Operator`s manual
INTRODUCTION
1-2
June 1997
Part No. 002-0690-201
1.4 STARTING THE PROGRAM
1. Turn on the computer and monitor. The computer 
will boot up and display a Welcome window.
2. Press Ctrl+Alt+Del to log on. Another Welcome 
window displays.
3. Verify username, enter password, and press return. 
The HP OpenView log-in window displays.
4. Choose Operator security level, enter the password, 
and press return. The OpenView application starts, 
displays its menus, and displays a Home map of the 
network system.
OpenView is in the startup group and will auto-
matically start when the computer is turned on. To 
start OpenView while Windows NT is running, the 
OpenView application is stored in the OpenView Pro-
gram Group of the Program Manager.
1.5 OVERVIEW OF MANAGING AN E.F. 
JOHNSON NETWORK
An E.F. Johnson Network is a system that enables 
remote repeater sites to report significant events to a 
host computer, where the events can be managed. The 
host computer runs the HP OpenView program and an 
E.F. Johnson proprietary application, which together 
use alarms to report significant events. The alarms are 
reported to the screen of the host computer by chang-
ing the color of map icons and by displaying an entry 
in an alarm log. The operator can then decide how to 
respond to the alarms. In addition, the system can be 
configured to automatically manage some alarms.
Figure 1-1 shows a typical central and remote 
site. There may be several other remote sites of similar 
configuration.
The remote sites communicate to the host com-
puter (often located at the central site) via DS0 links 
(64 K bps). In this diagram, the DS0 link is part of the 
microwave link that carries other information between 
sites. Within a site, network components capable of 
TCP/IP are connected with 10BaseT Ethernet®. The 
site/channel computers are also connected by a serial 
link to MBCs (Message Bridge Cards) in the repeaters 
and channel controllers. E.F. Johnson proprietary soft-
ware is used to communicate between the computer 
and MBC; then, the computers pass the information 
via TCP/IP to the host computer.
Alarms arrive at the host computer through sev-
eral means. Computers and routers can be polled by 
the host computer on a regular basis to determine if the 
network link is functioning. Routers will send SNMP 
(Simple Network Management Protocol) trap mes-
sages to the host computer when a significant event 
occurs. The E.F. Johnson proprietary software will 
send messages to the host computer when significant 
events occur in repeaters and channel controllers. 
Repeaters and channel controllers also have IACs 
(Interface Alarm Cards) that can report external 
alarms, such as open doors. These alarms are also 
reported through the E.F. Johnson proprietary soft-
ware.
Some alarms will correct themselves. For exam-
ple, if a door opens, an alarm will be received that the 
door is open. When the door closes, an alarm will be 
received that the door has closed.
Some alarms can be configured to be managed 
automatically by the system. These are called Reverts. 
For example, if a critical alarm reports that one 
repeater is not working, the system could be config-
ured to automatically shut down all repeaters on that 
channel. The problem is not corrected, but it is man-
aged. It is not a perfect solution, but it may be the best 
solution for the circumstances. The critical alarm still 
exists, in fact more of them exist because more repeat-
ers are not working. However, the system may be 
more useful without one channel, than with a large 
hole in the coverage of one channel.
Other alarms will have to be handled manually. If 
a door opens but does not close and no one is supposed 
to be at the site, the police may need to be called to go 
see who is there. If a storm takes out an entire site, 
some major work will need to be done.










