONAL LINE GRAPHS  
Most of the functions presented in the menu require the user to select one or more icons from one or more of the  
OpenView maps. In order to select a single icon, the user simply clicks the left mouse button. To select multiple items, the  
user clicks the left mouse button and “drags” a rectangular area in which all items within the rectangle will be selected. Once  
items have been selected, then the user may add specific icons to the selection by holding down the CTRL key while clicking  
the left-most mouse. Node level 2-D line graphs (summarizes traffic at a node) and site level 2-D line graphs (summarizes  
traffic at a site) may be produced for Utilization, Accessibility, and Compare Performance menu items.  
Node Performance line graphs may be invoked from the following icons: IMC Node, CEC Node, IMC, and CEC. Site  
Performance line graphs and call activity may be invoked from the following icons: IMC Node, CEC Node, IMC, CEC, Site,  
and PI.  
The user may select a set of one or more icons and invoke the desired performance graph. For instance, if the user selects  
several nodes, then a graph for each of the different nodes will be produced. One graph per valid icon selected will be  
initiated.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING PERFORMANCE TRENDS  
11.1.1 Line Graph Example  
LBI-39169  
The example of a line graph, shown in Figure 26, illustrates the ease and clarity with which the EDACS Network  
Manager platform presents data. The performance groupings display logically similar performance items on one graph,  
depicting each variable in a different color.  
Figure 26 - Example of a Two-Dimensional Line Graph  
11.1.2 Customizing Line Graphs  
When a performance item is selected from the Main Menu, a default 2-D line graph appears. Pull-down menu items are  
available for the following selections:  
1. Statistics (activate a statistics window with raw statistics information).  
2. Sampling interval (range is 1 sec to months).  
3. Sampling items (line graph items may be individually turned on/off).  
4. Data capture option (i.e., store graph data in database).  
5. Print option.  
6. Line width.  
7. Scaling  
The ability to zoom in and out, and scroll back and forth, within the areas of interest in the line graph comes standard  
with OpenView Network Node Manager. The OpenView Network Node Manager graph display program is called  
“xnmgraph.” Under the file menu is a print command. This causes the entire window to be printed out in “xwd” format, but  
the window can also be redirected to a file. Many off-the-shelf programs can read and process xwd format files. Among  
these are  
HP ImageView (part of the Mpower package)  
Xview (public domain software)  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING PERFORMANCE TRENDS  
Both of these programs will convert the “xwd” format to “TIF” and “GIF” formats which are easily imported into other  
applications.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING PERFORMANCE TRENDS  
11.2 TRACKING EDACS DEVICE UTILIZATION  
LBI-39169  
The  
menu item allows the user to chart the totals for call types pertaining to this EDACS  
Performance -> Utilization  
device.  
The entries on the Performance sub-bar, see Figure 27, are detailed below. All of the following graphs will be displayed  
for either nodes or sites.  
Call Performance - Network-wide call performance (totals of all call types) for Channel Assignments, Queues,  
Denies, and System Busies.  
Channel Assignment - Total Channel Assignments for the following call types: Individual Voice Calls, Group Voice  
Calls, Individual Data Calls, Group Data Calls, Individual Outbound Interconnect, Individual Inbound Interconnect,  
Group Inbound Interconnect, and ALL.  
Individual Call - Individual voice call performance totals for Channel Assignments, Queues, Denies, and System  
Busies.  
Group Voice - Group voice call performance totals for Channel Assignments, Queues, Denies, and System Busies.  
Individual Data - Individual data call performance totals for Channel Assignments, Queues, Denies, and System  
Busies.  
Group Data - Group data call performance totals for Channel Assignments, Queues, Denies, and System Busies.  
Individual Outbound Telephony - Individual outbound interconnect call performance totals for Channel  
Assignments, Queues, Denies, and System Busies.  
Individual Inbound Telephony - Individual inbound interconnect call performance totals for Channel Assignments,  
Queues, Denies, and System Busies.  
Group Inbound Telephony - Group inbound interconnect call performance totals for Channel Assignments, Queues,  
Denies, and System Busies.  
Help  
EDACS  
File...  
Faults  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
. Provides totals for call types  
Utilization  
pertaining to this EDACS device.  
Utilization  
Accessibility  
Compare  
Monitor  
Node  
Site  
Call Performance  
Channel Assignment  
Individual Call  
Indicate if the device is a  
Node or Site.  
Group Voice  
node or site.  
Individual Data  
Individual Outbound Telephony  
Individual Inbound Telephony  
Group Inbound Telephone  
Select the  
performance data to be displayed.  
Performance Criteria.  
Figure 27 - EDACS Performance -> Utilization Menu  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING PERFORMANCE TRENDS  
11.3 TRACKING EDACS DEVICE ACCESSIBILITY  
The  
menu item allows the user to chart the queued, busy, and denied call information for  
Performance -> Accessibility  
this EDACS device.  
All of the following graphs will be displayed for either nodes or sites.  
Denies - Total Denies for the following call types: Individual Voice Calls, Group Voice Calls, Individual Data Calls,  
Group Data Calls, Individual Outbound Interconnect, Individual Inbound Interconnect, Group Inbound Interconnect,  
and ALL.  
Queues - Total Queues for the following call types: Individual Voice Calls, Group Voice Calls, Individual Data  
Calls, Group Data Calls, Individual Outbound Interconnect, Individual Inbound Interconnect, Group Inbound  
Interconnect, and ALL.  
System Busies - Total System Busies for the following call types: Individual Voice Calls, Group Voice Calls,  
Individual Data Calls, Group Data Calls, Individual Outbound Interconnect, Individual Inbound Interconnect, Group  
Inbound Interconnect, and ALL.  
Help  
. Displays queued,  
busy, and denied call information  
for this EDACS device.  
EDACS  
File...  
Faults  
Accessibility  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
Utilization  
Accessibility  
Compare  
Monitor  
Node  
Site  
Queues  
Denies  
System Busies  
Indicate if the device  
Node or Site.  
is a node or site.  
Select the  
Accessibility Criteria.  
accessibility data to be displayed.  
Figure 28 - EDACS Performance / Accessibility Menu  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING PERFORMANCE TRENDS  
LBI-39169  
11.4 COMPARING PERFORMANCE FROM MULTIPLE SITES OR NODES  
The  
menu item allows the user to chart a single MIB value for multiple nodes or sites.  
Performance -> Compare  
The following graphs will display a single performance parameter for multiple nodes or sites on the same graph. There will  
be a different line for each of the sites or nodes selected. The sites being displayed can be on different nodes.  
Channel Assignments - Total Channel Assignments for all call types.  
Queues - Total Queues for all call types.  
Denies - Total Denies for all call types.  
Drops - Total Drops for all call types.  
System Busies - Total System Busies for all call types.  
Emergencies - Total Emergencies.  
Secondary Assignments - Total Secondary Assignments for all call types.  
Message Trunks - Total Message Trunk Assignments for all call types.  
Air Time - Total Air Time for all call types.  
Queue Time - Total Queued Time for all call types.  
If selecting Airtime with one site selected (minimum number of icons is one for example), then graph  
NOTE:  
Airtime for that site only.  
Help  
EDACS  
File...  
Faults  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
Displays a single MIB value  
for multiple nodes or sites.  
Compare.  
Utilization  
Accessibility  
Compare  
Monitor  
MultiNode  
MultiSite  
Channel Assignments  
Queues  
. Indicate  
if this is for multinode or multisite.  
Multinode or Multisite  
Denies  
Drops  
System Busies  
Emergencies  
Secondary Assignments  
Message Trunks  
Air Time  
Select the  
compare criteria to be displayed.  
Compare Criteria.  
Queue Time  
Figure 29 - EDACS Performance -> Compare Menu  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING REAL-TIME CALL ACTIVITY  
12. MONITORING REAL-TIME CALL ACTIVITY  
Real-time call activity can be displayed on both node (Multisite Monitor) and site (Site Monitor) levels. In the Multisite  
Monitor (MSM), active call types are indicated by the application of color to the button representing a particular channel on a  
particular site. The color is removed when the call has completed. For the Site Monitor (SM), active call types are  
highlighted, and channel status is indicated in the status column. The originating site may be determined by the color of the  
button lettering. White button lettering indicates primary “originating” site while gray button lettering indicates secondary  
sites. NOTE: Forced and Confirmed Calls will show multiple primary sites.  
Screen updates are event-driven. An indication that the call has completed at the monitor level does not guarantee that  
the call has cleared throughout the EDACS infrastructure. Detection of hung channels is not a monitor feature. When the site  
is in Failsoft, the channel updates on the Multisite Monitor and Site Monitor screens report the last known control channel.  
The Multisite Monitor or Site Monitor session is invoked by selecting the desired option from the Performance ->  
Monitor menu item as shown in Figure 30 for monitoring call activity.  
MultiSite on Node - Invokes the Multisite Monitor for all applicable sites on each node selected. Operation is valid  
for the CEC or CEC Node, and IMC or IMC Node (NIM) icon.  
MultiSite on Sites - Invokes the Multisite Monitor for all selected sites on the same node as the first node detected.  
Sites on a different node will be ignored. Operation is valid for the Site icon, PI icon, and CEC or IMC, or CEC  
Node or IMC Node (NIM) icon.  
Site - Invokes the Site Monitor for each site selected. Operation is valid for the Site icon, PI icon, and CEC or IMC,  
or CEC Node or IMC Node (NIM) icon.  
The following sections detail the use and operation of the MultiSite Monitor and the Site Monitor.  
Help  
EDACS  
File...  
Faults  
Configuration  
Accounting: File Transfer  
Performance  
Software Version  
Utilization  
Accessibility  
Compare  
Monitor  
Invokes Site Monitor  
and Multisite Monitor.  
Monitor.  
Invokes Multisite  
Monitor  
Multisite on Node  
Multisite on Sites  
Site  
}
Invokes Site Monitor  
Figure 30 - EDACS Performance -> Monitor Menu  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING REAL-TIME CALL ACTIVITY  
LBI-39169  
12.1 USING THE MULTISITE MONITOR APPLICATION  
The Multisite Monitor application monitors call activity for one user-specified node. All windows can be manipulated  
(i.e., resized, iconized, closed) via standard window border operations. The Multisite Monitor window contains a main menu  
bar, work area, and scroll bars (see Figure 31). Vertical and horizontal scroll bars are generated automatically, as needed, for  
the work area.  
The work area portion of the screen is arranged in a row-column matrix with channel numbers along the rightmost and  
leftmost Y-axes and individual Site Monitor push buttons along the uppermost X-axis. It visually displays activity data for  
the maximum number of channels found on each monitored site.  
Text for primary and secondary assignments is displayed in white and black, respectively. A primary assignment is the  
site on which the call was originated. Secondary assignments are the other sites involved in the call.  
Confirmed and Forced calls may show multiple primary assignments.  
NOTE:  
For Multisite Monitor multinode traffic, outbound traffic from the node is displayed in a column representing the NIM,  
and inbound traffic to the node is displayed in a Device column. The MSM uses the Network Number to determine  
whichIMC, CEC, and Remote CEC to display columns for.  
The level of detail is limited. (For maximum call information, use the Site Monitor instead.) By default, the column  
headings are of the form Site X and Device X. These may be modified in the configuration file as described in LBI-39171.  
The main menu bar located at the top of the window contains three entries (refer to Figure 32):  
File  
Options  
Help.  
The File menu has only one option: Exit. The Exit button terminates the MSM application.  
Figure 31 - Multisite Monitor Display Example  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING REAL-TIME CALL ACTIVITY  
The Options menu has four options: Traffic Filter, Legend, Statistics Rows, and Quiet Drops. The Options menu is  
discussed in the next section. These options allow the user to customize the Multisite Monitor application to suit particular  
needs  
The Help menu also contains only one option: Overview. The Overview button provides a single help box documenting  
the overall functionality of the MSM application. Refer to the diagram below.  
These menu options may be selected via the mouse or keyboard mnemonics.  
12.1.1 Filtering Call Traffic  
The Traffic Filter button activates a separate filter window as depicted in Figure 33. The filter window is also a row-  
column matrix layout with filter types listed in the leftmost column, followed by columns for filter state (On/Off), filter color,  
and filter text. Within this menu option, the user is allowed to modify the traffic filter on/off states, filter colors, and filter text  
settings for each EDACS traffic filter listed. There are nine EDACS channel activity filter types: Emergency (EM),  
Individual (IN), Group (GR), Individual Data (ID), Group Data (GD), Individual to Telephone (IT), Telephone to Individual  
(TI), Telephone to Group (TG), and Control Channel (CC).  
Each filter contains an On/Off switch to control filtering. The default is On for all filter types. When the filter is On,  
each time an event of this filter type is received, the channel button corresponding to the channel where the event is occurring  
is modified in color and text as defined by the user for that event type. If the filter is Off, channel activity of that filter type is  
not sent to the screen.  
Each filter type has a color designation. There are 28 color options. Only one may be in effect at a time for a particular  
call type. The user’s color choice sets the background color for each channel button currently processing an event whose  
associated filter type is on. The color defaults for each filter type are provided at startup. The color option choices are  
identical to those given by HP’s xnmgraph utility, which is used to graph performance parameters in 2D line graphs.  
. Button activates a separate filter wondow which provides  
Traffic Filter  
the capability for the user to customize the Multisite Monitor application.  
Help  
File  
Options  
Traffic Filter  
. Displays a popup window containing the  
call type to color association.  
Legend  
Legend  
Statistics Rows  
Quiet Drops  
Turns ON/OFF the Total Channel Assignments, Total  
Queued Calls, Total Denied Calls, and Total System Busy display.  
Statistics Row.  
When disabled ( ) the display continues to display the textual information  
Quiet Drops.  
after the call is dropped. When enabled ( ) textual information will be removed when the  
call is dropped.  
Figure 32 - Multisite Monitor Menu Bar  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING REAL-TIME CALL ACTIVITY  
LBI-39169  
Each filter type also has a textual setting. There are five textual options. Only one may be in effect at a time for a  
specific call type.  
1. None  
No textual information is displayed.  
2. Filter ID  
3. Caller ID  
4. Callee ID  
5. Both IDs  
One- or two-letter default designation for filter type (Example: EM, IN, GR, ID, GD, IT, TI, TG, CC).  
Logical identification (LID) of caller.  
Logical/Group identification (LID/GID) of callee.  
Logical/Group identifications (LIDs/GIDs) of both caller and callee.  
The Control Channel filter has only two of these options: None and Filter ID.  
User-defined settings are not saved external to the application; therefore, the default settings are used upon MSM startup.  
Figure 33 - Traffic Filter Window  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING REAL-TIME CALL ACTIVITY  
12.1.2 Viewing Call Type Colors  
The Legend button activates a small window that serves as a key for the  
current Traffic Filter settings (see Figure 34). Beside each filter is a button  
that conveys the filter’s current state, color, and textual settings. If the filter  
state is Off, the button is black and states “Off.” If the filter state is On, the  
button color is set to the chosen filter color and the button text is set to the  
chosen filter text. No modifications can be made to the filter settings via the  
Legend window. The window is for informational purposes only.  
12.1.3 Displaying Site Statistics Rows  
The Statistics Rows toggle button (default is On) forces the site statistics  
rows to appear/disappear from the MSM main window. The Statistics Rows  
are located along the bottom of the MSM window. There are four different  
rows: Assigned, Queued, Denied, and System Busy. There is a box for each  
statistic under every monitored site. The Assigned box maintains a counter of  
all call assignments for a particular site. The other boxes maintain counters  
for queued calls, denied calls, and system busy calls. The counters begin at  
Figure 34 - Multisite Monitor Legend  
zero (0) when the MSM application is invoked. Use the toggle button on the Options menu to view statistics rows or remove  
them from the main window.  
12.1.4 Indicating Quiet Drops  
The Quiet Drops button, which defaults to “Off,” displays textual information for a call in a channel button on the screen  
even after the call has dropped (color is removed). When Quiet Drops are turned “On” via the Options menu, both call color  
and text are removed from a channel button on the screen when the call is dropped.  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MONITORING REAL-TIME CALL ACTIVITY  
12.2 USING THE SITE MONITOR APPLICATION  
LBI-39169  
The Site Monitor application monitors call activity for an individual site. The Site Monitor window contains a main  
menu bar, work area, and scroll bars (see Figure 35). All windows can be manipulated (i.e., resized, iconized, closed) via  
standard window border operations.  
The work area portion of the screen is arranged in a tabular format with channel numbers along the rightmost Y-axis. It  
displays activity data for specified channels. The activity data include channel number, current channel status (busy/free),  
time the call was initiated/dropped/keyed, caller ID, callee ID, call type, and phone digits (optional). Names of the caller and  
callee are not displayed. Primary and secondary assignments are shown.  
A primary assignment is the site on which the call was originated, and secondary assignments are the other sites involved  
in the call. For primary assignments, text is displayed in white. For secondary assignments, text for the entire row except  
channel number is displayed in black. The title bar for the window may be modified in the configuration file as described in  
LBI-39171.  
Scroll bars are generated automatically, as needed, for the work area.  
The main menu bar located at the top of the window contains three entries (refer to Figure 36):  
File  
Options  
Help.  
The File menu has only one option: Exit. The Exit button terminates the Site Monitor application.  
The Options menu contains five options: Statistics Rows, Phone Digits, Fine Timing, Quiet Drops, and Keying Updates.  
These options allow the user to customize the Site Monitor application to suit particular needs.  
The Help menu also has only one option: Overview. The Overview button provides a single help box documenting the  
function of the Site Monitor application.  
These menu options may be selected via the mouse or keyboard mnemonics.  
Figure 35 - Site Monitor Display Example  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
MONITORING REAL-TIME CALL ACTIVITY  
Turns ON or OFF the Statistic Row  
Statistics Rows.  
displaying Last Queued Call, Last Denied Call, Last  
System Busy Call and last Convert-to-Callee Call.  
Help  
Options  
File  
Statistics Rows  
Phone Digits  
Fine Timing  
. When enabled, adds an additional column displaying the  
phone digits of the outbound call (radio to telephone) originating at this  
site.  
Phone Digits  
. By default time is diaplayed as HH:MM:SS. Enabling  
Fine Timing  
Quiet Drops  
Fine Timing add hundredths of a second to the display.  
Keying Updates  
When disabled ( ) the display continues to display the  
Quiet Drops.  
textual information after the call is dropped. When enabled ( ) textual  
information will be removed when the call is dropped.  
. When enabled, call time will be updated whenever a  
Keying Updates  
key is received from a radio. Otherwise, call time is updated only at call  
assignment and call drop.  
Figure 36 - Site Monitor Menu Bar  
12.2.1 Turning On Statistics Rows  
The Statistics Rows toggle button (default is On) forces the call statistics rows to appear/disappear from the bottom of the  
Site Monitor main window. There are four different rows: Queued, Denied, System Busy, and Convert to Callee. There is  
one row for each statistic. Each statistic row displays call information (i.e., Time, Caller, Callee, Call Type) for the last call  
that was queued, denied, system busy, or convert to callee. The information for these rows is blank at startup. Use the toggle  
button on the Options menu to view statistics rows or remove them from the main window.  
12.2.2 Adding The Phone Digits Column  
The Phone Digits toggle button forces the phone digits column to appear/disappear from the Site Monitor main window.  
The Phone Digits button, which defaults to “Off,” does not display the Phone Digits column on the main window of the  
screen. When the Phone Digits option is turned “On,” the phone digits column appears on the screen for displaying the  
telephone digits dialed by the caller. Phone digits will be displayed for radio-originated calls on the site of origination.  
12.2.3 Setting The Time Fields  
The Fine Timing toggle button forces the time fields to either seconds or milliseconds. The Fine Timing button, which  
defaults to “Off,” displays call time in hour:minute:second format. When Fine Timing is turned “On,” call time is displayed  
in hour:minute:second:millisecond format.  
12.2.4 Enabling Quiet Drops  
The Quiet Drops button, which defaults to “Off,” displays textual information for a call in a channel button on the screen  
even after the call has dropped. When Quiet Drops are turned “On” via the Options menu, text is removed from a channel  
button on the screen when the call is dropped.  
12.2.5 Changing Phone Call Keying Update Parameters  
The Keying Updates toggle button forces radio keying to update/unaffect the time field displayed for a phone call. The  
Keying Updates button, which defaults to “Off,” updates call time only at call assignment and call drop. When Keying  
Updates is turned “On,” radio keys and unkeys update the call time for telephone calls.  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING OPENVIEW NETWORK NODE MANAGER  
LBI-39169  
13. USING OPENVIEW NETWORK NODE MANAGER  
This section briefly describes some of the features available through OpenView Network Node Manager. We suggest the  
you become familiar with the HP OpenView Network Node Manager User’s Guide. This guide contains detailed  
instructions for performing the task listed. The Network Manager application leverages the OpenView Network Node  
Manager to the fullest extent to achieve maximum similarity between our application and the customer’s other OpenView  
Network Node Manager applications. Refer to the OpenView Network Node Manager documentation for a complete listing  
of features.  
13.1 LOADING/UNLOADING MIBS  
OpenView provides the mechanism to load/unload MIBs via the Options->Load/Unload MIBs main menu selection. By  
default, the EDACS MIBs are automatically loaded into OpenView.  
13.2 VIEWING/GRAPHING PERFORMANCE PARAMETERS  
NOTE  
MIBs must be loaded to perform these operations.  
Several menu selections are provided to graph the EDACS MIB items thought to be of most common interest via the  
EDACS -> Performance menu bar. However, numerous additional MIB variables are available. See the OpenView NNM  
User’s Guide sections titled Viewing MIB Values and Setting MIB Values for procedures on using the MIB Browser to read  
and write MIB values. The MIB Browser provides the capability to graph individual MIB objects.  
13.3 ADDING CUSTOM MENU ITEMS  
Custom menus are realized using OpenView Network Node Manager’s MIB Application Builder. The MIB Application  
Builder enables the easy development (without programming) of MIB applications for Internet-standard and enterprise-  
specific (i.e., specific to a given vendor) MIB objects, and integration of the applications into the HP OpenView Network  
Node Manager Windows menu bar. The custom menu item created may involve submenu items; therefore, all the user’s  
custom-built additions may exist under one main menu bar item.  
For custom selection, the MIBs Application Builder provides a list of the available performance values for the selected  
object(s) available for display via a menu item. Each performance value in the list contains the actual SNMP MIB variable  
name, its object ID, and a short description. The user may select one or more values from this list to monitor. Items for a  
custom selection must be from the same MIB, and all instances of the object are selected.  
This feature is useful for MIB variables of interest on a periodic basis. Custom menu items may be built to view the MIB  
values. OpenView Network Node Manager has a MIB Application Builder to make this task relatively easy. See the  
OpenView NNM User’s Guide section titled Building MIB Applications.  
NOTE  
The MIB Application Builder allows data to be displayed in form, table, or graph format, but does not allow the  
modification of MIB data. The MIB Browser is used to modify MIB data.  
13.4 COLLECTING AND GRAPHING PERFORMANCE DATA  
Data may be collected at regular intervals and saved to the /usr/OV/database/snmpCollect directory. The data are  
readable by xnmgraph. Note that performance data may be saved without graphing. If a graph is later invoked via the MIB  
browser, all of the previously collected data will be read in to xnmgraph and may be scrolled. See the OpenView NNM  
User’s Guide section titled Collecting MIB Data.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
USING OPENVIEW NETWORK NODE MANAGER  
13.5 THRESHOLD TRAPS ON COLLECTED DATA  
The user may specify the generation of an event based upon the value of a monitored performance parameter or that  
parameter’s exceeding a user-defined threshold. For example, the user may wish to be notified via a popup message (or e-  
mail) if the percentage of queued calls on a site reaches a certain value or goes above a specified threshold. This may be  
accomplished by selecting Options -> Data Collection.  
When a collected MIB value exceeds a threshold value, a trap is generated. A rearm mechanism exists to avoid  
continuously generating events. This feature is a subset of the Collecting MIB Data feature. See OpenView NNM User’s  
Guide sections titled Collecting MIB Data and Defining Thresholds.  
13.6 VIEWING HISTORICAL TRENDS  
Collected MIB data may be graphed later. The graph tool provided with OpenView Network Node Manager also allows  
the user to manipulate the data. See the OpenView NNM User’s Guide section titled Viewing Historical Trends.  
13.7 EVENT HISTORY  
The OpenView Network Node Manager Event Browser can generate a report listing the past and present events. The  
Event Browser updates in real time, i.e., incoming alarms associated with that object or its children are immediately updated  
to the display. The report consists of entries describing the event source, time of occurrence, severity level, and type. The  
user may filter the event history report based upon the source, severity level, a specified time range, and/or event type. Any  
generated report can be saved to a user-specified file, and/or may be output to the printer. The Event Browser is  
automatically opened when OpenView comes up. It may also be invoked from Monitor->Events: SNMP. All received event  
entries that have been configured to be logged are written to a single file on the hard drive.  
13.8 CUSTOMIZING EVENT MESSAGES AND ACTIONS  
The event log message may be modified. In addition, the user  
may add his own specific text to the event comment field. The  
criticality level and category of the event may also be changed. In  
addition to affecting icon color, actions may be associated with  
events, such as paging, audible notifications, or other executables.  
See the OpenView NNM User’s Guide section titled Defining  
Actions for Events.  
Updates of the EDACS application  
NOTE:  
will overwrite the event description (connect) field.  
In the following example a burst of short beeps is associated  
with an SNMP event:  
1. From the OpenView menu bar, select the  
Options-  
menu item.  
>Event Configuration:SNMP  
2. Select the enterprise that the sources the event. For  
example, System Manager, IMC Manager, PI, etc.  
3. Select the event of interest.  
4. Click on the Modify button, OpenView will display the  
Modify Event dialog box as shown in Figure 37.  
5. Enter the following UNIX command line in the  
“Command for Automatic Action (Option)” field:  
/usr/OV/contrib/NNM/ringBell/rin  
gBell dontLog ""  
Figure 37 - Modify Event Screen  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING OPENVIEW NETWORK NODE MANAGER  
LBI-39169  
The ringBell utility takes two arguements. The value of the auguments are insignificant as long as the format is  
correct.  
ringBell <selectionName> <message in quotes>  
The ringBell utility performs two actions. It sounds the bursts of beeps and it sends an SNMP event to this  
management station using the OpenView enterprise specific trap OV_Bell_Message. If the logging of the  
OV_Bell_Message is undesirable, the Event Configuration feature may be used to set the category for this trap to  
"don't log or display".  
6. Click on OK to save the changes.  
13.9 BACKGROUND GEOGRAPHICAL MAPS  
HP OpenView Network Node Manager provides the capability to assign a CompuServe Graphic Interchange Format  
(GIF ) file or an X11 monochrome bitmap format (XBM) file as the background for network maps. OpenView Network  
Node Manager ships with the set of standard image files shown below. These images are the only maps that Ericsson  
provides. The installer is responsible for selecting the appropriate maps at installation time or purchasing any additional maps  
(in the form of GIF or XBM files) desired.  
all 50 U.S. states  
major Canadian provinces  
western hemisphere  
continents  
countries in Europe, Asia, and the Pacific  
The images that are provided are simple outlines located in usr/OV/backgrounds.  
When a background graphic is added, the graphic appears in the submap window. Symbols in the submap appear over  
the background graphic file. Users and applications can specify a background graphic for each submap.  
13.10 MAP SNAPSHOTS  
Creating a map snapshot preserves the state of the network at the moment the snapshot was created. Snapshots can be  
created, listed, opened, closed, deleted, and described. Snapshots can not replace the current map. Snapshots are intended for  
historical purposes, not restorative purposes. See the OpenView NNM User’s Guide section titled Taking Snapshots of the  
Map.  
NOTE  
Snapshots may consume noticeable amounts of memory.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
USING OPENVIEW NETWORK NODE MANAGER  
13.11 MULTIPLE EDACS NETWORK MANAGER SESSIONS  
OpenView Network Node Manager supports multiple login sessions. Multiple sessions can be accomplished by using an  
X-Station or by using a PC running PC Xware.  
Certain restrictions apply in situations where multiple users are logged in using OpenView Network Node Manager. The  
main restriction is that only one user gets full map read-write access. All other simultaneous users of OpenView NNM get  
read-only map access. See LBI-39171, EDACS Network Management Installation and Technical Reference Manual, for  
information on restricting write access to OpenView.  
The read version of OpenView will see icon status updates and be able to perform the following operations:  
Event Configuration  
IPMAP polling  
Application Builder  
MIB Browser  
MIB loading/unloading.  
The main ramification of this restriction is that a read-only map cannot be edited. The effect of this is that during a read-  
only OpenView Network Node Manager session, any changes in map topology are not reflected; i.e., any newly discovered IP  
Network Elements are not shown to the read-only user. However, this also means that the user may not move icon positions  
on maps or delete/add icons. The customer may therefore designate the write privilege for an administrator and the read-only  
privilege for general users.  
The read-only user continues to see Network Element status changes through icon color changes. Also, a read-only user  
can still run management applications to monitor performance and change configuration on Network Elements.  
Remote login is supported via an X-session from the remote device to the EDACS Network Manager. This is available  
over a LAN or via a terminal server with modem (using SLIP or PPP). Due to memory constraints, the maximum number of  
remote sessions available at one time is dependent on the EDACS Network Manager option chosen. Refer to the Remote  
Access section in the Installation manual, LBI-39171.  
13.12 INTEGRATION WITH OTHER NETWORK MANAGER APPLICATIONS  
OpenView Network Node Manager provides the mechanism for allowing multiple applications to be registered with it via  
Application Registration Files (ARFs). In order for the EDACS Network Manager to be interoperable with other OpenView  
Network Node Manager-based applications, all applications must be registered with OpenView Network Node Manager. The  
ARF provides information to OpenView Network Node Manager on how to integrate the application into the menu structure,  
how to invoke the application, and how to manage the application.  
The EDACS menu co-exists with all other menus, including those added by another EDACS NM application. The user  
of the EDACS Network Manager can manually place icons from another application into EDACS NM maps or vice versa.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING OPENVIEW NETWORK NODE MANAGER  
LBI-39169  
13.13 CUSTOMIZING ICONS  
13.13.1 Icon Labels  
NOTE  
Modifications to fields other than “Label” in the Symbol Description are not supported and may adversely affect  
system behavior.  
To change icon labels, depress the right mouse button while positioned on the icon and select Describe/Modify Symbol.  
Enter the information in the “Label” field.  
13.13.2 Object Descriptions  
To add object descriptions to the underlying database, depress the right mouse button while positioned on the icon and  
select Describe/Modify Object. Enter the object description in the “Comments” field. The object description might include  
the name of the person responsible for the equipment, etc.  
Note that if there are multiple icons associated with the database object, all symbols will have access to the description.  
13.13.3 Icon Bitmaps  
Icon bitmaps may be modified, but doing so is not recommended. HP-UX has an icon editor tool which may be used to  
easily tailor the bitmap. The  
registration files provide the association of symbol to bitmap.  
/usr/OV/symbols/C/EDACS  
Each bitmap is composed of a pixel and mask file. The pixel bitmap is new_bm.38.p and the mask bitmap is new_bm.38.m.  
If the EDACS bitmaps in are modified, they can be restored from . Bitmaps of  
/usr/OV/bitmaps/C  
/usr/EDACS/bitmaps/C  
sizes 38, 32, 28, and 20 are required to handle various sized icons which occur with window resizing.  
13.14 LOADING MIBS  
OpenView comes preloaded with RFC-1213 (MIB II) and HP-UNIX MIBs only. EDACS MIBs will be automatically  
loaded when the edacsInstall utility is run. Please refer to the “Loading MIBs” section in the HP OpenView Network Node  
Manager User’s Guide for detailed information.  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
PROCEDURES  
14. PROCEDURES  
14.1 REBOOTING THE NETWORK MANAGER  
From the root profile enter:  
> /etc/shutdown -r now  
14.2 SYSTEM SHUTDOWN PROCEDURES  
Use the following procedure to properly shutdown the Network Manager system.  
CAUTION  
Stopping the system improperly can corrupt (damage) the file systems. Never stop the system by turning it off.  
1. Log out of all software applications. You should be at the log-in prompt. If you have a VUE Login prompt, select  
Options -> No Windows.  
2. Change to the root directory.  
> cd /<ENTER>  
3. Ensure no one else is logged in by entering the following command:  
> users <ENTER>  
Ensure no other users, other than yourself, are listed on the display.  
4. At the prompt enter the shutdown command:  
> /etc/shutdown -h  
<ENTER>  
5. Watch the messages during the process and note actions.  
The system is completely shutdown when the system displays “HALTED” and pressing a key has no effect.  
6. After the system has halted, it is safe to turn off the equipment, starting with the computer/server.  
14.3 DEVICE POLLING INTERVAL  
The EDACS Network Manager Application may be initialized for the interval between polls for missed events detection  
and for the Node to which the EDACS Network Manager application should synchronize the clock.  
The device polling interval is defined as the time (in seconds) between polls of each device. A device is considered to be  
any of the following:  
Integrated Multisite and Console Controller (IMC)  
Console Electronics Controller (CEC)  
StarGate Controller  
IMC Manager  
System Manager  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PROCEDURES  
LBI-39169  
Console  
Jessica PBX Interface (PI)  
Billing Correlation Unit/ Centralized Activity Logger (BCU/CAL)  
NOTE: The site devices are not included in this list. Their status is obtained through the System Manager Proxy Agent.  
The EDACS Initialization attribute section of the popup associated with the “EDACS Top Icon” Describe/Modify  
operation specifies the clock and device polling intervals.  
14.3.1 Polling Interval Setup  
The number of polls per device varies depending upon the device. In addition, some devices have summary status  
capability. If the summary indicates an active trap, further polling is enacted to determine which conditions are active.  
To determine the frequency by which an individual device is polled, one must multiply the interval by the number of  
polled devices in the EDACS network.  
The following equation may be used to determine the time between successive polls of the same device:  
Device Polling Interval(s)  
×Devices =Time between Device Successive Poll(s)  
Device  
By default, status polling is disabled. The device polling interval is associated with the EDACS top container icon.  
Polling parameters associated with EDACS Top level Icon (looks like a world globe) can be modified on icon add or  
modified using procedure to describe EDACS identifiers.  
NOTE  
We strongly recommend setting the polling interval to a value of 30 seconds or more. If the interval level is set  
below this value, and multiple Network Manager stations are polling the System Manager, there may be an increase  
in the number of SNMP “sets” failures. This results from the frequency of polling requests exceeding the System  
Manager’s response time.  
14.3.2 Clock Synchronization  
The Node Number of the CEC/IMC Manager is set to act as clock synchronization source. The default is that the  
Network Manager will not synchronize to any Node.  
14.3.3 Clock Polling Interval  
The clock polling interval is defined as the time (in minutes ) between successive polls.  
14.4 MODIFYING EVENT DESCRIPTIONS  
1. From the OpenView Menu bar, select Options->Event Configuration: SNMP.  
2. Select the enterprise that sources the event. For example, Sysman, IMCMan,etc.  
3. Select the event of interest.  
4. Click on the Modify button.  
5. Click OK to save the changes.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
PROCEDURES  
14.5 ADDING SYMBOLS TO EDACS MAPS  
Use the following procedure to add symbols to the EDACS Maps.  
To drag a symbol onto an OpenView Network Node Manager Map,  
1. Select the  
Menu item from the OpenView Network Node Manager main menu bar. An Add  
EDIT-> Add Object  
Object Palette window appears.  
2. Scroll through the Symbol Classes until the EDACS class appears.  
3. Double click on the EDACS Symbol class and the individual EDACS symbols appear.  
4. Position the mouse over the symbol of interest, press the middle mouse button, and drag the symbol onto the desired  
map.  
5. Depress the mouse, and the popup window appears.  
6. Select the “EDACS Map Generation” attribute section and “Set Object Attributes.” Fill in the identifiers and any  
other applicable fields. The Help button provides on-line help to for field meanings.  
7. Follow the on-line OpenView NNM help to fill in the remaining window fields.  
8. Notably, the selection name specifies the database key for the object represented by the symbol. Therefore, the  
selection name must be unique for all objects. The one exception is the selection name for directly connected  
EDACS elements - BCU/CAL, PI, EDG, System Manager, and CEC/IMC Manager. Directly connected elements  
must have their selection name equal to the one found by IPMAP. IPMAP will use the host name by preference but  
will use the IP Address if it cannot determine the Host Name.  
After the symbol is added, it may need to be connected to another symbol using the Adding a Connection procedure,  
which is presented below.  
14.6 DELETING SYMBOLS  
Use the following procedure to delete a symbol from the OpenView map.  
1. Select the symbol with the left mouse button.  
2. Select the  
menu item from the OpenView main menu bar.  
EDIT->Delete->From All Submaps  
A Delete Object warning popup will appear.  
NOTE  
To delete a symbol that has a submap, select  
. Selecting  
EDIT->Delete->From All Submaps  
EDIT->Delete->From this  
to delete a symbol will cause the symbols on the submap to be orphaned and remain in the OpenView database. To  
Submap  
access orphaned submaps, do  
procedure.  
which will list all submaps, then perform the Deleting Orphaned Submaps  
Edit->Submap  
14.7 ADDING A CONNECTION  
When an EDACS icon is manually added for a directly connected EDACS element, the selection name must equal the IP  
Address of the element. The following elements are directly connected EDACS elements: PI, BCU/CAL, CEC/IMC  
Manager, and System Manager. This ties the EDACS icon with the EDACS capabilities to the object created by IPMAP, the  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PROCEDURES  
LBI-39169  
HP application which finds IPs. It is also possible that directly connected elements may be added prior to their discovery by  
the IPMAP application. Care must be taken to ensure that the object created is also used by IPMAP. Not only must the  
selection name equal the IP address, but the IP Host Name must equal the Host Name that IPMAP will find. Note that by  
associating the EDACS icon with the same object defined by the IPMAP application, the directly connected element will have  
a child submap containing icons representing the interfaces defined in MIB-II (i.e., the IP interface group will have an icon).  
The parent of this child submap is in the IPMAP screens, not the EDACS-created screen. This feature can aide in network  
connection debugging. Namely, to see where this element is in the overall network, enter the IP child map and select the  
"parent" button.  
Use the following procedure to add a connection between two symbols on an OpenView map  
1. Select the EDIT->Add Connection menu item from the OpenView main menu bar. An Add Connection window  
will appear.  
2. Select the representation for the connection type by clicking on the representation with the left mouse button.  
3. The Add Object window appears.  
4. Select the source symbol.  
5. Select the destination symbol.  
14.8 CUSTOMIZING MSM/SM SITE/DEVICE LABELS  
Use the following procedure to customize the site or device labels.  
1. As root user perform the following:  
> cd /usr/EDACS/nls/C <ENTER>  
2. Edit the MSM message file, /usr/EDACS/nls/C/msm_msg.msg or the SM message file,  
/usr/EDACS/nls/C/sm_msg.msg, to reflect the new label(s).  
> chmod 777 /usr/EDACS/nls/C/msm_msg.msg <ENTER> (MSM message file)  
or  
> chmod 777 /usr/EDACS/nls/C/sm_msg.msg <ENTER> (SM message file)  
3. Invoke the vuepad and edit the files as required. See the following examples.  
For example, if you want to change the label for site 1 from “Site 1” to “Candlers” change the line for site 1 as  
follows:  
As reads:  
25014 “Site 1” Site_1_label  
Change to read: 25014 “Candlers” Site_1_label  
NOTE  
There is only one Site X label. Modification of the Site X label will be reflected in all nodes. Remember, Site labels  
may be up to eight (8) characters long and Device labels may be up to ten (10) characters long.  
To change a device label for site 1 from “Device 33” to read “Dallas” change the line as follows:  
As reads:  
15021 “Device 33” Device_33_label  
Change to read: 15021 “Dallas” Device_33_label  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
PROCEDURES  
4. Enter the following command to restore permissions.  
> chmod 444 /usr/EDACS/nls/C/msm_msg.msg <ENTER> (MSM message file)  
or  
> chmod 444 /usr/EDACS/nls/C/sm_msg.msg <ENTER> (SM message file)  
5. As the root user, generate new catalog files by executing the following :  
> /usr/EDACS/bin/edacsMsgUpdate  
6. Test changes by invoking MSM and SM.  
14.9 ADDING DESCRIPTIONS TO OBJECTS  
This procedure requires you to be logged into a write version of OpenView.  
1. Position the mouse over the desired icon and depress the right button.  
2. Select the “Describe Modify Object”  
3. Make desired changes or add text to the “comment” field.  
NOTE  
Changing the “Selection Name” is not recommended. The Selection Name is used as the database key.  
4. Select OK when done.  
14.10 DELETING ORPHANED SUBMAPS  
This procedure describe the process for deleting orphaned submaps for OpenView.  
1. From the OpenView menu, select Edit -> Submap ->OPen/List...  
2. A “Submaps in Map” popup with Submaps scroll box will appear.  
3. Select the submap believed orphaned and click on the “Open Submap” button to bring up the submap.  
4. On the opened submap, click on the “Parent” button to verify there is no parent map.  
5. Ensure the orphaned submap is highlighted, go to the “Submaps in Map” dialog box and click on the Delete button.  
The submap will be deleted.  
14.11 VERIFYING AN OBJECT WAS DELETED FROM THE OPENVIEW DATABASE  
Selecting an explodable icon and selecting EDIT->Delete->From this Submap rather than EDIT->Delete->From all  
Submaps can orphan objects in the OpenView database which affects the performance of the system. To determine if a file  
contains orphaned objects, perform the following:  
1. Enter:  
> /usr/OV/bin/ovobjprint | more.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PROCEDURES  
LBI-39169  
The beginning of this output will list the number of objects in the database. There should be roughly three times the  
number of EDACS elements.  
2. Enter:  
> /usr/OV/bin/ovobjprint > Filename  
This will output the contents to a file called “Filename.”  
3. The individual objects can be viewed in “Filename.”  
14.12 VIEWING/MODIFYING EDACS IDENTIFIERS  
To view/Modify that the EDACS identifiers are correctly associated with an icon, perform the following:  
1. Select the icon using the left mouse button, and then select the Monitor ->Description->Selected Object menu item  
from the OpenView main menu bar.  
2. Choose the EDACS Identifiers attributes. The identifiers will be listed.  
3. Press the View/Modify Object Attributes button.  
OR  
1. Select the icon, depress and hold down the right mouse button.  
2. Move the mouse to the Describe/Modify Object...menu option and release the mouse button.  
3. Select the EDACS Identifiers Object Attributes and press the View/Modify Object Attributes button.  
14.13 VIEWING/MODIFYING TRAP SEVERITY LEVELS  
Use the following procedure to view or modify trap severity levels.  
1. Select the EDACS->Faults->Configuration menu item to invoke the OpenView event configuration.  
2. Select the enterprise of the agent reporting the traps, and the traps defined for the agent will be displayed in the  
middle window. The severity level will be displayed in the middle window along with the trap name. The first  
characters of an EDACS trap name conventionally are an acronym of the device against which the trap is placed.  
3. Select the event which has the severity level to change and choose the Modify button. A new window will pop up  
with the severity levels in the lower right-hand corner.  
4. Click on the severity button and a pulldown menu will display choices.  
5. Select the OK button to exit this popup and click on the Apply button on the Event Configuration window for the  
changes to take effect.  
14.14 MODIFYING EVENT DESCRIPTIONS  
To modify the event descriptions you must bring up the OpenView Event Configuration application.  
1. Select EDACS->Fault->Configuration from the EDACS menu bar.  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
PROCEDURES  
2. Select the enterprise of the agent reporting the traps, and the traps defined for the agent will be displayed in the  
middle window. The severity level will be displayed in the middle window along with the trap name. The first  
characters of an EDACS trap name conventionally are an acronym of the device against which the trap is placed.  
3. Click on the Modify button and a window will popup.  
4. Modify the text as required. NOTE: Modifications will be overwritten when the application is upgraded.  
5. Select the OK button to exit this popup and click on the Apply button on the Event Configuration window for the  
changes to take effect.  
14.15 RESTORING DEFAULT EVENT DESCRIPTIONS  
To restore the default event descriptions execute the following command:  
> /usr/OV/bin/xnmevents -load /usr/EDACS/conf/C/ed_trapd.conf  
14.16 MAPPING SEVERITY LEVEL TO ICON COLOR  
1. Select Help->Display Legend from the OpenView main menu bar, this will provide a graphical display of the icons  
and their associated colors.  
14.17 CREATING A FULL SYSTEM IMAGE BACKUP  
To create a full system image backup, perform the following steps:  
1. As root user: Use console login.  
> /etc/shutdown now <ENTER>  
System will shutdown and come back up in single-user mode. If asked what terminal type, press <Enter>  
2. Insert the tape into the tape drive (assume device name = /dev/rmt/0·m).  
> cd / <ENTER>  
> tar -cvf /dev/rmt/0·m. <ENTER>  
NOTE  
One 90mm tape should handle the entire backup and the backup process will take approximately one hour to  
complete.  
When the backup is complete, carefully label all System Image backup tapes as “Sysddmmmyyyy Vol # (number of  
this tape) of # (total number of tapes it took to complete the backup)”.  
For example: Sys12DEC1994 Vol 1 of 4.  
3. Enter the following command to reboot the workstation.  
> /etc/shutdown -r now <ENTER>  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PROCEDURES  
LBI-39169  
14.18 RESTORING A FULL SYSTEM IMAGE FROM THE BACKUP  
To restore a full system image from the backup, perform the following steps:  
1. As root user: Use console login.  
> /etc/shutdown now <ENTER>  
System will shutdown and come back up in single-user mode.  
2. Insert the tape into the tape drive (assume device name = /dev/rmt/0·m).  
> cd / <ENTER>  
> tar -xvf /dev/rmt/0·m . <ENTER>  
3. Reboot the workstation as shown below.  
> /etc/shutdown -r now <ENTER>  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TROUBLESHOOTING  
15. TROUBLESHOOTING  
This section presents various methods for solving technical difficulties with the Network Manager.  
15.1 CD-ROM DOES NOT WORK  
Problem: /etc/update exits with error that all devices are not mounted.  
Solution:  
The /etc/checklist file should have only list the hard drives. The Tape Drive and CD-ROM drive should not be  
listed in it. If peripherals are listed in this file, then updates will not work.  
Procedure to access CD-ROM:  
The CD-ROM is mounted when there is a disk in it using the mount /dev/dsk/c201d2s0 /cdrom  
command. Once mounted, the /cdrom directory is accessed like any other directory. The disk cannot be  
removed until an umount /dev/dsk/c201d2s0command is performed.  
15.2 MSM/SM DOES NOT SHOW PI TRAFFIC  
Problem: MSM/SM does not show PI traffic, but shows Group and ICall traffic.  
Solution:  
Do traf -e -sXon the PI or stat -e -sXon the BCU/CAL where X is the PI Site_Id. If is shows that  
the packets the PI received were errored with Null Caller ID then check the Line database definition for the PI  
site in the System Manager. If the Line is enabled and the LID is 0, this is invalid and causes this problem. If  
there is only one PI in the Network all lines should be N. In a multinode PI configuration, the Line database  
must have a unique LID assigned for each PI line. See LBI 39000A.  
15.3 ATTEMPT TO LOG IN FAILS  
Problem:  
When the disk fills up, the following situations occur:  
All users who attempt to log in will be in the root directory (/).  
None of the user’s initialization files will be executed, i.e., the environment variables (such as $path)  
may not be set correctly, and the general appearance of the screen will seem unusual.  
Any process that tries to write to disk is likely to hang (this includes almost all processes).  
The message “Cannot write to file: disk system full” will appear at the bottom left corner of the screen  
at the console. If the user is not at the console, he may not see the error message. If a remote user  
notices odd behavior, he should check for error messages on the screen that is connected as the console.  
Solution:  
Most likely, the log files have grown too large. Delete the log files in /usr/EDACS/logs/filename. DO NOT  
ERASE edacs.log. Also, periodically check /usr/netls/log_file and /usr/OV/log/trapd.log and delete files as  
necessary.  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
LBI-39169  
15.4 EDACS ICON IS BLUE  
Problem:  
The EDACS icon is blue.  
Solution:  
A blue icon indicates that the element is not managed by the EDACS Network Manager application. This can  
happen if another icon is added with the same EDACS Identifiers as this one. To view the EDACS Identifiers,  
select the icon and press the right mouse button. Keep the right mouse button depressed and move the mouse to  
the Describe/Modify Object... menu item and release the mouse button. Select the EDACS Identifiers Object  
Attributes and press the View/Modify Object attributes button. To map severity level to icon color, select Help-  
>Display Legend from the OpenView main menu bar to display the legend.  
15.5 EDACS ICON IS BROWN  
Problem:  
The EDACS icon is brown.  
Solution:  
A brown icon indicated that the element is restricted. An icon is restricted if there is no licensed CEC, Remote  
CEC, IMC, or StarGate with the same Network Number and Node Number. An icon may also be restricted if it  
violated a CEC/RCEC/IMC/StarGate licensing node. An RCEC allows 0 sites, a CEC allows 1 site (maximum),  
an IMC allows >1 site, and a StarGate allows 0 sites.  
15.6 RPC FAILURES  
Problem:  
Remote Procedure Calls are failing.  
Solution:  
The RPCs may be failing because the hostname for contacting the license server daemon is not defined. There  
are two options for defining the hostname. In one option, set the EDACS_LICENSE_SERVER variable by  
entering the following information at the UNIX prompt: setenv EDACS_LICENSE_SERVER . If  
hostname  
this variable is set, the client processes will use the defined hostname to contact the license server daemon. If  
the EDACS_LICENSE_SERVER variable is not set, then the second option for defining the hostname is  
assumed. In the second option, check the localhost variable in the /etc/hosts table to ensure that the variable is  
defined. If the variable is not defined, enter 127.0.0.1 in the host table.  
15.7 MAP GENERATION VERIFY OPERATION IS NOT WORKING PROPERLY  
Problem:  
The Map Generation Verify operation sometimes does not work on a Describe/Modify operation unless one of  
the parameters is changed.  
Solution:  
There is an OpenView anomaly which sometimes requires the user to modify one of the dialog box fields before  
the Verify button will accept identifier values. Whether the Verify button works depends on which icons are  
present on the map. If a CEC Node, an RCEC Node, and an IMC Node exist on the same map (with or without  
the same Network and Node Numbers), the first two of these three icons asked to perform a Describe/Modify  
operation will work properly. The Verify button for the third icon will not accept the identifiers values until one  
has been changed (or at least deleted and reentered).  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TROUBLESHOOTING  
15.8 POPUP STATES NO NODE LICENSE  
Problem:  
This popup will occur either if there is no node license or if there is no application license.  
Solution:  
Use ls_stat to determine if either of these conditions exist.  
15.9 PERFORMANCE NOT SHOWING TRAFFIC  
Problem:  
No traffic indicated on MSM, SM, or 2D line graph.  
Solution:  
Traffic is as seen on by the IMC. Therefore, site only traffic such as denies and local interconnect will not be  
seen. If no traffic is seen the NM and BCU/CAL/PI may not be time synched. Log into the BCU/CAL. Do  
stat-e-sx, where x is a site tour radio is on. If bad time stamp is indicated, check source of MOM PC clock.  
15.10 POOR SYSTEM PERFORMANCE  
Problem:  
System is slower than usual.  
Solution:  
1. IPMAP autodiscovery may be enabled. From the OpenView Main menu select Options -> Topology/Status  
Polling:IP and turn off the polling Master switch (raised button).  
2. Do ps -ef | grep edacs  
Only one instance of each of the following three processes will be running an a NMS:  
root 196 186 0 Sep 16 ?  
root 299 1 0 Sep 16 ?  
root 301 1 0 Sep 16 ?  
3:45 edacs_nm  
0:00 /usr/EDACS/bin/edacslog  
1:48 /usr/EDACS/bin/edacs_licservd  
There will be one instance of each of following three processes running for each user. If there are more  
processes than simultaneous users, a user could have improperly exited and left processes running with no  
UI attached.  
guest 20060 20059 0 07:10:44 ?  
guest 20061 20059 0 07:10:44 ?  
guest 20062 20059 0 07:10:44 ?  
0:00 /usr/EDACS/bin/edacsd  
0:00 /usr/EDACS/bin/edacsi  
0:00 /usr/EDACS/bin/edacsm  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
LBI-39169  
15.11 APPLICATION DOES NOT RESPOND TO VERIFICATION REQUEST WHEN  
ADDING ICON  
Problem:  
Application does not respond to Verification request when adding icon. When hit verify a second time,  
OpenView will not call application again.  
Solution:  
Must modify a field, even if setting it to the same value, before OpenView will send request to the application  
again.  
15.12 IFOR/LS CONFUSED  
Problem:  
When the IP address of an Network Manager box is modified after our application has been installed, IFOR/LS  
will be confused.  
Solution:  
Perform the following instructions to restore IFOR/LS to a working configuration (must be root user):  
Be sure there are no other users on the system.  
> users  
Stop OpenView, EDACS NM application, and IFOR/LS servers.  
> /usr/OV/bin/ovstop  
> /usr/EDACS/bin/ks  
> /usr/lib/netls/bin/srv_stop  
3. Reconfigure IFOR/LS. (Reference the NM Installation LBI procedure.)  
> cd /usr/lib/netls/conf  
> ./netls_config  
When prompted whether or not to use the existing global database found on the system - Answer NO. Answer  
all other questions as done during the initial installation.  
NOTE  
Reference the NM Installation LBI procedure for Licensing Run Time Kit Setup and Installation.  
15.13 SYSTEM MANAGER SNMP “SETS” FAILING  
Problem:  
System Manager exhibits an increased number of SNMP “sets” failures when multiple Network Manager  
stations are polling the System Manager.  
Solution:  
The System Manager SNMP “sets” are used to control trap generation on the System Manager by setting its trap  
control objects. If multiple Network Managers are polling the System Manager with intervals of less than 30  
seconds, the System Manager may be unable to keep up with the requests. Check the polling intervals on the  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
TROUBLESHOOTING  
Network Manager stations and ensure the interval is set to a value of 30 seconds or more. This will significantly  
reduce the number of nuisance failures.  
15.14 IMC DETECTED LINK FAILURES  
Problem:  
The IMC reports a link failure.  
Solution:  
For link fail tests involving all controller types (MIM, PIM, etc.), the steps below will help to identify the  
defective controller board.  
On the CEC/IMC Manager For NT, display the nodes map. All boards managed by this IMC should appear  
on the screen with the appropriate status icon. For example, to perform a MIM fail link trap test, click on  
the MIM icon. Another menu appears when the user selects the “controller” box and then “send.” Next, go  
to the switch and determine which controller board’s LED is flashing. This step is useful only when boards  
and cables are not properly tagged or labeled.  
After finding the correct board, go to the back of the switch and carefully pull the cable to that controller  
board. Within 10 seconds, the status of the appropriate controller board icon on the CEC/IMC Manager  
node map will change (turn red) and a trap should be received at the workstation where the Network  
Manager is running. The trap will appear as an EDACS event if it is correctly categorized as an EDACS  
event.  
If the trap is not received, make sure that the MIB object associated with the trap enable/disable is not set to  
“disable.” If the MIB object is “enabled,” then make sure that the trap is properly configured to be an  
EDACS event. To check this condition, enter the EDACS->Faults->Configuration menu.  
15.15 MSM/SM OUT OF COLOR MAP ENTRIES  
Problem:  
The Multisite Monitor or Site monitor application errors out with one on the following X messages:  
Warning: Cannot allocate colormap entry for “xxxx”. (Where xxxx is a color name.)  
Warning: Cannot parse default background color spec.  
X error of failed request: Bad Access (attempt to access private resource denied.)  
Major opcode of failed request: 88(X_FreeColors)  
Serial number of Failed request: stream: 16747  
The X server will not recover from these errors and must be killed manually. It will restart automatically.  
NOTE: These errors should not occur if MSM or SM is started before the graphic intensive submaps are  
opened.  
If the MSM is executed from the command line after the OpenView submaps have been opened, the MSM  
application will execute without “X” messages, but the colors are confused. The X-server does not need to be  
restarted is this case.  
Solution:  
This problem is results from all software colormap entries in use. The MSM must allocate approximately 30  
color entries to execute. The 712 workstations have a maximum of 256 color entries, therefore only 256  
different colors/shades can be displayed or used on the system at any given time. HP-VUE claims some of these  
color entries and the NNM claims another 128 entries. When color-intensive background maps are used on  
OpenView submaps, they also use up color entries in this software colormap.  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
LBI-39169  
The only viable solution is to refrain for using color-intensive background graphics in the OpenView submaps.  
15.16 POPUP WARNING  
Problem:  
An xnmevent popup warns that only 10 popups can be generated at a time.  
Solution:  
The /usr/OV/appdefaults/XNm resource file sets the xnmevents.maxDisplayMsgs to ten (10). This can be  
modified if desired. The limit is set to this value so all the system resources are not used up by popups when no  
one is around to clear them.  
15.17 MULTINODE TRAFFIC NOT SEEN CORRECTLY ON MSM SESSIONS  
Problem:  
MultiSite Monitor fails to display originating node traffic on NIM (site) column and destination node traffic on  
Device (node) column.  
Solution:  
Sometimes the CEC/IMC CAM card gets confused, especially if it has been moved between card cages. To  
clear the problem, clear the CAM’s NOV RAM using the following procedure (For CEC/IMC information, refer  
to LBI-38938):  
1. Remove the CAM card and reset the DIP switches so the card will function as another device, such as a  
CIM.  
2. Reinsert the card into the card cage. This will clear the NOV RAM.  
3. Remove the card and reconfigure the DIP swiches so card card will function as a CAM.  
4. Reinsert the card.  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
GLOSSARY  
16. GLOSSARY  
TERM  
DEFINITION  
ACU  
Alarm and Control Unit. The ACU provides 32 alarm inputs and 8 relay  
outputs and allows for external device alarming to the System Manager. The  
ACU and Test Unit (TU) form the Test and Alarm Unit (TAU).  
Administrators are those people responsible for centralized configuration of  
EDACS networks. Their role is to install and maintain the system-wide  
database, and in the case of Network Management, overview the operation of  
the network.  
Administrator (or Admin or  
EDACS Administrator)  
Aegis  
Aegis is the Ericsson GE's voice scrambling system that employs advanced  
Digital Signal Processing (DSP) circuitry. Aegis has two primary modes −  
"Aegis digital" and "Aegis private". Aegis digital mode offers improved weak  
signal performance and impedance to unauthorized monitoring. Aegis digital  
transmissions are not encrypted. Aegis private mode also offers improved weak  
signal performance. In addition, since Aegis private transmissions are  
encrypted, Aegis private mode provides very secure communications against  
unauthorized monitoring.  
Software that enables a device to respond to manager requests to view or  
update MIB data, and send traps reporting problems to significant events.  
Agent  
AMTS  
API  
Advanced Multisite Test System.  
Application Programming Interface. Standard interface to a software  
application.  
Audio Board  
AUI  
The Audio Board routes audio, mobile data and Aegis data between EDACS  
radio systems, dispatch consoles, logging recorders, etc. The board digitizes  
analog signals applied to its audio inputs and applies the digitized signals to  
the TDM bus. It also performs the reverse process for its audio outputs.  
Attachment Unit Interface. Connector used with thick Ethernet that often  
includes a drop cable.  
Holds information in RAM until power is restored or battery is drained.  
Battery-backup  
BCU  
EDACS Billing Correlation Unit. This EDACS unit converts Integrated  
Multisite Controller activity to Call Detail Records which can be used for  
billing.  
Used to connect Ethernet to Ethernet with capability to control two-way traffic.  
OSI data Link and Physical layers only.  
Bridge  
C3 Maestro  
The C3 Maestro is the CRT-type console that is designed to take advantage of  
the advanced features of EDACS. It consists of a specialized audio "tower"  
and an IBM PC compatible computer running custom software developed by  
Ericsson GE.  
CAL  
Centralized Activity Logger. This EDACS unit is inserted between the IMC  
and the System Manager to provide activity information from Basic EDACS,  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GLOSSARY  
LBI-39169  
TERM  
DEFINITION  
SCAT, and CNI systems.  
The party to whom the call is placed, i.e., an individual or group of radios.  
The originating party of the call request, i.e., an individual radio.  
Callee  
Caller  
CAM  
entralized ctivity odule The CAM is a CEC/IMC interface module that  
C
A
M
provides call activity information to the entralized ctivity ogger ( )  
CAL  
C
A
L
computer. Usage and billing information can be generated with the CAL  
through the CAM link.  
EDG entral ctivity rocessor. Provides an IP Ethernet interface to host  
CAP  
C
A
P
computers and system services such as disk I/O, printing, and the Local  
Diagnostic Terminal interface.  
CCI Board  
onventional ontrol nterface This is a CEC/IMC Controller Board  
Board  
C
C
I
configured for use in the CIA rack. It provides master CI Board control. The  
control data port that connects the CIA rack to the VMIM is also located on  
the CCI Board. (Also see  
)
CI Board.  
onsultative ommittee on nternational elephony and elegraphy. An  
CCITT  
C
C
I
T
T
international organization which sets standards for interconnection of  
telephone equipment.  
ompact isk ead nly  
information distribution.  
emory. A media used for software and  
M
CD-ROM  
CEC  
C
D
R
O
onsole lectronics ontroller The Ericsson GE CEC is an advanced radio  
C
E
C
communications controller incorporating time division multiplex digital audio  
switching technology. The CEC connects dispatch consoles to EDACS and  
CNI systems.  
A CEC Node icon consists of a CEC, Console(s), and the Site(s).  
CEC Node Icon  
The  
(formerly referred to as the "MOM PC") provides  
CEC/IMC Manager  
CEC/IMC Manager  
CEC/IMC switch monitoring and configuration functions. This IBM PC  
compatible computer running custom software developed by Ericsson GE is  
the window into the CEC/IMC switch for the system administrator and service  
technicians.  
The smallest division of a frequency band which provides a single  
communication circuit, such as a voice or data channel.  
Channel  
CI Board  
onventional nterface This board is located in the CIA secondary  
Board  
C
I
interface rack. It contains circuitry used to connect conventional tone and dc  
controlled base stations and voting systems to the CEC/IMC switch.  
CIM  
onsole nterface odule The CIM is a CEC/IMC interface module used to  
C
I
M
connect C3 Maestro (CRT-type) and C3 Modular/Desktop consoles to the  
CEC/IMC switch. C3 Modular/Desktop consoles also require a C3 Console  
Translator interface module. (Also see  
XLTR.)  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
GLOSSARY  
TERM  
DEFINITION  
CNI  
onventional etwork nterface A conventional base station can be  
C
N
I
connected to the CEC/IMC switch via a CNI. The CNI is formed by a GETC  
shelf located at the conventional station that makes the station appear to a  
MIM as an EDACS site. In the CNI system, different Channel Guard tones are  
assigned to different talk groups.  
Used like a password in message, validating the right of the sender to access  
MIB data with a requested operation.  
Community Name  
The  
function ensures all EDACS radio systems being called  
confirmed call  
confirmed call  
have working channels available before the caller is given a channel access  
(talk permit) tone. This function can be disabled on a per system/group basis.  
Communication equipment which provides an operating position for a  
dispatcher.  
Console  
The Console icon consists of equipment, displays, and controls where one  
operator interfaces with a radio system.  
Console Icon  
Convert To Callee  
The convert to callee message is sent to a radio which attempts to initiate a call  
within a group which is already assigned a working channel. Upon recept of  
the message, the radio is prevented from transmitting and is placed in the  
receive mode on the assigned working channel.  
includes any data used by the switch for system control.  
control data  
CTIM  
Control data  
entralized elephone nterconnect odule The CTIM is a CEC/IMC  
C
T
I
M
interface module used to connect entralized elephone nterconnect ystem  
C
T
I
S
(
) equipment to the switch so radio users and dispatchers can access land-  
CTIS  
line telephone systems.  
(see  
)
EDG interface module  
DATA  
Background process that performs system-wide functions.  
daemon  
Two or more IMC networks can be linked together for  
distributed multisite  
distributed multisite  
communication. Audio, mobile data/Aegis data and control data is transferred  
between the different IMC networks via a NIM at each IMC switch. (Also see  
.)  
StarGate Controller  
DPRAM  
DVIM  
ual ort andom ccess emory These specialized memory chips have  
two separate data buses that allow two microprocessor chips to quickly and  
efficiently transfer data between each other.  
D
P
R
A
M
igital oice nterface odule The DVIM is a CEC/IMC interface module  
D
V
I
M
that connects igital oice nterface nits (  
) to the switch to provide  
DVIU  
D
V
I
U
Aegis digital and Aegis private voice operation for dispatch consoles and CTIS  
equipment.  
igital oice nterface nit. Provides digital interface to the dispatch console  
DVIU  
D
V
I
U
and enables digital mode communications with the console operator.  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GLOSSARY  
LBI-39169  
TERM  
DEFINITION  
EDACS, short for nhanced igital ccess ommunications ystem, is a  
EDACS  
E
D
A
C
S
registered trademark of Ericsson Inc. It is used by Ericsson to describe specific  
communications systems and their specific equipment which meet or exceed  
the needs of the Public Service, Industrial, Commercial, and Utility markets  
world-wide.  
EDACS radio system  
nhanced igital ccess ommunication ystem The term  
radio system  
E
D
A
C
S
"EDACS radio system" refers to RF equipment that may be interfaced to the  
EDACS CEC/IMC switch. The RF equipment may be located at a single  
location, such as an EDACS site or it may be located at several locations, such  
as in a voting system. Other examples of EDACS radio systems include  
simulcast, CNI, and SCAT systems.  
DACS ata ateway. Provides landline group and individual data calls for  
EDG  
E
D
G
EDACS networks.  
EDG interface module  
DACS ata ateway  
CEC/IMC switch from the EDG computer equipment via the  
Mobile data is forwarded to the  
E
D
G
interface module  
EDG interface  
.
module  
Enhanced Local Interconnect. In EDACS trunking, a telephone switching  
system that allows authorized radio users to make and receive telephone calls  
without dispatcher assistance.  
ELI  
Standard term that stands for the five broad areas of network management:  
FCAPS  
GETC  
aults, onfiguration, ccounting, erformance, and ecurity.  
F
C
A
P
S
Ericsson eneral lectric runking ard The GETC is a microprocessor-  
G
E
T
C
controlled shelf that can be configured to perform many different signal  
processing tasks for Ericsson GE radio communications equipment. In  
CEC/IMC applications, each GETC is equipped with a 9600 baud modem that  
provides serial control data communications between the CEC/IMC (Uplink  
GETC) and different radio systems (Downlink GETC).  
A
raphical ser nterface (GUI) is a way of communicating with a computer  
Graphical User Interface  
GSC bus  
G
U
I
by manipulating icons (pictures) and windows with a mouse.  
lobal erial hannel The GSC bus is a high-speed serial bus that  
G
S
C
bus  
provides packetized control data transfers between Controller Boards in the  
CEC/IMC switch.  
See Graphical User Interface.  
GUI  
HDI  
EDG ost ata nterface. Provides an interface to host computers using RDI  
H
D
I
protocol.  
High-Level Data Link Control protocol. A link level protocol standard by ISO  
that is the basis for several link layer protocols.  
HDLC  
A suite of system and network management products offered by Hewlett-  
Packard.  
HP OpenView  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
GLOSSARY  
TERM  
DEFINITION  
Hewlett-Packard pen iew etwork ode anager. Management platform  
HP OV NNM  
O
V
N
N
M
that provides common management functions, such as data collection and  
reporting, using standard protocols and software interfaces.  
Used to concentrate several 10BaseT (Twisted Pair Ethernet) onto coaxial  
Ethernet. OSI physical layer only.  
Hub  
Integrated EDACS Alarm.  
IEA  
IMC  
ntegrated ultisite and onsole ontroller The Ericsson GE IMC is a  
I
M
C
C
digital audio switch that routes audio/mobile data/Aegis data between EDACS  
radio systems and dispatch consoles. It is a second generation multisite  
controller plus a console controller for the C3 series consoles.  
The IMC Node icon consists of a Switching Center.  
IMC Node Icon  
Internet  
A set of networks connected by IP routers and appearing to its users as a  
single network.  
The Internet Protocol (IP) is the TCP/IP layer 3 protocol responsible foe  
transporting datagrams across the network.  
Internet Protocol  
IP Address  
ISDN  
An IP (Internet Protocol) address is the numeric identifier address of an  
element.  
Integrated Services Digital Network. A set of CCITT standards aimed at  
integrating voice and data services. ISDN provides end-to-end digital services.  
Allows for interconnection of remote systems and LANs over an ISDN  
network for applications running on top of the standard TCP-IP protocol.  
Ericsson’s tradename for a Private Branch Exchange (PBX) Gateway for  
telephone interconnect via a central network node.  
Jessica  
LAN  
Local Area Network. A short-distance data communication system that uses  
moderate to high data rates (100 kb/s to 50 Mb/s). The network interconnects  
a group of computers to provide intercommunication, sharing of data files,  
software, and printers.  
A modified form of HDLC that CCITT chose as the link level protocol for  
X.25 networks. LAPB provides for the reliable transfer of a packet from a host  
to an X.25 packet switch, which then forwards the packet to its destination.  
LAPB  
LRIM  
ogging ecorder nterface  
L
odule This CEC/IMC interface module  
M
R
I
provides audio outputs for logging recorders. Each output channel can be  
programmed to supply audio based on groups or individual units within the  
CEC/IMC network.  
An object holding network management information, characterized by an  
identifier, a value, implementation requirements, and valid operations.  
Managed Object  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GLOSSARY  
LBI-39169  
TERM  
DEFINITION  
Management Information Base. A description of the data stored in a Network  
Element similar to a C structure. A MIB definition allows the EDACS  
Network Manager to read and write values in a Network Element.  
Management Information Base  
Multistation Access Unit. A transceiver for LAN connections.  
MAU  
ME  
Management Element. An EDACS platform that configures EDACS NEs.  
Examples of MEs are CEC/IMC Manager, EDACS 4 Radio Programmer,  
EDACS Network Manager, System Manager, PI terminal, EDG terminal, etc.  
A protocol governing a station’s access to a network.  
See Management Information Base.  
Media Access Control (MAC)  
MIB  
MIM  
ASTR II/III nterface odule The MIM connects an EDACS radio  
M
I
M
system to the CEC/IMC switch. EDACS radio systems include EDACS sites,  
simulcast systems, voted systems, CNI and SCAT systems.  
MOM  
nitor odule The MOM is a CEC/IMC interface module that provides  
MO  
M
serial data connections for the CEC/IMC Manager (MOM PC) and the System  
Manager computers.  
(see  
)
MOM PC  
CEC/IMC Manager  
For a Token Ring, a concentrator used to connect multiple stations to the ring.  
is a network of multiple EDACS radio systems and possibly  
Multiple Access Unit (MAU)  
multisite  
A
multisite  
conventional radio systems all linked together for wide-area communication. In  
a multisite network, adjacent systems do not use the same radio frequencies.  
Each system networked may have a different number of working channels.  
Proxy that communicates with its agents via SNMP.  
Native Proxy  
NE  
etwork lement. An EDACS platform that provides links in the EDACS  
N
E
network for either digital voice, analog voice, data, or control information. IT  
IS NOT A PLATFORM USED TO CONFIGURE EDACS NEs. Examples of  
NEs are IMC, GETC, Site Controllers, PIs, etc.  
The 32-bit IP address of a system.  
Network Address  
Network Manager  
The EDACS Network Manager is a UNIX workstation or server that provides  
EDACS administrators with a consistent, integrated view of the alarm status of  
their EDACS network.  
A network is a logical association of IMC, StarGate, CEC, and Remote CEC  
nodes. The Network Number identifies the nodes for which the traffic will be  
monitored by the Multisite Monitor.  
Network Number  
NIM  
etwork nterface odule Two or more IMC networks can be linked  
N
I
M
together for distributed multisite communications using a NIM at each IMC  
switch.  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
GLOSSARY  
TERM  
NM  
DEFINITION  
See Network Manager.  
A terminal of any branch of a network, or a terminal common to two or more  
branches.  
Node  
This is the EDACS Node Number which uniquely specifies an  
IMC/CEC/StarGate in the EDACS network.  
Node Number  
A string of numbers derived from a global naming tree, used to identify an  
object.  
Object Identifier  
See HP OpenView  
OpenView  
PCM  
ulse ode odulation An audio processing technique used to encode and  
P
C
M
decode analog signals so they can be transferred digitally.  
rotocol ata nit. Grouping of data defined within SNMP.  
PDU  
PI  
P
P
D
U
rivate Branch Exchange nterface. The Jessica VMEbus chassis provides  
I
connectivity between the IMC and the MD110.  
ower onitor nit. This EDACS unit monitors the output power of the  
PMU  
Port  
P
M
U
transmitters and the VSWR of the antenna system. If a fault occurs, it sends an  
alarm to the Site Controller. The PMU is co-located with the Site Controller  
computer.  
A point for accessing a device, circuit, or network. For a bridge, an interface  
to a LAN or point-to-point link.  
Protection of the contents of a message by means of encryption.  
Privacy  
An agent that responds to requests from one or more managers by polling  
remote devices. A proxy also relays traps generated by devices under its  
supervision to other managers.  
Proxy Agent  
ublic witched elephone etwork. The communication system that links  
PSTN  
P
S
T
N
telephones nationwide by means of loops, trunks, and switches owned and  
operated by the public telephone companies. The term is often used for data  
and other non-telephone services carried over the telephone network.  
Term used to designate the CEC, IMC, or StarGate.  
Remote Console Electronics Controller.  
Radio Switch  
RCEC  
The RCEC Node icon consists of the RCEC and Consoles.  
RCEC Node Icon  
Request For Comments (RFC)  
The RFC is a set of documents containing Internet protocols and discussions of  
related topics. These documents are available on-line at the Network  
Information Center.  
RIM  
equest Status Monitor nterface  
odule The RIM interface module  
M
R
I
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GLOSSARY  
LBI-39169  
TERM  
DEFINITION  
enables the RSM computer to request status information from radios within the  
network.  
A system used to connect separate LANs and WANs into an internet, and to  
route traffic between the networks. In the Network Manager system, a router is  
needed to go from Ethernet to T1 physical media. OSI Network, Data Link,  
and Physical Layers only.  
Router  
A type of serial interface typically used for terminals, modems, and printers.  
RS-232  
RSM  
equest tatus onitor The RSM is an IBM PC compatible computer  
R
S
M
running custom software developed by Ericsson GE. It allows the system  
administrator and/or the dispatchers to view status of EDACS units within the  
CEC/IMC network. Status information is typically initiated (transmitted) by the  
radio operator to identify the current condition (in route, at scene, etc.) of the  
unit.  
ingle- hannel utonomous runking. In EDACS, SCAT is a trunked system  
SCAT  
S
C
A
T
consisting of a single failsoft repeater and a downlink GETC. Operationally, it  
functions as a control channel or a working channel, depending on the trunked  
service required. In its idle state, SCAT operates as a control channel. When a  
channel request is made, SCAT assigns the call to itself and converts to a  
working channel. EDACS address hierarchy is maintained as are many  
trunking features.  
An HP-UX command interpreter (CSHELL, KORN, etc.), providing a working  
environment interface for the user. When user logs in, the Session Manager  
starts HP VUE applications that were running during a previous session.  
Shell  
The Simple Network Management Protocol (SNMP) is a protocol that enables  
a management station to configure, monitor, and receive trap (alarm) messages  
from a Network Element. It also provides additional administrative structure,  
authentication, and privacy.  
Simple Network Management  
Protocol  
Simultaneous Broadcast by two or more transmitters located at different sites  
operating on the same RF frequency.  
Simulcast  
site  
This term normally refers to EDACS radio equipment at a single specific  
location.  
A computer running Ericsson-developed application software that controls the  
moment-to-moment trunking process, plus such features as call validation, unit  
enable/disable, dynamic regrouping, and queuing management. The Site  
Controller communicates with the System Manager over an appropriate link.  
Site Controller  
The Site icon consists of physical devices located in one geographic location  
such as the Site Controller, ELI, ACU, PMU, TU, and Channels.  
Site Icon  
Site Number  
SM  
This is the EDACS Site Number which uniquely identifies the Site on a  
particular Node.  
See System Manager.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
GLOSSARY  
TERM  
SNMP  
DEFINITION  
See Simple Network Management Protocol.  
In EDACS trunking, links up to eight EDACS wide-area multisite networks to  
create a single, seamless network.  
StarGate  
A
is an IMC switch specifically configured for  
StarGate Controller  
StarGate Controller  
distributed multisite operation. It is the central point or "hub" for all distributed  
multisite communications.  
This is the EDACS SubSite Number which uniquely identifies the SubSite  
device on a particular Node. A channel is a subsite device.  
SubSite Number  
The root user who has special privileges. Same as the System Administrator.  
super user  
Collection of node level devices physically connected to the IMC. These  
devices include the PI, BCU, CAL, EDG, and Consoles.  
Switching Center  
The  
is a DEC multitasking computer which performs  
System Manager  
System Manager  
features such as monitoring system operation, generating management reports,  
individual unit enable/disable and dynamic regrouping.  
Digital landline and microwave transmission standards used in the United  
States and Europe.  
T1/E1  
TCP  
ransmission  
T
ontrol rotocol.  
A connection-oriented protocol with  
C
P
acknowledgments and retries.  
ime omain ultiplexing. Technique used to multiplex multiple signals  
TDM  
T
D
M
onto a single hardware transmission channel (bus) by allowing each signal to  
use the channel for a short time before going on to the next one.  
TDM bus  
ime ivision ultiplexed The TDM bus in the CEC/IMC switch is a  
bus  
T
D
M
digitally multiplexed bus system used to transfer audio/mobile data/Aegis data  
throughout the CEC/IMC switch. Each signal coming into the CEC/IMC  
switch is assigned a TDM time slot and receiving devices extract the digitized  
signals from the appropriate time slot.  
Customer personnel whose main responsibility is to install, maintain, and  
troubleshoot individual EDACS platforms, such as GETCs, Site Controllers,  
EDGs, and IMCs. Technicians require software interfaces that run on common  
laptop/desktop personal computers to assist in hands-on setup of a particular  
platform.  
Technician (or Tech or  
EDACS technician)  
The TCP/IP protocol that enables a terminal attached to one host to log into  
other hosts and interact with their applications. It is the Standard internet  
protocol for terminal emulation.  
Telnet  
Trivial File Transfer Protocol. A basic TCP/IP protocol used to upload or  
download files. Typically uses include initializing diskless workstations.  
TFTP  
In a multisite network, all active radios log into their particular system. This  
tracking  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
GLOSSARY  
LBI-39169  
TERM  
DEFINITION  
login information is databased to allow the CEC/IMC to track individual radio  
units as they move from system-to-system. The CEC/IMC can then route wide  
area calls based on this database.  
The Transmission Control Protocol (TCP) is the TCP/IP protocol that provides  
reliable, connection-oriented data transmission between a pair of applications.  
Transmission Control Protocol  
A message that reports a problem or significant event.  
Trap  
The process of dynamically allocating a limited number of radio channels to  
groups of people for communication purposes.  
Trunking  
EDG runked ystem nterface. The TSI handles all communications to the  
rest of the EDACS trunked radio system via the CEC/IMC CIM.  
TSI  
TU  
T
S
I
Test Unit. The TU continually tests channels and provides an alarm to the Site  
Controller if a fault is detected. The TU and ACU form the Test and Alarm  
Unit (TAU).  
User Datagram Protocol. Connection-less-mode transport protocol used by  
SNMP. Does not use acknowledgments or retries.  
UDP  
Uninterruptible Power Source. Used to keep the system running in the event of  
a power outage.  
UPS  
VMIM  
Con entional nterface odule The VMIM couples the CIA secondary  
V
I
M
interface rack to the primary CEC/IMC switch interface modules. The VMIM -  
CIA set allows conventional base stations and conventional satellite receiver  
voting systems to be connected to the CEC/IMC switch.  
A network-based display device that uses the X protocol over LAN to  
communicate with the host.  
X-model  
The high-end performing X-model targeted at technical environments.  
X-terminal  
XLTR  
C3 Modular/Desktop Console  
Using data protocol conversion  
Translator  
techniques, this interface module allows the CEC/IMC switch to communicate  
with a C3 Modular/Desktop console. The XLTR is placed in the control data  
path between the C3 console and its respective CIM.  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
INDEX  
17. INDEX  
—A—  
—E—  
Accounting Management, 14  
Transferring Device Files, 42  
Adding a Connection, 68  
EDACS Icon is Blue, 74  
EDACS Icon is Brown, 74  
EDACS Identifiers  
Adding Custom Menu Items, 60  
Adding Descriptions To Objects, 69  
Adding Object Descriptions, 64  
Adding Symbols to the EDACS Maps, 67  
Attempt to Log In Fails, 73  
Viewing/Modifying, 70  
EDG  
Manuals, 12  
Ending a Network Manager Work Session, 22  
Event Browser, 29  
Event Configuration, 29  
Event Descriptions  
—B—  
Background Geographical Maps, 62  
Background Network Map Overlays, 17  
Backup  
Creating a Full System Image, 71  
Restoring the Full System Image, 72  
BCU/CAL  
Modifying, 71  
Restoring Default, 71  
Event Log Messages, 61  
Event Notification Interface, 26  
Events Browser, 32  
—F—  
Manuals, 12  
Fault Configuration, 28  
Fault Management, 14  
—C—  
CD-ROM Does Not Work, 73  
CEC/IMC  
Detecting and Isolating Faults, 26  
Fault Configuration, 28  
Notification Through Icon Color, 26  
Reporting Faults, 28  
Manuals, 11  
CEC/IMC Manager  
Configuration, 36  
Using Hierarchical Maps, 31  
Fault Summary, 31  
FCAPS, 13  
Changing Icon Labels, 63  
Clock Polling Interval, 66  
Clock Synchronization, 66  
Collecting MIB Data and Defining Thresholds, 61  
Configuration Management, 14, 36  
CEC/IMC Manager, 36  
Accounting Management, 13  
Configuration Management, 13  
Fault Management, 13  
Performance Management, 13  
Security Management, 13  
File Transfer  
Creating a Full System Image Backup, 71  
Customized Maps, 16  
Customizing Icons, 63  
Activity Data and Configuration Files, 42  
Customizing Site or Device Labels, 68  
—G—  
—D—  
Glossary, 79  
Defining Actions for Events, 61  
Deleting a Symbol from the OpenView Map, 67  
Deleting Orphaned Submaps, 69  
Device Labels, 68  
—H—  
Help  
On-Line, 25  
Devices  
Hewlett-Packard (HP) OpenView  
Manuals, 11  
Hierarchical Maps, 16  
Map Traversal, 19  
HP VUE editor, 18  
Managing and Unmanaging, 30  
Documentation  
BCU/CAL, 12  
CEC/IMC, 11  
EDG, 12  
—I—  
Hewlett-Packard (HP) OpenView, 11  
Jessica, 12  
Network Management, 11  
System Manager, 12  
Icon bitmaps  
Modifying, 64  
Identifying Faults Using Hierarchical Maps, 31  
IMC Reports a Link Failure, 77  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INDEX  
LBI-39169  
Introduction, 13  
—P—  
PC Xware, 63  
Performance Management, 15  
—J—  
—L—  
Jessica  
Monitoring Performance Trends, 46  
Manuals, 12  
Multiple Node or Site MIB Comparison, 51  
System Accessibility, 50  
System Usage, 49  
Line Graphs, 47  
Loading MIBs, 64  
Loading/Unloading MIBS, 60  
logging Out of Network Manager, 22  
Login Screen, 21  
Performance Not Showing Traffic, 75  
Polling Interval, 65  
Setup, 66  
Poor System Performance, 75  
Popup Generation Warning, 78  
Pulldown Menu, 18  
—M—  
Managing and Unmanaging Devices, 30  
Map  
—Q—  
Quiet Drops, 57, 59  
Background Overlays, 17  
Map Generation Verify Operation Is Not Working Properly,  
74  
Mapping Severity Level to Icon Color, 71  
Maps  
—R—  
Real-time call Activity, 53  
Rebooting the Network Manager, 65  
Remote Procedure Calls are Failing, 74  
Reporting Faults, 28  
Restoring a Full System Image from the Backup, 72  
Restoring Default Event Descriptions, 71  
Adding Connections, 68  
Adding Symbols, 67  
Background, 62  
Deleting Orphaned Submaps, 69  
Deleting Symbols, 67  
—S—  
Snapshots, 62  
MIB Application Builder, 60  
MIB Browser, 60  
Security Access, 16  
Security Management, 15  
Site Labels, 68  
MIBs  
Site Monitor, 53, 58  
Graphical Comparison, 51  
Loading/Unloading, 60  
Not Showing Traffic, 75  
Out of Color Map Entries, 77  
SNMP, 76  
Modifying Event Descriptions, 66, 71  
Monitoring EDACS Fault Conditions, 26  
Monitoring Performance Trends  
Two-Dimensional Line Graphs, 46  
Monitoring Real-Time Call Activity, 53  
MSM/SM Does Not Show PI Traffic,, 73  
MSM/SM Out of Color Map Entries, 77  
Multinode Traffic Not Seen Correctly On MSM, 78  
Multiple Network Manager Sessions, 63  
Multisite Monitor, 53, 54  
Software Version  
Network Manager, 24  
Retrieval, 23  
Starting a Network Manager Work Session, 21  
Starting The CEC/IMC Session, 37  
System Accessibility, 50  
System Manager  
Manuals, 12  
Telnet Session, 40  
System Shutdown Procedures, 65  
System Usage, 49  
Multinode Traffic Not Seen Correctly, 78  
Not Showing Traffic, 75  
Out of Color Map Entries, 77  
—T—  
—N—  
Taking Snapshots of the Map, 62  
Telnet Sessions, 39  
Troubleshooting, 73  
Network Manager Software Version, 24  
No Node License, 75  
Attempt to Log In Fails, 73  
CD-ROM Does Not Work, 73  
EDACS Icon is Blue, 74  
EDACS Icon is Brown, 74  
IMC Reports a Link Failure, 77  
—O—  
Object Descriptions, 64  
On Version, 24  
On-line help, 25  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LBI-39169  
INDEX  
Map Generation Verify Operation Is Not Working  
—U—  
Properly, 74  
User Action Logging, 41  
MSM/SM Does Not Show PI Traffic,, 73  
MSM/SM Out of Color Map Entries, 77  
Multinode Traffic Not Seen Correctly On MSM, 78  
No Node License, 75  
Using Hierarchical Maps, 31  
Using HP VUE editor, 18  
Using OpenView Network Node Manager, 60  
Using Pulldown Menus, 18  
Performance Not Showing Traffic, 75  
Poor System Performance, 75  
Popup Generation Warning, 78  
Remote Procedure Calls are Failing, 74  
SNMP, 76  
Using the Multisite Monitor Application, 54  
Using The OpenView Event Browser, 32  
Using the Site Monitor Application, 58  
Using two-dimensional Line Graphs, 46  
—V—  
Two-Dimensional Line Graph  
Customizing, 47  
Viewing Historical Trends, 61  
Example, 47  
Usage, 46  
Viewing/Modifying EDACS Identifiers, 70  
Viewing/Modifying Trap Severity Levels, 70  
Ericsson Inc.  
Private Radio Systems  
Mountain View Road  
Lynchburg, Virginia 24502  
1-800-592-7711 (Outside USA, 804-592-7711)  
Printed in U.S.A.  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Dyson Vacuum Cleaner DC65 User Manual
FieldServer Computer Drive FS 8704 01 User Manual
Ford Automobile 2010 Escape User Manual
Fujitsu Air Conditioner AOU09RL2 User Manual
Fujitsu Air Conditioner RO 36FA User Manual
Fujitsu Computer Accessories B23Q8YA G 02 F User Manual
Fujitsu Laptop S7100 User Manual
Garmin GPS Receiver 101 User Manual
GE Network Card GEH6505A User Manual
Gianni Industries Door LHS 50RH User Manual