Post on 01-Apr-2021
Title page
Optical Management System (OMS) | Release 5.0.2Provisioning Guide for 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS , Release 7.2(Formerly Metropolis® AM/AMS)
365-312-877R7.2
CC109635805
ISSUE 4
NOVEMBER 2009
Legal notice
Legal notice
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.
The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2009 Alcatel-Lucent. All rights reserved.
Contents
About this document
Purpose .......................................................................................................................................................................................... xiiixiii
Safety information ..................................................................................................................................................................... xiiixiii
Conventions used ....................................................................................................................................................................... xiiixiii
Orientation aids ........................................................................................................................................................................... xivxiv
Related information .................................................................................................................................................................... xvxv
Document support .................................................................................................................................................................... xviixvii
Technical support ...................................................................................................................................................................... xviixvii
How to order ............................................................................................................................................................................... xviixvii
How to comment ....................................................................................................................................................................... xviixvii
1 Safety
Overview ....................................................................................................................................................................................... 1-11-1
General notes on safety
Structure of safety statements ................................................................................................................................................ 1-31-3
Symbols used in hazard statements ..................................................................................................................................... 1-51-5
Basic safety aspects ................................................................................................................................................................... 1-61-6
Specific safety areas
Overview ....................................................................................................................................................................................... 1-81-8
Laser safety .................................................................................................................................................................................. 1-91-9
Electrostatic discharge ........................................................................................................................................................... 1-121-12
2 Security administration tasks
Overview ....................................................................................................................................................................................... 2-12-1
To view a list of ITM-CIT accesses .................................................................................................................................... 2-22-2
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
iii
To log out ITM-CIT user(s) ................................................................................................................................................... 2-32-3
To view a list of ITM-CIT access control profiles ......................................................................................................... 2-42-4
To modify ITM-CIT access control profile(s) ................................................................................................................. 2-52-5
3 Management communication setup concepts
Overview ....................................................................................................................................................................................... 3-13-1
Basic DC principles ............................................................................................................................................................... 3-23-2
DC configurations .................................................................................................................................................................. 3-53-5
DC addresses ............................................................................................................................................................................ 3-93-9
SAP address structure ......................................................................................................................................................... 3-103-10
Data communication channels (DCC) ............................................................................................................................. 3-133-13
Dual stack with tunneling (DSwT) ................................................................................................................................... 3-163-16
DSwT tunnel auto provisioning (TAP) ............................................................................................................................ 3-213-21
DSwT connecting areas with manual TAP tunnels ..................................................................................................... 3-233-23
Partition repair .......................................................................................................................................................................... 3-243-24
Partition repair guidelines .................................................................................................................................................... 3-263-26
OMS-to-E connections concepts .................................................................................................................................... 3-283-28
Auto-discovery concepts (subnetworks) ......................................................................................................................... 3-293-29
4 Management communication setup tasks
Overview ....................................................................................................................................................................................... 4-14-1
Tasks related to OMS-to-E connections
To view a list of OMS-to-E connections ....................................................................................................................... 4-34-3
To add an OMS-to-E connection ...................................................................................................................................... 4-44-4
To modify an OMS-to-E connection ............................................................................................................................... 4-74-7
To deactivate an OMS-to-E connection ....................................................................................................................... 4-104-10
To activate an OMS-to-E connection ........................................................................................................................... 4-124-12
To test the communication with an E ........................................................................................................................... 4-144-14
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
iv 365-312-877R7.2Issue 4 November 2009
To delete an OMS-to-E connection ............................................................................................................................... 4-164-16
To delete an E ........................................................................................................................................................................ 4-184-18
Tasks related to DCC
To view a list of DCC/EOW status for the port overheads ...................................................................................... 4-204-20
To modify the DCC/EOW status for a selected port overhead ............................................................................... 4-214-21
To modify DC parameters ................................................................................................................................................ 4-234-23
To view the DCC in MSP mode ......................................................................................................................................... 4-254-25
To set the DCC in MSP mode to slave or to independent ........................................................................................ 4-264-26
To view a list of overhead access ports ........................................................................................................................... 4-284-28
To view a list of transparent DCC cross-connections ................................................................................................ 4-294-29
To add a transparent DCC cross-connection ................................................................................................................. 4-304-30
To delete a transparent DCC cross-connection ............................................................................................................. 4-324-32
5 Equipment provisioning concepts
Overview ....................................................................................................................................................................................... 5-15-1
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS configuration possibilities ............. 5-25-2
ode creation .............................................................................................................................................................................. 5-65-6
E hardware components and their identifiers ............................................................................................................... 5-85-8
Miscellaneous discrete inputs and outputs ....................................................................................................................... 5-95-9
SHDSL service concepts ....................................................................................................................................................... 5-115-11
6 Equipment provisioning tasks
Overview ....................................................................................................................................................................................... 6-16-1
Provisioning of slots and SFPmodules
To view a list of slots ................................................................................................................................................................ 6-46-4
To modify a slot .......................................................................................................................................................................... 6-66-6
To view a list of SFP modules ............................................................................................................................................... 6-86-8
To view SFP module information ...................................................................................................................................... 6-106-10
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
v
To set the SFP module assignment state ......................................................................................................................... 6-136-13
Port provisioning
To view a list of physical ports ........................................................................................................................................... 6-156-15
To view a list of logical ports .............................................................................................................................................. 6-166-16
To view a list of contained logical ports ......................................................................................................................... 6-176-17
To view a list of loopback-enabled ports ........................................................................................................................ 6-196-19
To provision or deprovision a loopback on a port ....................................................................................................... 6-206-20
To modify the parameters of a physical or logical port ............................................................................................. 6-226-22
Parameters for SDH/PDH ports ......................................................................................................................................... 6-246-24
Parameters for SHDSL ports ............................................................................................................................................... 6-336-33
Parameters for Ethernet ports .............................................................................................................................................. 6-396-39
Parameters for VCG ports .................................................................................................................................................... 6-436-43
Data service
Overview .................................................................................................................................................................................... 6-506-50
To view Ethernet card information ................................................................................................................................... 6-516-51
To modify Ethernet card information ............................................................................................................................... 6-526-52
To view virtual concatenation groups .............................................................................................................................. 6-546-54
To modify virtual concatenation groups ......................................................................................................................... 6-566-56
To view VC TTPs .................................................................................................................................................................... 6-596-59
To reset the wait to restore timer for VC TTPs ............................................................................................................. 6-606-60
MIB management
To upload the MIB into the management system ........................................................................................................ 6-626-62
To download the MIB to an E ......................................................................................................................................... 6-636-63
To update the MIB image ..................................................................................................................................................... 6-646-64
To enable the association with an E .............................................................................................................................. 6-656-65
To disable the association with an E ............................................................................................................................. 6-666-66
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
vi 365-312-877R7.2Issue 4 November 2009
Provisioning of E event controls
To modify E event controls .............................................................................................................................................. 6-686-68
To view E event parameter settings ............................................................................................................................ 6-706-70
To modify E event parameter settings ....................................................................................................................... 6-726-72
Provisioning of MDIs and MDOs
To view a list of MDOs ......................................................................................................................................................... 6-746-74
To view alarms associated with an MDO ....................................................................................................................... 6-756-75
To modify an MDO ................................................................................................................................................................ 6-766-76
To view a list of MDIs ........................................................................................................................................................... 6-786-78
To modify an MDI .................................................................................................................................................................. 6-796-79
Tasks related to SHDSL devices and services
To view a list of SHDSL units ............................................................................................................................................ 6-816-81
To modify the SHDSL transport mode ............................................................................................................................ 6-826-82
To view SHDSL spans ........................................................................................................................................................... 6-836-83
To restart the discovery sequence for an SHDSL span .............................................................................................. 6-846-84
To restart the low-level SHDSL hardware ..................................................................................................................... 6-856-85
To remove remote devices on an SHDSL span ............................................................................................................ 6-866-86
To modify the SHDSL span diagnostic mode ............................................................................................................... 6-876-87
To view SHDSL device information ................................................................................................................................ 6-886-88
To modify a remote SHDSL device .................................................................................................................................. 6-896-89
To synchronize a remote SHDSL device ........................................................................................................................ 6-916-91
To reset a remote SHDSL device ....................................................................................................................................... 6-926-92
To assign a password to a remote SHDSL device ....................................................................................................... 6-936-93
To download a software image to a remote SHDSL device .................................................................................... 6-956-95
To set the SHDSL remote power supply management mode .................................................................................. 6-976-97
To view a list SHDSL remote power supply ports ...................................................................................................... 6-986-98
To restart an SHDSL remote power supply port .......................................................................................................... 6-996-99
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
vii
To modify the alarm suppression settings of an SHDSL remote power supply port ................................... 6-1006-100
To view remote bridges on Ethernet TUs ................................................................................................................. 6-1016-101
To switch or modify remote bridges on Ethernet TUs ......................................................................................... 6-1036-103
To view remote bridge VLAs member ports on Ethernet TUs ..................................................................... 6-1056-105
To view remote bridge member ports ............................................................................................................................ 6-1076-107
To create or modify remote bridge VLAs on Ethernet TUs ........................................................................... 6-1096-109
To view the VLA member ports of a remote bridge ............................................................................................. 6-1116-111
To modify the Ethernet parameters of remote bridge member ports and VLA member ports .............. 6-1136-113
To delete remote bridge VLAs on Ethernet TUs ................................................................................................ 6-1146-114
7 Alarm management concepts
Overview ....................................................................................................................................................................................... 7-17-1
Alarm Severity Assignment Profile (ASAP) concepts ................................................................................................. 7-27-2
8 Alarm management tasks
Overview ....................................................................................................................................................................................... 8-18-1
To create a newAlarm Severity Assignment Profile (ASAP) ................................................................................... 8-28-2
To modify an existing ASAP ................................................................................................................................................. 8-38-3
To delete an ASAP .................................................................................................................................................................... 8-58-5
To viewASAP information .................................................................................................................................................... 8-68-6
To view an assignment list for a specified ASAP .......................................................................................................... 8-78-7
To assign an ASAP to one or several managed objects ............................................................................................. 8-108-10
To view assigned ASAPs for a specified managed object ........................................................................................ 8-138-13
To assign one or more ASAPs in different groups to one or several managed objects .................................. 8-168-16
To assign one or several E resources to an ASAP ................................................................................................... 8-198-19
9 Timing provisioning concepts
Overview ....................................................................................................................................................................................... 9-19-1
etwork element timing .......................................................................................................................................................... 9-29-2
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
viii 365-312-877R7.2Issue 4 November 2009
etwork synchronization ........................................................................................................................................................ 9-59-5
Timing quality levels ................................................................................................................................................................ 9-79-7
Priorities ........................................................................................................................................................................................ 9-99-9
Retiming ...................................................................................................................................................................................... 9-119-11
Parameters for provisioning timing sources .................................................................................................................. 9-129-12
Parameters for provisioning system timing ................................................................................................................... 9-179-17
Parameters for provisioning station clock output ........................................................................................................ 9-219-21
Parameters for provisioning output port timing ........................................................................................................... 9-259-25
10 Timing provisioning tasks
Overview .................................................................................................................................................................................... 10-110-1
To view a list of E timing ports ...................................................................................................................................... 10-210-2
To modify an E timing port .............................................................................................................................................. 10-310-3
To view a list of E system timing sources ................................................................................................................... 10-510-5
To modify an E system timing source .......................................................................................................................... 10-610-6
To modify E system timing status details ................................................................................................................... 10-710-7
To view a list of E timing sources .................................................................................................................................. 10-910-9
To modify an E timing source ...................................................................................................................................... 10-1010-10
To view a list of station clock output timing sources ............................................................................................... 10-1210-12
To modify a station clock output timing source ........................................................................................................ 10-1310-13
To modify E station clock output timing status ...................................................................................................... 10-1410-14
11 Traffic provisioning concepts
Overview .................................................................................................................................................................................... 11-111-1
SDH traffic provisioning concepts
Transmission plan .................................................................................................................................................................... 11-211-2
Cross-connections ................................................................................................................................................................... 11-411-4
VC-n concatenation ................................................................................................................................................................ 11-711-7
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
ix
Subnetwork connection protection (SCP) ................................................................................................................... 11-811-8
Multiplex section protection (MSP) ............................................................................................................................... 11-1011-10
Ethernet traffic provisioning concepts
TransLA® Ethernet over SDH implementation ...................................................................................................... 11-1311-13
Virtual concatenation ........................................................................................................................................................... 11-1811-18
Ethernet port provisioning ................................................................................................................................................. 11-2111-21
Auto negotiation and flow control .................................................................................................................................. 11-2611-26
Quality of service (QoS) overview ................................................................................................................................. 11-2911-29
Ethernet performance monitoring ................................................................................................................................... 11-3211-32
12 Traffic provisioning tasks
Overview .................................................................................................................................................................................... 12-112-1
Provisioning of cross-connections
To view cross-connections ................................................................................................................................................... 12-212-2
To add an uncorrelated cross-connection ....................................................................................................................... 12-512-5
To convert a cross-connection ............................................................................................................................................ 12-712-7
To delete a cross-connection ............................................................................................................................................... 12-812-8
Provisioning of MSP protection groups
To view a list of MSP protection groups ......................................................................................................................... 12-912-9
To add an MSP protection group ..................................................................................................................................... 12-1112-11
To modify an MSP protection group .............................................................................................................................. 12-1312-13
To delete an MSP protection group ................................................................................................................................ 12-1412-14
To operate an MSP protection switch ............................................................................................................................ 12-1512-15
13 Traffic maintenance concepts
Overview .................................................................................................................................................................................... 13-113-1
Port types .................................................................................................................................................................................... 13-213-2
Trail termination points (TTP) ............................................................................................................................................ 13-513-5
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
x 365-312-877R7.2Issue 4 November 2009
14 Performance monitoring (PM) concepts
Overview .................................................................................................................................................................................... 14-114-1
The performance monitoring process .............................................................................................................................. 14-214-2
Performance measurements ................................................................................................................................................. 14-314-3
Available PM data ................................................................................................................................................................. 14-1114-11
Thresholding ........................................................................................................................................................................... 14-1914-19
Ethernet performance monitoring ................................................................................................................................... 14-2614-26
Configuration of the OMS ................................................................................................................................................. 14-3514-35
Data storage and recovery ................................................................................................................................................. 14-3614-36
15 Performance monitoring (PM) tasks
Overview .................................................................................................................................................................................... 15-115-1
To enable/disable performance monitoring and history binning ............................................................................ 15-215-2
To set PM counter thresholds .............................................................................................................................................. 15-415-4
To view PM data ...................................................................................................................................................................... 15-915-9
To define filter criteria for the presentation of PM information .......................................................................... 15-1115-11
To define an Ethernet service route for round trip delay measurements .......................................................... 15-1315-13
To modify traffic classes .................................................................................................................................................... 15-1715-17
To perform a one-time round trip delay measurement for test purposes .......................................................... 15-1915-19
To start a cyclic round trip delay measurement ......................................................................................................... 15-2115-21
To delete an Ethernet service route ................................................................................................................................ 15-2315-23
16 Software and NE database management concepts
Overview .................................................................................................................................................................................... 16-116-1
Functionality description ...................................................................................................................................................... 16-216-2
Software storage ...................................................................................................................................................................... 16-516-5
17 Software and NE database management tasks
Overview .................................................................................................................................................................................... 17-117-1
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
xi
Tasks related to E generics
To view a list of E generics stored on the management system .......................................................................... 17-317-3
To add an E generic to the management system ....................................................................................................... 17-417-4
To delete an E generic from the management system ............................................................................................ 17-517-5
To transfer an E generic from the management system to an E ...................................................................... 17-617-6
To schedule the transfer of an E generic from the management system to an E ....................................... 17-817-8
To view a list of in-progress transfers of E generics ............................................................................................ 17-1017-10
To abort an in-progress E generic transfer ............................................................................................................... 17-1117-11
To view a list of E generics stored on an E .......................................................................................................... 17-1417-14
To activate an E generic on an E .............................................................................................................................. 17-1617-16
To schedule E generic activation ................................................................................................................................. 17-1917-19
Tasks related to generics on remote devices
To transfer a remote device generic from the management system to an E ................................................. 17-2217-22
To activate a remote device generic on an E ........................................................................................................... 17-2417-24
To transfer a remote device generic from an E to a remote device ................................................................. 17-2717-27
To activate a remote device generic ............................................................................................................................... 17-3017-30
To schedule the transfer of a remote device generic from an E to a remote device .................................. 17-3217-32
To schedule the activation of a remote device generic ............................................................................................ 17-3517-35
Tasks related to E databases
To view a list of E database versions stored on the management system ..................................................... 17-3817-38
To view a list of E database versions stored on an E ........................................................................................ 17-4117-41
To back up E database versions onto the management system ......................................................................... 17-4217-42
To schedule the backup of an E database version onto the management system ...................................... 17-4717-47
To restore an E database version from the management system to an E ................................................... 17-4917-49
Glossary
Index
Contents
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
xii 365-312-877R7.2Issue 4 November 2009
About this documentAbout this document
Purpose
This information product provides information specific to the 1643 Access Multiplexer
AM / 1643 Access Multiplexer Small AMS network element managed with Optical
Management System (OMS). It is designed to cover mainly the OMS tasks that are
traditionally related to the element management level.
Safety information
For your safety, this document contains safety statements. Safety statements are given at
points where risks of damage to personnel, equipment, and operation may exist. Failure to
follow the directions in a safety statement may result in serious consequences.
Conventions used
These conventions are used in this document:
Numbering
The chapters of this document are numbered consecutively. The page numbering restarts
at “1” in each chapter. To facilitate identifying pages in different chapters, the page
numbers are prefixed with the chapter number. For example, page 2-3 is the third page in
chapter 2.
Cross-references
Cross-reference conventions and numbering conventions are identical. The first number
in a reference to a particular page refers to the corresponding chapter.
Keyword blocks
This document contains so-called keyword blocks to facilitate the location of specific text
passages. The keyword blocks are placed to the left of the main text and indicate the
contents of a paragraph or group of paragraphs.
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
xiii
Typographical conventions
Special typographical conventions apply to elements of the graphical user interface
(GUI), file names and system path information, keyboard entries, alarm messages, and so
on
• Examples of text that appears on a graphical user interface (GUI), such as menu
options, window titles or push buttons:
– Provision…, Delete, Apply, Close, OK (push-button)
– Provision Timing/Sync (window title)
– View Equipment Details… (menu option)
– Administration→ Security→ User Provisioning… (path for invoking awindow)
• Examples for file names and system path information:
– console
– /usr/local/bin/
• Examples for keyboard entries:
– F1, Esc X, Alt-F, Ctrl-D, Ctrl-Alt-Del (simple keyboard entries)
A hyphen between two keys means that both keys have to be pressedsimultaneously. Otherwise, press a single key or a number of keys in sequence.
Abbreviations
Abbreviations used in this document can be found in the “Glossary” unless it can be
assumed that the reader is familiar with the abbreviation.
Orientation aids
This document contains the following orientation aids:
• Overall TOC
• Chapter TOCs
• Index
The following graphic depicts the principle structure of this document:
About this document
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
xiv 365-312-877R7.2Issue 4 November 2009
Overall TOC
The overall table of contents (TOC) provides a structural overview of the entire
document. It lists the content of each chapter and the associated page number where the
respective information can be found.
The overall table of contents can be found after the legal page, before the “About this
information product” preface.
Chapter TOCs
Each chapter contains a table of contents (TOC) in its “Overview” section. The scope of
each chapter TOC is limited to the corresponding chapter. As in the overall TOC, page
numbers indicate where the respective information can be found.
Index
This manual also contains an alphabetical index, which can be found at the end of the
document, after the “Glossary”.
The index helps users to find specific information quickly by providing an alphabetical
list of key words with associated page numbers.
Related information
The manuals related to 1643 Access Multiplexer AM / 1643 Access Multiplexer Small
AMS are shown in the following table:
Overall TOC
Chapter TOC
Index
About this document
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
xv
Document title Document code
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS Applications
and Planning Guide
Presents a detailed overview of the system, describes its applications, gives
planning requirements, engineering rules, ordering information, and technical
specifications.
365-312-801R7.2 (109635771)
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS User
Operations Guide
Provides step-by-step information for use in daily system operations. The manual
demonstrates how to perform system provisioning, operations, and administrative
tasks by use of ITM-CIT.
365-312-807R7.2 (109635813)
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS Alarm
Messages and Trouble Clearing Guide
Gives detailed information on each possible alarm message. Furthermore, it
provides procedures for routine maintenance, troubleshooting, diagnostics, and
component replacement.
365-312-803R7.2 (109635763)
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS Installation
Guide
A step-by-step guide to system installation and set up. It also includes information
needed for pre-installation site planning and post-installation acceptance testing.
365-312-802R7.2 (109635797)
Documentation CD-ROM 1643 Access Multiplexer AM / 1643 Access Multiplexer
Small AMS (all manuals on a CD-ROM)
365-312-811R7.2 (109635789)
The documentation set related to OMS is shown in the following table:
Document title Document code
OMS Getting Started Guide
Instructs new users how to use OMS. This document contains a glossary of terms.
365-315-145R5.0.2
OMS Connection Management Guide
Instructs users how to use OMS to provision and manage network connections.
365-315-150R5.0.2
OMS etwork Element Management Guide
Instructs users how to use OMS to provision and manage network elements.
365-315-146R5.0.2
OMS Ethernet Management Guide
Instructs users on how to use the Ethernet Management feature to provision and
manage Ethernet connections in a network.
365-315-147R5.0.2
OMS Service Assurance Guide
Instructs users on how to manage and interpret fault information collected from the
network.
365-315-148R5.0.2
OMSAdministration Guide
Instructs users on how to administer and maintain OMS and the network.
365-315-149R5.0.2
About this document
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
xvi 365-312-877R7.2Issue 4 November 2009
In addition, it is highly recommended to consult the TransLA® Ethernet SDH Transport
Solution Applications and Planning Guide, 365-377-001 (109584045) when planning to
use 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS for Ethernet
applications.
Document support
The document support telephone numbers are:
• 1 630 713 5000 (for all countries)
• 1 888 727 3615 (for the continental United States)
Technical support
For technical support, contact your local customer support team. Reach them via the web
(https://support.lucent.com/) or the telephone number listed under the Technical
Assistance Center menu (http://www.lucent.com/contact/) .
How to order
This information product can be ordered with the order number 365-312-877R7.2 at the
Customer Information Center (CIC), see http://www.cic.lucent.com/.
How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.
alcatel-lucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com) .
About this document
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
xvii
1 1Safety
Overview
Purpose
The aim of this chapter on safety is to provide users of 1643 Access Multiplexer AM /
1643 Access Multiplexer Small AMS systems with the basic safety information.
Potential sources of danger
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS equipment has
been developed in line with the present state-of-the-art and fulfils the current national and
international safety requirements. It is provided with a high degree of operational safety
resulting from many years of development experience and continuous stringent quality
checks in our company.
The equipment is safe in normal operation. There are, however, some potential sources of
danger that cannot be completely eliminated. In particular, these arise during the:
• Opening of housings or equipment covers
• Manipulation of any kind within the equipment, even if it has been disconnected from
the power supply
• Disconnection of optical or electrical connections
through possible contact with the following:
• Live parts
• Laser light
• Hot surfaces
• Sharp edges
Contents
General notes on safety 1-3
Structure of safety statements 1-3
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-1
Symbols used in hazard statements 1-5
Basic safety aspects 1-6
Specific safety areas 1-8
Laser safety 1-9
Electrostatic discharge 1-12
Safety Overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-2 365-312-877R7.2Issue 4 November 2009
General notes on safety
Structure of safety statements
Overview
Safety statements describe the safety risks relevant while performing tasks on
Alcatel-Lucent products during deployment and/or use. Failure to avoid the hazards may
have serious consequences.
General structure
Safety statements include the following structural elements:
Item Structure element Purpose
1 Safety alert symbol Indicates the potential for personal injury
(optional)
2 Safety symbol Indicates hazard type (optional)
3 Signal word Indicates the severity of the hazard
4 Hazard type Describes the source of the risk of damage or
injury
5 Safety message Consequences if protective measures fail
6 Avoidance message Protective measures to take to avoid the hazard
7 Identifier The reference ID of the safety statement
(optional)
Lifting this equipment by yourself can result in injury
due to the size and weight of the equipment.
Always use three people or a lifting device to transport
and position this equipment. [ABC123]
CAUTION
Lifting hazard
B C D
E F
G
H
Safety General notes on safetyStructure of safety statements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-3
Signal words
The signal words identify the hazard severity levels as follows:
Signal word Meaning
DAGER Indicates an extremely hazardous situation which, if not avoided, will
result in death or serious injury.
WARIG Indicates a hazardous situation which, if not avoided, could result in
death or serious injury.
CAUTIO Indicates a hazardous situation which, if not avoided, could result in
minor or moderate injury.
OTICE Indicates a hazardous situation not related to personal injury.
Safety General notes on safetyStructure of safety statements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-4 365-312-877R7.2Issue 4 November 2009
Symbols used in hazard statements
Symbol table
The following symbols are defined for hazard statements:
Legend:
1 Personal injury symbol 12 Heavy overhead load
2 Electric shock 13 oxious substance
3 Hazard of laser radiation 14 Explosion hazard
4 Components sensitive to electrostatic discharge(ESD)
15 Falling object hazard
5 Electromagnetic radiation 16 Risk of suffocation
6 Flammable material / risk of fire 17 Pinch hazard
7 Service disruption hazard 18 Lifting hazard, heavy object
8 Laceration hazard 19 Inhalation hazard
9 Corrosive substance 20 Slip hazard
10 Hazard caused by batteries 21 Trip hazard
11 Hot surface 22 Hazard of falling
1
2 3 4 5 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
6
Safety General notes on safetySymbols used in hazard statements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-5
Basic safety aspects
General safety requirements
In order to keep the technically unavoidable residual risk to a minimum, it is imperative
to observe the following rules:
• Transport, storage and operation of the system must be under the permissible
conditions only.
See accompanying documentation and information on the system.
• Installation, configuration, and disassembly must be carried out only by expert
personnel and with reference to the respective documentation.
Due to the complexity of the system, the personnel requires special training.
• The system must be operated by expert and authorized users only.
The user must operate the system only after having read and understood this chapter
on safety and the parts of the documentation relevant to operation. For complex
systems, additional training is recommended. Any obligatory training for operating
and service personnel must be carried out and documented.
• The system must not be operated unless it is in perfect working order.
Any faults and errors that might affect safety must be reported immediately by the
user to a person in responsibility.
• The system must be operated only with the connections and under the environmental
conditions as described in the documentation.
• Any conversions or changes to the system or parts of the system (including the
software) must be carried out by qualified Alcatel-Lucent personnel or by expert
personnel authorized by Alcatel-Lucent.
All changes carried out by other persons lead to a complete exemption from liability.
o components/spare parts must be used other than those recommended by the
manufacturer and those listed in the procurement documents.
• The removal or disabling of safety facilities, the clearing of faults and errors, and the
maintenance of the equipment must be carried out by specially qualified personnel
only.
The respective parts of the documentation must be strictly observed. The
documentation must also be consulted during the selection of measuring and test
equipment.
• Calibrations, special tests after repairs, and regular safety checks must be carried out,
documented, and archived.
• on-system software is used at one’s own risk. The use/installation of non-system
software can adversely affect the normal functioning of the system.
• Only use tested and virus-free data carriers (CD, DVD, floppy disks, streamer tapes,
…).
Safety General notes on safetyBasic safety aspects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-6 365-312-877R7.2Issue 4 November 2009
Summary of important safety instructions
Especially observe the following safety instructions, they are of particular importance for
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS systems:
• This equipment is to be installed only in Restricted Access Areas in business and
customer premises.
Applications in accordance with Articles 110-16, 110-17 and 110-18 of the ational
Electrical Code, ASI/FPAo. 70. Other installations exempt from the enforcement
of the ational Electrical Code may be engineered according to the accepted practices
of the local telecommunications utility.
• This product should only be operated from the type of power source indicated on the
marking label.
• This equipment must be provided with a readily accessible disconnect device as part
of the building installation.
• Installation must include an independent frame ground drop to the building ground.
Refer to the 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS
Installation Guide.
• For information on proper mounting instructions, consult the 1643 Access Multiplexer
AM / 1643 Access Multiplexer Small AMS Installation Guide.
• Install only equipment identified in the 1643 Access Multiplexer AM / 1643 Access
Multiplexer Small AMS Installation Guide provided with this product. Use of other
equipment may result in improper connection of circuitry leading to fire or injury to
persons.
• To reduce the risk of electrical shock, do not disassemble this product. Installation and
service should be performed by trained personnel only. Opening or removing covers
and/or circuit boards may expose you to dangerous voltages or other risks. Incorrect
re-assembly can cause electrical shock when the unit is subsequently used.
• Slots and openings in this product are provided for ventilation. To protect the product
from overheating, these openings must not be blocked or covered. This product
should not be placed in a built-in installation unless proper ventilation is provided.
• ever push objects of any kind into this product through slots as they may touch
dangerous voltage points or short-cut parts that could result in a risk of fire or
electrical shock. ever spill liquids of any kind on the product.
Safety General notes on safetyBasic safety aspects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-7
Specific safety areas
Overview
Purpose
The aspects of “laser safety” and “handling of components sensitive to electrostatic
discharge (ESD)” are of vital importance for the 1643 Access Multiplexer AM / 1643
Access Multiplexer Small AMS equipment. Therefore, the key safety instructions for
these subjects are summarized in the following.
Contents
Laser safety 1-9
Electrostatic discharge 1-12
Safety Specific safety areasOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-8 365-312-877R7.2Issue 4 November 2009
Laser safety
Basics
Optical fiber telecommunication systems, their associated test sets, and similar operating
systems use semiconductor laser transmitters that emit infrared (IR) light at wavelengths
between approximately 800 nanometers and 1600 nanometers. The emitted light is above
the red end of the visible spectrum, which is normally not visible to the human eye.
Although radiant energy at near-IR wavelengths is officially designated invisible, some
people can see the shorter wavelength energy even at power levels several orders of
magnitude below any that have been shown to cause injury to the eye.
Conventional lasers can produce an intense beam of monochromatic light. The term
monochromaticity means a single wavelength output of pure color that may be visible or
invisible to the eye. A conventional laser produces a small-size beam of light, and because
the beam size is small the power density (also called irradiance) is very high.
Consequently, lasers and laser products are subject to federal and applicable state
regulations as well as international standards for their safe operation.
A conventional laser beam expands very little over distance, or is said to be very well
collimated. Thus, conventional laser irradiance remains relatively constant over distance.
However, lasers used in lightwave systems have a large beam divergence, typically 10 to
20 degrees. Here, irradiance obeys the inverse square law (doubling the distance reduces
the irradiance by a factor of 4) and rapidly decreases over distance.
System design
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS system
complies with the Food and Drug Administration’s Center for Devices and Radiological
Health (FDA/CDRH) regulations FDA/CDRH 21 CFR 1040.10 and 1040.11 as a Class I
and with IEC 60825-1 as a Class 1 Optical Fiber Telecommunication laser product.
The system has been designed to ensure that the operating personnel is not endangered by
laser radiation during normal system operation. The safety measures specified in the
FDA/CDRH regulations and the international standards IEC 60825 and DI/E 60825
respectively are met.
Optical safety declaration (if laser modules used)
Alcatel-Lucent declares that this product is compliant with all essential safety
requirements as stated in IEC 60825-Part 1 and 2 “Safety of laser products” and “Safety
of optical fibre telecommunication systems”. Futhermore Alcatel-Lucent declares that the
warning statements on labels on this equipment are in accordance with the specified laser
radiation class.
Safety Specific safety areasLaser safety
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-9
Laser safety precautions for optical fiber telecommunication systems
In its normal operating mode, an optical fiber telecommunication system is totally
enclosed and presents no risk of eye injury. It is a class I/1 system under the FDA and IEC
classifications.
The fiber optic cables that interconnect various components of an optical fiber
telecommunication system can disconnect or break, and may expose people to laser
emissions. Also, certain measures and maintenance procedures may expose the technician
to emission from the semiconductor laser during installation and servicing. Unlike more
familiar laser devices such as solid-state and gas lasers, the emission pattern of a
semiconductor laser results in a highly divergent beam. In a divergent beam, the
irradiance (power density) decreases rapidly with distance. The greater the distance, the
less energy will enter the eye, and the less potential risk for eye injury. Inadvertently
viewing an un-terminated fiber or damaged fiber with the unaided eye at distances greater
than 130 to 160 mm (5 to 6 in) normally will not cause eye injury, provided the power in
the fiber is less than a few milliwatts at the near IR wavelengths and a few tens of
milliwatts at the far IR wavelengths. However, damage may occur if an optical instrument
such as a microscope, magnifying glass, or eye loupe is used to stare at the energized
fiber end.
CAUTION
Laser hazard
Use of controls, adjustments, and procedures other than those specified herein may result
in hazardous laser radiation exposure.
Laser safety precautions for enclosed systems
Under normal operating conditions, optical fiber telecommunication systems are
completely enclosed; nonetheless, the following precautions shall be observed:
1. Because of the potential for eye damage, technicians should not stare into optical
connectors or broken fibers
2. Under no circumstance shall laser/fiber optic operations be performed by a technician
before satisfactorily completing an approved training course
3. Since viewing laser emissions directly in excess of class I/1 limits with an optical
instrument such as an eye loupe greatly increases the risk of eye damage, appropriate
labels must appear in plain view, in close proximity to the optical port on the
protective housing/access panel of the terminal equipment.
Safety Specific safety areasLaser safety
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-10 365-312-877R7.2Issue 4 November 2009
Laser safety precautions for unenclosed systems
During service, maintenance, or restoration, an optical fiber telecommunication system is
considered unenclosed. Under these conditions, follow these practices:
1. Only authorized, trained personnel shall be permitted to do service, maintenance and
restoration. Avoid exposing the eye to emissions from unterminated, energized optical
connectors at close distances. Laser modules associated with the optical ports of laser
circuit packs are typically recessed, which limits the exposure distance. Optical port
shutters, automatic power reduction (APR), and automatic power shut down (APSD)
are engineering controls that are also used to limit the emissions. However,
technicians removing or replacing laser circuit packs should not stare or look directly
into the optical port with optical instruments or magnifying lenses. (ormal eyewear
or indirect viewing instruments such as Find-R-Scopes are not considered magnifying
lenses or optical instruments).
2. Only authorized, trained personnel shall use optical test equipment during installation
or servicing since this equipment contains semiconductor lasers. (Some examples of
optical test equipment are optical time domain reflectometers (OTDRs), hand-held
loss test sets).
3. Under no circumstances shall any personnel scan a fiber with an optical test set
without verifying that all laser sources on the fiber are turned off.
4. All unauthorized personnel shall be excluded from the immediate area of the optical
fiber telecommunication systems during installation and service.
Consult ASI Z136.2 American ational Standard for Safe Use of Lasers in the U.S. or
outside the U.S., IEC-60825, Part 2 for guidance on the safe use of optical fiber optic
communication systems in the workplace.
Safety Specific safety areasLaser safety
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-11
Electrostatic discharge
Introduction
Electrostatic discharge (ESD), caused by touching with the hand for example, can destroy
semiconductor components. The correct operation of the complete system is then no
longer assured.
Industry experience has shown that all semiconductor components can be damaged by
static electricity that builds up on work surfaces and personnel. The electrostatic
discharge can also affect the components indirectly via contacts or conductor tracks. The
electrostatic charges are produced by various charging effects of movement and contact
with other objects. Dry air allows greater static charges to accumulate. Higher potentials
are measured in areas with low relative humidity, but potentials high enough to cause
damage can occur anywhere.
The barred-hand symbol
Circuit packs containing components that are especially sensitive to electrostatic
discharge are identified by warning labels bearing the barred-hand symbol.
ESD instructions
Observe the following ESD instructions to avoid damage to electrostatic-sensitive
components:
• Wear working garment made of 100% cotton to avoid electrostatic charging.
• Touch the circuit packs at the edges or the insertion and removal facilities only.
• Ensure that the rack is grounded.
• Wear conductively connected wrist straps and connect them to the rack ESP bonding
point.
• Work in an area which is protected against electrostatic discharge. Use conducting
floor and bench mats which are conductively connected to the rack ESP bonding
point.
• Conductively connect all test equipment and trolleys to the rack ESP bonding point.
Safety Specific safety areasElectrostatic discharge
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
1-12 365-312-877R7.2Issue 4 November 2009
• Store and ship circuit packs and components in their shipping packing. Circuit packs
and components must be packed and unpacked only at workplaces suitably protected
against build-up of charge.
• Whenever possible, maintain the relative humidity of air above 20%.
Safety Specific safety areasElectrostatic discharge
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
1-13
2 2Security administration
tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to security
administration.
Contents
To view a list of ITM-CIT accesses 2-2
To log out ITM-CIT user(s) 2-3
To view a list of ITM-CIT access control profiles 2-4
To modify ITM-CIT access control profile(s) 2-5
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
2-1
To view a list of ITM-CIT accesses
When to use
Use this task to view a list of ITM-CIT accesses, that is, a list of ITM-CITs that are
logged into the E.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Users.
4. In the Function field, select Retrieve CIT Access List.
5. Click Go.
Result:The CIT Accesses page is displayed. It includes a list of ITM-CITs that are
logged into the E.
E N D O F S T E P S...................................................................................................................................................................................................
Security administration tasks To view a list of ITM-CIT accesses
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
2-2 365-312-877R7.2Issue 4 November 2009
To log out ITM-CIT user(s)
When to use
Use this task to log out one or more users who are logged into a ITM-CIT.
Important! Forcing a logout will terminate the selected session and may interrupt
someone else's work.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Users.
4. In the Function field, select Retrieve CIT Access List.
5. Click Go.
Result:The CIT Accesses page is displayed. It includes a list of ITM-CITs that are
logged into the E.
...................................................................................................................................................................................................
3 Click one or more radio buttons next to the ITM-CITs you wish to log out of the E.
From the Go menu, select Force Logout and click Go.
Result:The CIT user is logged out of the E.
E N D O F S T E P S...................................................................................................................................................................................................
Security administration tasks To log out ITM-CIT user(s)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
2-3
To view a list of ITM-CIT access control profiles
When to use
Use this task to view a list of ITM-CIT access control profiles.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Users.
4. In the Function field, select Retrieve/Set CIT Access Control Info.
5. Click Go.
Result:The CIT Access Control Profiles page is displayed. It includes a list of
ITM-CIT access control profiles.
E N D O F S T E P S...................................................................................................................................................................................................
Security administration tasks To view a list of ITM-CIT access control profiles
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
2-4 365-312-877R7.2Issue 4 November 2009
To modify ITM-CIT access control profile(s)
When to use
Use this task to modify ITM-CIT access control profile(s).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Users.
4. In the Function field, select Retrieve/Set CIT Access Control Info.
5. Click Go.
Result:The CIT Access Control Profiles page is displayed. It includes a list of
ITM-CIT access control profiles.
...................................................................................................................................................................................................
3 Click the radio button next to the ITM-CIT access control profile you wish to modify.
From the Go menu, select Modify selected, or Modify all and click Go.
Result:The Cit Access Control Profile parameters page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable fields that you wish to update.
The page contains three sections, one for each ITM-CIT user role. The user roles are
defined as shown in the following table:
Capability Description
Admin The user can perform all ITM-CIT administration tasks
and configure a network element.
Security administration tasks To modify ITM-CIT access control profile(s)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
2-5
Capability Description
Config The user can perform all transmission related tasks and
retrieve and edit all network element related data.
View The user can only view the network element configuration,
but cannot alter it.
Each section contains the following parameters:
• Lock-out state – indicates whether a ITM-CIT can connect to the network element.Possible values are:
– o request: no change to existing lock-out state.
– Locked: a ITM-CIT cannot connect to the E.
– ot Locked: a ITM-CIT can connect to the E.
• Password – enter the password for the capability in question. The password mustconsist of at least six characters, it must contain at least two alphabetic, and at least
two numeric characters. The maximum length is eight characters.
• Password confirm – repeat the password for the capability in question.
• Clear password – select this option to clear the current password for the capabilityin question.
• Inactivity timer – enter the time threshold (length of time, in seconds) for theinactivity timer. When a period of inactivity between the E and ITM-CIT reaches
the threshold, the connection to the ITM-CIT is dropped. Possible values are 0 to 60
seconds. If zero is entered, the inactivity timer is disabled, that means the user will
never be logged out.
...................................................................................................................................................................................................
5 Click Submit.
Result: If you selected Modify Selected, the selected ITM-CIT access control
profile is modified.
If you selected Modify All, all ITM-CIT access control profiles are modified.
E N D O F S T E P S...................................................................................................................................................................................................
Security administration tasks To modify ITM-CIT access control profile(s)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
2-6 365-312-877R7.2Issue 4 November 2009
3 3Management
communication setup
concepts
Overview
Purpose
This chapter presents concept information related to management communication setup
on 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS network elements
using OMS.
Contents
Basic DC principles 3-2
DC configurations 3-5
DC addresses 3-9
SAP address structure 3-10
Data communication channels (DCC) 3-13
Dual stack with tunneling (DSwT) 3-16
DSwT tunnel auto provisioning (TAP) 3-21
DSwT connecting areas with manual TAP tunnels 3-23
Partition repair 3-24
Partition repair guidelines 3-26
OMS-to-E connections concepts 3-28
Auto-discovery concepts (subnetworks) 3-29
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-1
Basic DCN principles
Purpose
A data communication network (DC) is used for the exchange of management data. This
section provides an overview of the data communication network and describes the type
of communication between the nodes in the network and the protocols used.
SDH management network
The SDH management network is an overlay of the transmission network. The
management system (for example OMS) and the network elements (Es) together are the
nodes of this network. The 10/100BASE-T interface and data communication channel
(DCC) provide the physical connection between the nodes.
DCN physical components
The figure below illustrates a data communication network (DC) as defined by the
Open Systems Interconnection (OSI) model. This figure refers to the physical
components and connections in the DC. It does not give information about the logical
configuration of the DC.
The figure shows three LAs and a number of DCC channels in an SDH transmission
network with point-to-point configuration and two rings connected to a management
system, for example OMS. The management system is connected to the transmission
network via gateway network elements (GE) by the LA. The network elements are
connected to each other by DCC channels.
NE NE
NE
GatewayNE
NE NE
NE
GatewayNE
NEQ-LAN(LCN)
Q-LAN
NE
NE
WaveStar®
ITM-CIT
DCC DCC
RouterQ-LAN
DCCDCC
DCC
DCC
ManagementSystem
Management communication setup concepts Basic DCN principles
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-2 365-312-877R7.2Issue 4 November 2009
Local Communications Network (LCN)
In the case where there is no DCC connectivity between nodes, a local communications
network (LC) can be used to connect the nodes to each other. See the LC on the right
side of the figure.
DCN communication protocols
Communication protocols used in the data communication network (DC) between the
nodes include:
• Ethernet (on the 10BASE-T) LAPD (on the DCC channels)
• OSI network protocol (DC wide)
The OSI network protocol (OSI-DC) is used for routing management data between
nodes in the DC.
ISO-OSI network protocol
The network protocol used between nodes is the ISO-OSI network protocol (ISO/IEC
8648). According to this protocol a node in the network can behave as an end system (ES)
or as an intermediate system (IS), sometimes called a router.
End systems (ES)
odes behaving as end systems (ES) perform no forwarding of data packets. They
communicate with each other on an end-to-end basis via intermediate systems.
Intermediate systems (IS)
Intermediate systems (IS) are used for routing data between nodes and (sub) networks.
The end system to intermediate system (ES-IS) protocol is responsible for the exchange of
data between an end system and intermediate system. A network element can act both as
an end system as well as an intermediate system. However, a OMS, for example, can only
act as end system.
IS-IS protocol
The intermediate system to intermediate system (IS-IS) protocol is used between
intermediate systems in the DC. The IS-IS protocol maintains the IS routing information
base (RIB). The information in this information base is used for the routing of
management data packets in the DC by the intermediate systems.
Management communication setup concepts Basic DCN principles
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-3
Routing information base and LSPs
Each RIB comprises a number of tables. These tables contain information on network
service access point (SAP) addresses of nodes in the network and ports of the IS
through which these nodes can be reached. Intermediate systems exchange routing
information regularly with one another as part of the IS-IS protocol by the use of link
state protocol data units (LSP).
The LSPs contain the information on the SAP addresses of nodes used in the tables of
the RIBs.
Management communication setup concepts Basic DCN principles
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-4 365-312-877R7.2Issue 4 November 2009
DCN configurations
Hierarchical routing
Hierarchical routing is used for large networks when the number of SAP entries in the
RIB databases of the intermediate systems is too large. When this happens, it causes an
exponential increase of exchanged LSPs between intermediate systems. This in turn
causes the performance of the DC to decrease due to the computation of the shortest
path first algorithm.
Hierarchical routing definition
In hierarchical routing, the DC addressing domain is divided into a number of areas.
Each area is assigned a unique identifier. The value of the area identifier of each node's
SAP address is set according to the area the node is part of.
Level 1, level 2 definition
Each area contains a number of:
• End systems
• First level (level 1) intermediate systems
• Second level (level 2) intermediate systems
Level 1 intermediate systems provide interconnectivity between nodes within the same
area. Level 2 intermediate systems provide interconnectivity between nodes belonging to
different areas.
Level 2 subdomain
The complete set of level 2 intermediate systems is also referred to as the level 2
subdomain. All areas in a network are connected via the level 2 subdomain.
Area-divisioning of a DCN
Partitioning is configuration of the DC in such a way that the exchange of LSPs
between intermediate systems is limited.
When networks are partitioned into areas, the RIB database(s) in the systems are much
smaller and hence the routing overhead is significantly reduced. Intermediate systems in
an area only exchange information (LSPs) on nodes with other systems in their own area.
Information on other areas is exchanged by level 2 intermediate systems only and
maintained by the level 2 intermediate systems of the area.
In this way, the data management load in the network is strongly reduced, while keeping
the dynamic re-routing capabilities of intermediate systems in case of failures intact. It is
important to notice that although the DC is divided into areas, ES-ES communication
between all nodes in the DC is still possible.
Management communication setup concepts DCN configurations
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-5
The figure below illustrates how a network can be partitioned into areas, connected by
level 2 intermediate systems. Each area has at least one level 2 intermediate system
assigned and can have a number of level 1 intermediate systems and end systems.
Routing management data
The following scenario describes routing management data in a divisioned network.
Suppose a node Awants to send messages to another node. If this node is in its own area
(determined by the area ID part in the area address field), the messages fromA to this
particular node (B) are routed directly using the level 1 intermediate system (see previous
figure).
Alternatively, if the required destination is in a different area (C), the messages are sent to
a second, higher level (level 2) intermediate system. This intermediate system routes the
messages coming from node A to other level 2 intermediate systems until they reach a
level 2 intermediate system attached to the destination area of C. From there it is routed
within the area using level 1 intermediate systems to node C.
otice that in both of the above cases the ES-ES communication between nodes in the
same or in different areas is still possible.
OSI-DCN networks types
In general, the OSI-DC network can be classified in three types:
• Undivided
• IS-IS clustered
• IS-IS area divided network
ES
Level 1 IS
Level 2 IS
Level 2 subdomain
A
B
C
Area 4
Area 3
Area 2
Area 1
Management communication setup concepts DCN configurations
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-6 365-312-877R7.2Issue 4 November 2009
Undivided network definition
An undivided network consists of a single routing domain. There is no division between
the nodes at the network protocol level. All nodes in the network and especially the
intermediate systems can exchange routing information with each other. Although a
network element can only be managed by one OMS at a time, the IS-IS protocol is
running between all nodes in the network. This leads to the exchange of LSPs between all
intermediate systems of the network.
IS-IS clustered DCN
In order to avoid the decrease of performance, the exchange of LSPs over a certain port
can be disabled in some nodes. A node can exchange LSPs over its DCC or LA
(10BASE-T) ports. The exchange of LSPs over the DCC channel can be disabled.
However, this also prevents the exchange of management data over this port and prevents
the use of this DCC port for re-routing in case of a failure of another port.
Disabling exchange of LSPs
Another option is to disable the exchange of LSPs over the LA (10BASE-T) port. This
can be done by choosing the IS to have a O-IS-IS port. This node is also referred to as a
O-IS-IS (gateway) node. If this is done for all intermediate systems on a LA, the LA
becomes a O-IS-IS LA. In O-IS-IS LAs, the IS-IS protocol is not run on the
LCN
ManagementSystem
ManagementSystem
RemoteCluster
ManagementSystem
LCN
Management communication setup concepts DCN configurations
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-7
10BASE-T. This prevents the exchange of LSPs between intermediate systems on a
10BASE-T. This results in a network which comprises several clusters of nodes. Between
the clusters there is no IS-IS traffic.
ES-ES communication
Within a cluster the ES-ES, ES-IS and IS-IS communication is still possible. There is
however no communication possible between nodes in different clusters. For example a
ITM-CIT can be connected to a node in a cluster for maintenance activities on nodes
within a cluster. However, it is then not possible to do a remote login from this node to a
node of another cluster.
Management system connections
The management system connected to the 10BASE-T can still communicate with all
nodes in the clusters since the ES-IS protocol on the 10BASE-T is not disabled. Important
to notice is that the nodes in a remote cluster lose their association with the management
system when O-IS-IS is chosen on the gateway node of the remote cluster. It is advised
to connect the management system to the 10BASE-T that connects the clusters to each
other and to assign O-IS-IS only to nodes on this LA.
IS-IS area divided DCN
The division of the DC in areas by introducing level 2 intermediate systems is similar to
disabling the IS-IS protocol over the 10BASE-T port of nodes, as described earlier.
Similar to clustering, the exchange of level 1 LSPs between intermediate systems in
different areas is prevented. However, level 2 LSPs are still exchanged between level 2
intermediate systems.
Management communication setup concepts DCN configurations
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-8 365-312-877R7.2Issue 4 November 2009
DCN addresses
DCN addresses
The system has two addresses in the DC:
• Ethernet address
• SAP address
Ethernet address
The Ethernet address is the unique 6-byte address of a network element. Sometimes it is
also referred to as the hardware or physical address of the node. The Ethernet address has
only local meaning on the LA and cannot be used for routing purposes. It does not
contain the information on where the node is in the data communications network.
NSAP address
The network service access point (SAP) address is used by the network protocol for
location information. The SAP address of a node is its DC wide identifier which
uniquely identifies the node in the network.
Management communication setup concepts DCN addresses
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-9
NSAP address structure
Background
The following three SAP structures can be distinguished:
• ISO DCC SAP address format (fixed 20-byte address structure). This format is used
by most Lucent Technologies network element types in the network.
• Local Lucent Technologies SAP address format (fixed 10-byte address structure).
This format is also used by a number of Lucent Technologies network element types.
• Flexible SAP address structure. An alternative to the previous two formats.
Although different SAP address formats exist, preferably all nodes in a network should
use the same address format.
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS supports the ISO
DCC SAP address format (fixed 20-byte address structure), the local Lucent
Technologies SAP address format (fixed 10-byte address structure), and the flexible
address structure.
Fixed 20-byte address structure
The fixed 20-byte address structure (ISO DCC SAP address format, in accordance with
ISO 8348) is shown in the following figure:
Address fields
The meaning of the SAP address fields is described in the following table:
Field Meaning Description
Initial domain part (IDP):
AFI Authority and format identifier specifying the SAP
address format.
The predefined value is 0x39 (hex.), indicating that the
ISO Data Country Code (ISO-DCC) is the address
format.
1 Byte
AFI Area
2 Bytes
System ID
6 Bytes 1 Byte
SEL
DSP
20 Bytes
IDP
IDI(+pad)
2 Bytes 1 Byte
DFIOrganization/
Operator
3 Bytes
Spare
2 Bytes
RD
2 Bytes
Management communication setup concepts NSAP address structure
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-10 365-312-877R7.2Issue 4 November 2009
Field Meaning Description
IDI Initial domain identifier specifying the country code.
The designation “IDI+pad” indicates that the field is
padded to its maximum length
The predefined value is 0x0000 (hex.).
Domain specific part (DSP):
DFI DSP format identifier specifying the DSP format. The predefined value is 0x80 (hex.).
Operator Organization or operator identifier representing the
network service provider (SP).
The predefined value is 0x000000 (hex.).
Spare Reserved portion of the SAP. The predefined value is 0x0000 (hex.).
RD Routing domain. The predefined value is 0x0000 (hex.).
Area Area identifier indicating the routing area to which a
node belongs.
The predefined value is 0x0000 (hex.).
System ID System identifier representing the node. The IEEE 802.3
MAC address.
A IEEE-MAC number is reserved and physically stored
on every E.
SEL Selector field used to direct the protocol data units
(PDU) to the correct destination.
The predefined value is 0x01 (hex.).
Fixed 10-byte address structure
The fixed 10-byte address structure (local Lucent Technologies SAP address format) is
shown in the following figure:
Address fields
The meaning of the SAP address fields is described in the following table:
Field Meaning Description
AFI Authority and format identifier specifying the SAP
address format.
The predefined value is 0x49 (hex.), indicating that the
ISO Data Country Code (ISO-DCC) is the address
format.
Area Area identifier indicating the routing area to which a
node belongs.
The predefined value is 0x0000 (hex.).
System ID System identifier representing the node. The IEEE 802.3
MAC address.
A IEEE-MAC number is reserved and physically stored
on every E.
1 Byte
AFI Area
2 Bytes
System ID
6 Bytes 1 Byte
SEL
10 Bytes
Management communication setup concepts NSAP address structure
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-11
Field Meaning Description
SEL Selector field used to direct the protocol data units
(PDU) to the correct destination.
The predefined value is 0x01 (hex.).
Flexible NSAP address structure
The flexible SAP address format is shown in the following figure:
Address fields
The flexible SAP address has the following fields:
Field Meaning Description
AFI Authority and format identifier specifying the SAP
address format.
The predefined value is 0x39 (hex.), indicating that the
ISO Data Country Code (ISO-DCC) is the address
format.
Flexible part May vary from 0 bytes to 12 bytes.
System ID System identifier representing the node. The IEEE 802.3
MAC address.
A IEEE-MAC number is reserved and physically stored
on every E.
SEL Selector field used to direct the protocol data units
(PDU) to the correct destination.
The predefined value is 0x01 (hex.).
In this way, the length of the flexible SAP address can vary from 8 bytes to 20 bytes.
1 Byte
AFI Flexible Part
0 to 12 Bytes
System ID
6 Bytes 1 Byte
SEL
Node Address
8 to 20 Bytes
Area Address
1 to 13 Bytes
Management communication setup concepts NSAP address structure
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-12 365-312-877R7.2Issue 4 November 2009
Data communication channels (DCC)
Data communication channels (DCC)
The data communication channels (DCC) are part of the data communication network
(DC). The channels are used to exchange management data between the management
system and the network elements. The channels are also used for communication between
the different network elements (for example remote logins). The DCC connection is
achieved by means of layer 2 protocol High Level Data Link Control (HDLC) Frame
bridging (at the data link layer level). HDLC Frame bridging always applies to two ports
(labeled TTP1 and TTP2); more than two ports (that is, broadcasting) is not supported.
The DCC connection is implemented via Layer bridging.
DCC channel selection
The following DCC channels exist on an STM-n connection:
• DCC bytes of the RSOH (bytes D1-D3) termed RS-DCC.
• DCC bytes of the MSOH (bytes D4-D12) termed MS-DCC.
Transparent DCC cross-connections
The transparent DCC cross-connect feature allows to transparently pass-through certain
DCC channels which cannot or should not be processed by the system.
Transparent DCC cross-connections are to be used when there is a router on one side of
the SDH/SOET network which uses the DCC to transport some IP-based protocol to a
router on the other side of the network. This feature can be used to avoid interworking
with equipment from a different vendor in a common routing domain.
The transparent DCC cross-connection path is transparent. This means that no processing
at all will be done as the data travels along the path. Therefore, the entire transparent
DCC cross-connection path counts as a single hop for the network elements at the ends of
the path.
The transparent DCC cross-connections are completely independent from the
transmission cross-connections. There is no relation between the number of “normal”
(terminated) DCC channels and the number of transparent DCC channels. They are taken
from different pools.
Therefore, enabling a “normal” (terminated) DCC channel does not reduce the number of
available transparent DCC channels, and vice versa.
For each DCC channel, transparent DCC cross-connection and traditional DCC
processing on the CTL/DCF are mutually exclusive.
Management communication setup concepts Data communication channels (DCC)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-13
Functional requirements
The following functional requirements to the transparent DCC channels:
• The number of bidirectional transparent DCC channels is limited to 25.
• It is possible to use transparent DCC cross-connections for RS-DCC and MS-DCC.
Establishing transparent DCC cross-connections
Transparent DCC cross-connections are to be established by identification of the two
ports of an E that are to be cross-connected and the DCC type (RS-DCC or MS-DCC).
LAPD protocol
The LAPD protocol, which controls communication between the network elements,
operates in either of the following modes:
• etwork side
The LAPD is assigned as network. This mode complies with the standards and
interoperates successfully with other LAPDs operating in user_side mode.
• User side
The LAPD is assigned as user. This mode complies with the standards and
interoperates successfully with other LAPDs operating in network_side mode.
Please note that the DCCs work according to the master/slave principle, that is the LAPD
modes of two interconnected SDH ports must be set differently. A corresponding
“user-network side failure” alarm will be generated if the LAPD mode is the same at both
ends of a DCC.
AITS and UITS supported
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS network elements
support the acknowledged information transfer service (AITS) and the unacknowledged
information transfer service (UITS) as the basis for the LAPD or LinkID protocol with
the UITS mode being the default mode of operation. AITS should only be used if required
by other E types. UITS is furthermore used for link protocol at the same time when
AITS is chosen.
Management communication setup concepts Data communication channels (DCC)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-14 365-312-877R7.2Issue 4 November 2009
AITS and UITS functional principles
In the LAPD protocol, all PDUs are sent with a checksum to verify that the data has not
been corrupted during the transmission over the DCC link. If a PDU is received with a
bad checksum, it is not acknowledged and will be resent:
• In the unacknowledged information transfer service (UITS) (default), corrupted PDUs
are ignored and no further actions taken. Upper layers of the OSI stack are responsible
for recovery actions.
• In the acknowledged information transfer service (AITS), PDUs are numbered and
transmitted sequentially, and acknowledgment PDUs are sent back from the receiver
to the sender. If a PDU is lost, that is, if the sender gets no acknowledgment, the PDU
is retransmitted.
Functional principle of the AITS
DCC over 1+1 MSP protected interfaces
To support DCC communication over 1+1 MSP protected STM-n links, two modes of
operation are defined, which can be selected independently for RS-DCC and MS-DCC
1. MSP DCC Independent Mode
In this mode the DCC channels over the working and protection STM-n interface
operate independently from the MSP protocol and can individually be
enabled/disabled. DCC protection is performed at the IS-IS protocol level.
2. MSP DCC Slave Mode
In this case the DCC information in the transmit direction is bridged over both the
working and the protection part of the MSP connection. At the receive end the DCC is
retrieved from the service (= active) part.
1Node A Node B23
Ack. 1 Ack. 2no Ack. 3 !
3retransmission of
Ack. 3
PDU 3 corrupted
Management communication setup concepts Data communication channels (DCC)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-15
Dual stack with tunneling (DSwT)
Introduction
The dual stack with tunneling (DSwT) feature provides a way to manage IP devices
through the DC network.
Amanagement system (for example OMS) is used to manage Es which use IP based
management protocols (IP Es).
Dual stack
Dual stack means adding an IP router stack to an existing OSI stack.
Tunnel
A tunnel is a unidirectional path through the OSI domain capable of transporting IP
packets. The tunnel consists of an endpoint in the OSI domain (SAP) and the
encapsulation/decapsulation mechanism to transport an IP packet in an OSI network. The
actual path taken by the encapsulated IP packet is completely determined by the normal
OSI routing mechanisms.
TCP/IP tunnelling
This feature is intended to forward IP traffic between IP managed equipment at the
borders of the SDH network and their IP-based management system.
In order to use the tunneling feature it is necessary to provision the following using OMS
or ITM-CIT:
• Map a “tunnel far-end” to each (masked) IP-destination, where all IP-addresses are
implied that fulfil the most significant bits (non-masked) part of the IP-destination.
Only the far-end of a tunnel needs to be identified through its SAP address (the
near-end is implicitly this E). Resources for a maximum of 50 tunnels must be
provided.
• Provision its own IP-address in the E.
• Enable IP routing.
• Add routing information for forwarding towards an external IP router, when the
IP-destination is not connected to the Q-LA of the E.
• Enable (when desired) automatic creation of tunnels, towards all other Es in this
area that have automatic creation enabled. ote that manual provisioning of tunnels as
in “1” is needed for a tunnel that spans a number of areas, while subsequent tunneling
within the destination area can make use of automatically created tunnels.
Network architecture
The network architecture in the figure is used in this example.
Management communication setup concepts Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-16 365-312-877R7.2Issue 4 November 2009
IP tunnel architecture
The IP tunnel architecture in the figure is used in this example.
Tunnel configuration
A tunnel can be seen as a set of two static routing entries in nodes on the edge of the OSI
network and the corresponding static entries in the routing table. The term tunnel may be
misleading because it is often associated with connections which must be set up in
advance. In this case, only some routing and mapping information needs to be
provisioned and no communication between two systems is needed to set up the “tunnel”
between them. To avoid confusion, it is better to speak of encapsulation and to think of
the OSI network as a non broadcast multiple access (BMA) subnetwork within the IP
network.
The Es need to be configured with one IP address on the LA side, connected to the IP
subnet with the IP Es. The LA can be used for both OSI and IP traffic. The same
Ethernet address will be used for both protocols.
DS NE DS NE
NE
NE
DCN
LAN
IP Host
LAN (IP & OSI)
IPRouter
LAN (IP & OSI)
ManagementSystem
IP-basedManagement
System
other IP-managedEquipment
IP Host
IP Network
DS NE DS NE
DCN
LAN
IPRouter
IP-basedManagement
System
other IP-managedEquipment
IP Network LAN
IP IPIP tunnel
Management communication setup concepts Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-17
IP encapsulation
The IP packets are encapsulated in connectionless network protocol (CLP) packets
which are routed through the OSI-only node which routes the CLP packets as normal,
totally oblivious of the CLP packets contents.
IP and DCC
A benefit of the tunneling approach, is that IP need not to be carried on the DCC. Only
the CLP packets (possibly carrying IP) go on to the DCC.
IP routing
In the dual stack with tunnelling configuration, a second network layer entity (the IP
router) is added alongside the existing OSI network layer entity (CLP). The CLP
entity has the routing tables and the mechanisms to automatically populate them – namely
the IS-IS and ES-IS dynamic routing protocols.
This is not the case for the IP routing tables since there is no IP dynamic routing protocol
to populate the IP routing tables. IP routing tables have to be manually provisioned by the
operator.
DSwT routing table
A routing table, IP or OSI, is divided into 2 columns:
• “Final destinations” of each network node,
• for each final destination, the identity of the “next hop” which is the next network
node in the path towards the final destination.
The table below shows a simplified IP routing table for IP router in a DSwT stack. It is
divided into 2 main columns. These two parts of the routing table will be discussed
separately.
Final destination Next hop
Subnetwork Node
130.44.5.0/24 LA 0 <local>
120.23.4.0 / 24 LA 0 130.44.5.8
150.35.10.0 / 24 DCC 1 -
150.35.20.0 / 24 DCC 2 -
160.22.0.0 / 16 CLP-Tunnel SAP (node X)
Management communication setup concepts Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-18 365-312-877R7.2Issue 4 November 2009
Final destination
This column of the routing table is a list of all the final destination nodes. When a packet
is received at this node, then the destination address in that packet is checked against the
list of destinations in the destination column of the routing table. If there is no entry in the
table for the packet destination, then the node won't know how to route the packet and
will execute the error procedure (which involves discarding the packet and trying to send
an error message packet back to the source). If a match is found, the next hop towards the
destination can be looked up in he “ext hop” column.
IP prefixes
An IP prefix is a mechanism of identifying a collection of IP addresses with some
common root. The general principle is to choose a mask which identifies a suitable first
part of the IP address which summarizes a number of addresses. For example, the
addresses 120.10.2.1, 120.10.2.5 and 120.10.2.13 can be summarized by the IP prefix:
120.10.2.0 / 24. The 24 identifies the first 24 bits of the address. Summarizing IP
addresses is a very powerful way to reduce the number of entries in a routing table.
Next hop
Two pieces of information are needed in order to identify the next hop node:
• On which subnetwork (for example on which exit port) is the next hop node,
• Which node on that subnetwork is the next hop
To send a packet to the destination “Dest”, the source must identify the node next hop.
This is identified by the subnetwork (on port 2 of source) and then the node on that
subnetwork (identified by B). In OSI terminology the address B is known as a subnetwork
point of attachment (SPA), which is the point that the node is attached to the
subnetwork.
The second column in the routing table is the next hop and is divided into 2 parts:
• The next hop subnetwork
• The next hop node
Next hop subnetwork
A router, by its nature, must be connected to multiple subnetworks. Each subnetwork is
connected to a separate port on that router. The next hop port identifies the subnetwork to
exit this node for the next hop towards the destination.
Management communication setup concepts Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-19
For the DSwT IP router entity, there are 2 types of port/subnetwork:
1. LA: this is the Ethernet (common subnetwork type for IP routers).
2. CLP tunnel: this is a logical subnetwork created by the OSI CLP network itself.
From the IP router perspective, this subnetwork is seen as a non-broadcast multiple
access (BMA) subnetwork. The IP router simply sees all the neighbor IP router
entities connected together to this BMA. It does not see any of the OSI CLP nodes
inside this network.
Next hop node
Once the correct exit port (subnetwork) has been identified, the correct node on that
subnetwork must be identified by its SPA. This could be an Ethernet address (for a
LA), or a X.121 address for a X.25 subnetwork. When the subnetwork is a
point-to-point link then there is no need to identify the next hop. There are various ways
to identify the next hop node, and they depend on the type of subnetwork that node is
attached to. An overview is provided in the following table:
Subnetwork type Next hop node (identity type)
LA IP address or none if the destination is actually on this LA (there is no next
hop node).
CLP tunnel SAP
Management communication setup concepts Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-20 365-312-877R7.2Issue 4 November 2009
DSwT tunnel auto provisioning (TAP)
Introduction
Provisioning all the entries in the routing tables of all the nodes can be a considerable
effort and is error prone, particularly when networks comprise hundreds of nodes. It
would be desirable to have a mechanism which reduces some of the necessary
provisioning to alleviate this problem. Such a mechanism has been designed. It is a
Lucent Technologies proprietary mechanism called tunnel auto provisioning (TAP).
TAP principle
The principle behind TAP is that IP routes known by DSwT nodes at the edge of the OSI
network are advertised across the OSI network to the other DSwT nodes which can then
insert these routes into their own routing tables.
This basic principle is illustrated in the following figure:
Example of two DSwT nodes advertising the IP networks they can reach. Each node
learns the others advertised routes it hears and places them in its routing table.
120.40.10.0/24
Destination
CLPN-Tunnel
Subnetwork
NSAP(A)
Node
Next Hop
120.40.20.0/24
Destination
CLPN-Tunnel
Subnetwork
NSAP(B)
Node
Next Hop
Routing Table in A Routing Table in B
NSAP A
120.4
0.1
0.0
/24
NSAP B
120.4
0.2
0.0
/24
CLNP Subnetwork
"I am NSAP(B). I canreach IP prefix
120.40.20.0 / 24"
"I am NSAP(A). I canreach IP prefix
120.40.10.0 / 24"
"If I want to reach120.40.20.0 / 24, thenI send to NSAP(B)"
"If I want to reach120.40.10.0 / 24, thenI send to NSAP(A)"
Management communication setup concepts DSwT tunnel auto provisioning (TAP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-21
otice that the advertising node is not limited to giving one IP prefix but could provide a
list of all the IP prefixes it can reach, if appropriate, each one resulting in a routing table
entry.
Management communication setup concepts DSwT tunnel auto provisioning (TAP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-22 365-312-877R7.2Issue 4 November 2009
DSwT connecting areas with manual TAP tunnels
Introduction
The TAP mechanism does not work across IS-IS areas because it distributes information
using IS-IS level 1 LSPs. However, it is likely to have a considerable number of nodes in
the OSI network and multiple areas.
Connecting areas
To allow DSwT nodes to communicate across IS-IS areas enjoying the benefits of the
auto-provisioning, a pair of “tunnels” must be manually configured between the areas.
This principle is illustrated in the following figure.
A pair of provisioned “tunnels” connecting any two nodes, one from each area, provides
bidirectional communication between the areas.
ote: TAP “tunnels” are not transitive. That is, a “tunnel” connecting areas A and B, and a
“tunnel” connecting areas B and C does not connect areas A and C. A separate “tunnel”
between areas A and C is needed.
Area A Area C
Area B
Management communication setup concepts DSwT connecting areas with manual TAP tunnels
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-23
Partition repair
Partition repair
The partition repair is needed to allow management DCs for large multi-ring networks
to be designed such that single points of failure are avoided. The use of partition-repair is
restricted to those cases where the current mechanisms cannot avoid a single point of
failure, even though a physical backup route is available.
Partition repair provides a way to enhance the robustness of the DC by providing the
capability to repair intra-area routing using connections via nodes outside the area. This is
done by creating a path outside the area, between two level 2 nodes (which are
provisioned to be partition capable level 2 nodes) that belong to distinct partitions of the
same IS-IS area. Level 1 IS-IS PDUs and CLP PDUs are encapsulated and transferred
over the level 2 path.
ote that network element types that do not support partition-repair, can exist in the
“repaired” areas; however, these network element types cannot be part of the level 2
repair path (they cannot be part of the level 1 tunnel through the level 2 domain).
A network element (E) is a physical box that contains a physical piece of equipment. A
network element can contain one or more nodes. A node is a logical part of the DC and
is the basic building block of the DC. Both intermediate systems and end systems are
considered to be nodes. Each node is identified by exactly one SAP. An SAP, or
network service access point, is the address of a node. Each node has exactly one SAP
that is unique in the entire network (usually the SAP is even globally unique). Routing
and forwarding in each node of a network is done using the target SAP.
The terminology that is used in relation to partition-repair requires some explanation. A
node can be partition-repair capable, partition-repair compatible, and partition-repair
designated. These terms are described below:
• A node is partition-repair capable if it is provisioned as such. Only possible end points
of partition-repair tunnels need to be provisioned as partition-repair capable. Such
possible end points must be attached level 2 nodes. (A level 2 node is attached if it can
forward packets to a different area, even if the level 2 node itself is not on an area
boundary).
• A node is partition-repair compatible if a partition-repair path can pass through the
node. o provisioning is needed or required to make a node partition
repair-compatible. Many of the older network element types, are not partition-repair
compatible.
• A node is partition-repair designated if it is selected as such by all the other nodes in
its area that are still connected to it via a level 1 path. The election is done by
choosing one node from the set of still-connected nodes that are partition-repair
capable. If a partition-repair designated node of a certain area learns (by listening to
level 2 communication) that there is another partition repair designated node in the
Management communication setup concepts Partition repair
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-24 365-312-877R7.2Issue 4 November 2009
same area, both of these nodes conclude that their area is partitioned. These nodes will
then establish a partition-repair path between them. The partition-repair path is a
virtual level 1 connection between the two partition-repair designated nodes that runs
through the level 2 domain. Level 1 packets are tunnelled through this virtual
connection; this removes the area partitioning.
Management communication setup concepts Partition repair
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-25
Partition repair guidelines
When to use partition repair
Only provision nodes to be partition repair capable in an area, since a single point of
failure otherwise cannot be avoided for that area. If more than one level 2 entry into an
area is used, partition repair is a valid mechanism.
How to use partition repair
To allow the healing of a partitioned area, two nodes must be provisioned as “partition
repair capable” as follows:
• At the area boundary, connecting level 2 nodes in other areas
• The potential virtual link (tunnel) should reduce the SPFs in the area to a minimum.
In case an area is partitioned due to a single failure, the two partition repair capable
level-2 nodes in each partition establish a level-1 tunnel through the level-2 subdomain, to
repair level-1 connectivity between all nodes in the two related partitions.
NE type restrictions
Observe the following E type restrictions:
• All E types, managers, and other OSI nodes (like external OSI routers) are allowed
as level 1 IS nodes or as ES-only nodes, in an area with partition repair capable Es.
When a repair tunnel is established, the partition repair designated Es advertise
information such, that the tunnel is identified as a normal level-1 route within the
area.
• All E types and other OSI nodes (like external OSI-routers) are allowed as level 2
nodes in the level 2 subdomain, as long as they are not part of the shortest inter-area
path between two partition repair capable Es in an area.
The network is expected to be designed for full management connectivity in case of a
single failure. In case of two failures, including a partitioned area and a failure in the
shortest potential tunnel route, the network is allowed to drop management
connections. Therefore not all OSI nodes in the level 2 subdomain need to be partition
compatible.
Large network restrictions
Observe the following restrictions regarding large networks:
• The manager connections that are tunnelled through a level 2 node in case of a single
failure, are counted as connections and must therefore be subtracted (like all other
rerouted connections through this node) from the maximum number as specified in
S-111 in order to identify the maximum number of acceptable connections in the case
that the network is in its normal (failure-free) state.
If 50 manager connections can be tunneled in case of a failure, and 150 manager
Management communication setup concepts Partition repair guidelines
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-26 365-312-877R7.2Issue 4 November 2009
connections are forwarded in a failure-free network, through one of the nodes in the
potential tunnel, the related node must be capable of forwarding 200 manager
connections.
The total number of managed Es in an area can be tunneled through the level 2
subdomain with regard to the maximum number of manager connections that can be
forwarded by a node. Only the shortest inter-area route between two partition repair
capable nodes in an area has to be taken into account.
• The manager connections that are received, encapsulated and forwarded into a
partition-repair tunnel, are counted as normal connections. If 100 manager
connections can be tunneled in case of a failure, the related partition designated node
must be capable of forwarding 100 manager connections.
• All areas can be provisioned to have one or more partition repair capable nodes.
Each area with one or more partition repair capable nodes requires an extra entry in
the routing table (RIB), because of initial selection of a partition repair designated
node per area.
• Avoid the use of partition repair capable Es in large areas.
A DC network design that selects small level-1 areas to use partition repair, while
the large areas are rings that need no partition repair, will be easier to understand.
Also it is easier to check that all rules are obeyed.
• The maximum number of partition repair capable Es in a network is 49.
All partition designated nodes in the level 2 subdomain require an additional entry in
the routing table of the other partition designated nodes. Up to 49 additional entries
are available, which are all used after a single failure when all 8 areas have partition
repair capable nodes and one of those areas is partitioned.
Partitioning restrictions
Amaximum of nine partition repair capable Es per area is allowed. This implies that the
partition repair capable Es can terminate a maximum of eight partition repair tunnels. A
single cable cut may imply many fiber cuts, of which more than 7 of those fiber cuts may
imply partitioning of the same area. A fiber cut between two DWDM nodes may imply a
cut of many DCC channels. The network design shall not use partition repair to cover
such topologies.
Management communication setup concepts Partition repair guidelines
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-27
OMS-to-NE connections concepts
Definition: OMS-to-NE connection
An OMS-to-E connection is the communications connection between the management
system and an E. This connection is established when the E is added to the
management system. OMS-to-E connections exist only in the management system; the
addition of an OMS-to-E connection has no influence on an E.
Functionality description
The management system is used to establish and manage OMS-to-E connections. An
OMS-to-E connection is established when an E is added to the management system.
When an OMS-to-E connection is established, the communications interface that will be
used for communication from the E to the management system is selected.
In a High Availability configuration, if any E is manually added to the primary
management system using the management system's graphical user interface, in the same
way, the E must also be manually added to the secondary management system.
Similarly, any E that is auto-discovered by the primary management system will be
auto-discovered by the secondary management system.
Preconditions
Aminimum subset of provisioning must be done before Es can be added to the
management system The craft interface terminal (ITM-CIT) must be used to provision
certain information when the E is set up.
Consult the 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS User
Operations Guide for instructions on how to provision an E so it is ready to be managed
by a management system such as OMS.
For 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS Es that use
OSI communications, the SAP address of the management system must be added to the
access list of the E so the E can communicate with the management system.
Supported communications interfaces
The communications interface is used to communicate between the management system
and the E. For 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS ,
the OSI communications interface applies.
Reference
For more detailed explanations related to the concepts of OMS-to-E connections, refer
to the OMS etwork Element Management Guide.
Management communication setup concepts OMS-to-NE connections concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-28 365-312-877R7.2Issue 4 November 2009
Auto-discovery concepts (subnetworks)
Overview
This section describes the auto-discovery process for subnetworks.
Important! CMISE Es are not automatically discovered via auto-discovery. CMISE
Es must be manually added to the management system.
Note: CMISE Es can be automatically discovered via auto-discovery if the E is
fibered to a TL1 E that has already been added to the management system.
Auto-discovery process
Auto-discovery is the process by which the management system “discovers” the topology
of a subnetwork, and ultimately a network.
When the auto-discovery process is run, the management system logs into the first E in
the subnetwork, which is the GE, inventories the GE, and discovers its neighbors in
the subnetwork. The management system then logs into the neighbor Es and inventories
them. The management system continues to log into neighbor Es until all of the Es in
the subnetwork are discovered and inventoried. The auto-discovery process also
“discovers” the physical network connections connected to the Es in the subnetwork.
This process is repeated for each of the subnetworks in the network.
The management system consolidates the discovered network topology into a working
view that is presented to users throughout the pages of the management system, most
obviously in the Network Map. The ability of the management system to “discover”
network information, instead of having it be manually entered, is significant because it
minimizes effort for the network operator and reduces the risk of errors.
Auto-discovery can only be run on Es that are connected to the other Es in the
network communications group by the data communication channel (DCC). For some E
types, the DCC is called the supervisory channel.
To log into an E, the management system uses the default login/passwords that are set
up for each E type. The management system assumes that neighbors of an E are the
same E type as the E through which they were discovered.
Once a number of Es within a ring are auto-discovered, the management system
automatically determines that they comprise a ring. For more information on the
auto-discovery of rings, see the OMS Connection Management Guide.
When auto-discovery runs
Auto-discovery is initiated whenever a full database synchronization is run. Adding an
E to the management system initiates a full database synchronization, which in turn
invokes auto-discovery.
Management communication setup concepts Auto-discovery concepts (subnetworks)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-29
When auto-discovery is blocked
When the management system cannot log into an E, any further auto-discovery on that
E is blocked. The management system may be blocked from logging in to an E for the
following reasons:
• The E is a non-managed E. The management system cannot log into non-managed
Es. on-managed Es are also known as black boxes.
• The E is a unmanageable device. The management system cannot log into
unmanageable devices.
• The management system cannot log into a managed E because some of its E
information is incorrect (typically the E login/password information).
Auto-discovery of NEs
When an E is discovered, the E type is assumed to be “unknown.” The management
system attempts to login to the discovered E using the login and password associated
with the E type of the E through which the E was discovered.
If that is not successful, one of the following happens:
• If the discovered E is of the same E type as the E through which it was
discovered, the login and password are valid and the management system is able to
log into the discovered E. When the management system begins to communicate
with the E, the correct E type is reported and the management system updates the
E type from “unknown” to the correct E type.
• If the discovered E is not of the same E type as the E through which it was
discovered, the login and password are not valid and the management system is not
able to log into the discovered E.
One of the following happens:
– If the E is of a supported E type, the user can manually provide the
management system with the correct login and password for this E using the
task “To modify an OMS-to-E connection” (p. 4-7). Once this is done, the
management system can log in to the discovered E. When the management
system begins to communicate with the E, the correct E type is reported and
the management system updates the E type from “unknown” to the correct E
type.
– If the E is not of a supported E type, the user can change the E type to either
“non-managed E” or “unmanageable device.” on-managed Es are also
known as black boxes.
ote that when an E type is “unknown,” an alarm condition occurs because the
management system is attempting to communicate with the E, but cannot because it
cannot log into the E. Once the E type is changed from “unknown,” the problem is
resolved and the host alarm is cleared. This situation can be avoided if the user manually
enters all non-managed devices (supported only in the SDH environment) and
unmanageable devices in the subnetwork before auto-discovery is initiated.
Management communication setup concepts Auto-discovery concepts (subnetworks)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-30 365-312-877R7.2Issue 4 November 2009
Auto-discovery of supported NEs
During auto-discovery, Es are discovered and added to the management system.
As each E is discovered, it is inventoried, and the following information about each E
is gathered and added to the management system. Note: This is full list of possible
information that may be discovered. The type of information discovered for each E
depends on the E type.
• Cross-connections
• Equipment
• etwork Connections – OS
• Optical Connections
• Port parameters
• Protection groups
• System parameters
• Subnetwork Discovery
• Fault – Alarms and Events
Auto-discovery of non-managed NEs and unmanageable devices
The management system discovers non-managed Es (supported only in the SDH
environment) and unmanageable devices during the auto-discovery process. However, the
management system cannot log into them during auto-discovery, so they are discovered
with an E type of “unknown.” The user must use the management system to change the
E type to “non-managed E” or “unmanageable device”, via the task “To modify an
OMS-to-E connection” (p. 4-7). on-managed Es display on the Network Map, but
unmanageable devices do not display on the Network Map.
Auto-discovery of physical network connections
During auto-discovery, physical network connections between Es are discovered and
added to the management system.
For Es that return the following information, the management system can construct the
physical network connection without having to query its neighbor(s):
• Local Port AID
• TID of the terminating neighbor
• eighbor Port AID
Although the management system does not have to query the neighbor E to construct
the physical network connection, the management system verifies the neighbor's physical
network connection port ID by conducting a database synchronization on the neighbor
E in order to auto-discover the physical network connection port ID if the port ID is not
already in the management system database.
Management communication setup concepts Auto-discovery concepts (subnetworks)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-31
Scheduling subnetwork discovery
The management system allows searching for and scheduling subnetwork discovery using
the Scheduled Tasks function.
Auto-discovery of VCGs
The Connection Auto Discovery command-line tool is used to auto discover virtual
concatenation groups (VCGs), along with their server connections, in the network. The
Connection Auto Discovery command-line tool allows the management system to
discover the connections used for Ethernet transport even if they are provisioned with a
tool other than OMS.
For more information about the Connection Auto Discovery command-line tool, see the
OMS Administration Guide.
Auto-discovery of CMISE NEs
CMISE Es may be automatically discovered when a CMISE E is reported as a
neighbor of a TL1 E in the TL1 response used by the management system for
subnetwork discovery. Through this TL1 response, the management system cannot
determine that the reported E is a CMISE E, therefore the management system
assumes that the E has a TL1 interface and attempts to log into it by sending TL1
commands. Since the CMISE E does not understand TL1 commands, the management
system never successfully logs into the CMISE E and the E remains an unknown E
in the management system database for an indefinite period of time.
Use the following procedures to prevent the management system from auto-discovery of
CMISE Es.
• If CMISE Es are connected to a TL1 E with DCC connectivity and will be
managed by the management system, these CMISE Es should be manually added to
the management system before running subnetwork discovery. This will ensure that
the management system does not attempt to add these CMISE Es since the
management system will recognize the E name as belonging to a managed CMISE
E.
• If these CMISE Es will not be managed by the management system, turn off DCC
connectivity between any TL1 Es neighbors of these CMISE Es before running
subnetwork discovery. This ensures that the TL1 Es managed by the management
system, do not report the CMISE Es as neighbors in the TL1 response.
If the management system does auto-discover a CMISE E, the CMISE E will appear
as an unknown E and will remain as an unknown E indefinitely since the management
system will never be able to log into the CMISE to discover its E type. If this occurs,
and the CMISE E will be managed by the management system, delete the unknown E
representing the CMISE E and add it to the management system as a managed CMISE
Management communication setup concepts Auto-discovery concepts (subnetworks)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
3-32 365-312-877R7.2Issue 4 November 2009
E. If the CMISE E will not be managed by the management system, modify the E
type from unknown to either non-managed E or unmanageable device so that the
management system will not auto-discover the CMISE E at a later time.
Management communication setup concepts Auto-discovery concepts (subnetworks)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
3-33
4 4Management
communication setup
tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to
management communication setup.
Contents
Tasks related to OMS-to-E connections 4-3
To view a list of OMS-to-E connections 4-3
To add an OMS-to-E connection 4-4
To modify an OMS-to-E connection 4-7
To deactivate an OMS-to-E connection 4-10
To activate an OMS-to-E connection 4-12
To test the communication with an E 4-14
To delete an OMS-to-E connection 4-16
To delete an E 4-18
Tasks related to DCC 4-20
To view a list of DCC/EOW status for the port overheads 4-20
To modify the DCC/EOW status for a selected port overhead 4-21
To modify DC parameters 4-23
To view the DCC in MSP mode 4-25
To set the DCC in MSP mode to slave or to independent 4-26
To view a list of overhead access ports 4-28
To view a list of transparent DCC cross-connections 4-29
To add a transparent DCC cross-connection 4-30
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-1
To delete a transparent DCC cross-connection 4-32
Management communication setup tasks Overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-2 365-312-877R7.2Issue 4 November 2009
Tasks related to OMS-to-NE connections
To view a list of OMS-to-NE connections
When to use
Use this task to view a list of OMS-to-E connections.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Management Network
→ OMS to NE Connections.
Result:The Search section of the OMS to NE Connections page is displayed.
...................................................................................................................................................................................................
2 Make selections in one or more of the following fields in the Search section of the
window:
• In the NE type field, select a type of E.
• In the NE name(s) field, the Available table contains all Es of the selected Etype available on the management system. The Selected table contains the Es thatare to be considered in the search. Click an E and use the arrow buttons to move one
or more Es from the Available table to the Selected table, or click the doublearrows to move all the Es to the Available table.
• In the Comm type field, select a type of communication interface between the Eand the management system.
• In the Net Comm Group field select the CG name from the drop-down list. TheCG names displayed depend on the selection in the Comm type field.
...................................................................................................................................................................................................
3 Click Search.
Result:The list at the bottom of the OMS to NE Connections page is populated with
a list of the OMS-to-E connections in the network that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo view a list of OMS-to-NE connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-3
To add an OMS-to-NE connection
When to use
Use this task to add an E and establish an OMS-to-E connection between the
management system and the new E.
Important! Indirectly managed Es cannot be added using this task.
Before you begin
Gather the following information about the E to be added:
• E name
• E type (here: 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS )
• Communications type (here: OSI)
• etwork communications group to which the E will be assigned; ensure that it
exists
• SAP information (see also “SAP address structure” (p. 3-10))
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network. The Network Map is displayed.In the toolbar, click the New tool and select Network element from the drop-downlist.
• Use the object links to follow this path: Network Elements. In the toolbar, click theNew tool in the toolbar.
• Use the object links to follow this path: Management Network→ OMS-to-NEconnections. In the Search section of the window, click the New tool.
Result:The Add OMS-to-NE connection page is displayed.
...................................................................................................................................................................................................
2 In the NE name field, enter a name that will be used by the management system to
identify this E. This field accepts a maximum of 20 characters. Lucent recommends to
use the target identifier (TID) of the E, which was provisioned during installation of the
E as E name. See the OMS Getting Started Guide for a list of allowable characters.
...................................................................................................................................................................................................
3 In the NE type field, select “1643 AM / 1643 AM”.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo add an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-4 365-312-877R7.2Issue 4 November 2009
Result:The Communications type box dynamically alters to reflect choices based
upon your selection.
...................................................................................................................................................................................................
4 In the Communications type field, “OSI” is automatically selected as communications
interface to be used between the E and the management system.
...................................................................................................................................................................................................
5 Move to the OMS-to-NE connections details panel by clicking the number 2 in the
navigation aid or by clicking Next.
Result:The OMS-to-NE connections details panel is displayed.
...................................................................................................................................................................................................
6 Set the fields of the OMS-to-NE connections details panel as required:
• Net Comm Grp – select the network communications group to which theOMS-to-E connection belongs from the drop-down list.
• NSAP address – enter the possible SAP format for the OMS-to-E connection.Possible values are: Fixed 20-byte address structure, Fixed 10-byte address structure,
Flexible address structure.
If the fixed 20-byte address structure is selected, enter the SAP address of the
OMS-to-E connection in the following text fields:
– Area – the area identifier indicating the routing area to which a node belongs(four hexadecimal digits).
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
If the fixed 10-byte address structure is selected, enter the SAP address of the
OMS-to-E connection in the following text fields:
– Area – the area identifier indicating the routing area to which a node belongs(four hexadecimal digits).
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
If the flexible address structure is selected, enter the SAP address of the OMS-to-E
connection in the following text fields:
– AFI – the authority and format identifier specifying the SAP address format(four hexadecimal digits).
– Flexible part – up to 24 hexadecimal digits.
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo add an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-5
Result:The SAP address is designated for the E.
...................................................................................................................................................................................................
7 Click Next.
Result:The OMS-to-NE connection summary panel is displayed (note that the
OMS-to-NE connection security information panel is skipped for 1643 Access
Multiplexer AM / 1643 Access Multiplexer Small AMS Es).
...................................................................................................................................................................................................
8 Review the summary for this OMS-to-E connection.
Do one of the following:
• If you wish to return to a panel to change a selection, either click the panel number on
the navigation aid, or click Edit for that panel, or click the hyperlink for that panel.Change the appropriate information, and then return to this step.
• If the selections are all correct, click Submit to complete the addition of theOMS-to-E connection.
Result:A confirmation is issued in the Message section of the OMS-to-NE
connection summary page, the E is added to the management system and a
communications connection is established between the management system and the
new E.
The addition of an E to the management system initiates a full databasesynchronization. The E is automatically added to the Network Map. The E isadded to the remaining pages of the management system after a refresh is executed.
If the OMS-to-E connection being added is a GE, a message is displayed: “Thesystem will be unable to perform most management functions until the full databasesynchronization with the E is completed. Do you want to activate the automaticdatabase synchronization after the E is added?”. The user can choose “Yes” or “o”.If the user chooses “Yes”, the system initiates a full database synchronization after theOMS-to-E connection is successfully added. If the user chooses “o”, the systemdoes not initiate a full database synchronization after the OMS-to-E connection issuccessfully added.
Initially, the color of the E icon is magenta, which indicates a loss ofcommunications. Once the E addition is complete, the color of the E icon changesto green, indicating normal status, or another color that indicates the presence of analarm.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo add an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-6 365-312-877R7.2Issue 4 November 2009
To modify an OMS-to-NE connection
When to use
Use this task to modify an OMS-to-E connection.
Important! Changing OMS-to-E connection details may result in a loss of
association. Incorrect values for the parameters may result in the E becoming
unmanageable.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Management Network→ OMS-to-NE
Connections.
Result:The Search section of the OMS-to-NE Connections page is displayed.
...................................................................................................................................................................................................
2 Make selections in one or more of the following fields in the Search section of the
window:
• In the NE type field, select a type of E.
• In the NE name(s) field, the Available table contains all Es of the selected Etype available on the management system. The Selected table contains the Es thatare to be considered in the search. Click an E and use the arrow buttons to move one
or more Es from the Available table to the Selected table, or click the doublearrows to move all the Es to the Available table.
• In the Communications Type field, select a type of communication interfacebetween the E and the management system.
• In the Network communications group field select the CG name from thedrop-down list. The CG names displayed depend on the selection in the
Communications Type field.
...................................................................................................................................................................................................
3 Click Search.
Result:The list at the bottom of the OMS-to-NE Connections page is populated
with a list of the OMS-to-E connections in the network that meet your search
criteria.
...................................................................................................................................................................................................
4 The NE name column of the table lists the names of the OMS-to-E connections. The
name in this column is a hyperlink.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo modify an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-7
Do one of the following:
• Click the name of the OMS-to-E connection you wish to view.
• Click the radio button next to the OMS-to-E connection you wish to modify. From
the Go menu, select Modify and click Go.
Result:The OMS-to-NE connections general information page is displayed.
...................................................................................................................................................................................................
5 On the OMS-to-NE connections general information panel, no modifications are
possible.
Move to the OMS-to-NE connections details panel by clicking the number 2 in the
navigation aid.
Result:The OMS-to-NE connections details panel is displayed.
...................................................................................................................................................................................................
6 Modify the fields of the OMS-to-NE connections details panel as required:
• Net Comm Grp – modify the network communications group to which theOMS-to-E connection belongs. Select a network communications group from the
drop-down list.
• NSAP address – modify the possible SAP format for the OMS-to-E connection.Possible values are: Fixed 20-byte address structure, Fixed 10-byte address structure,
Flexible address structure.
If the fixed 20-byte address structure is selected, modify the SAP address of the
OMS-to-E connection in the following text fields:
– Area – the area identifier indicating the routing area to which a node belongs(four hexadecimal digits).
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
If the fixed 10-byte address structure is selected, modify the SAP address of the
OMS-to-E connection in the following text fields:
– Area – the area identifier indicating the routing area to which a node belongs(four hexadecimal digits).
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
If the flexible address structure is selected, modify the SAP address of the
OMS-to-E connection in the following text fields:
– AFI – the authority and format identifier specifying the SAP address format(four hexadecimal digits).
– Flexible part – up to 24 hexadecimal digits.
– System ID – the system identifier representing the node. The IEEE 802.3 MACaddress (12 hexadecimal digits).
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo modify an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-8 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
7 Move to the OMS-to-NE connection summary panel by clicking the number 3 or
number 4 in the navigation aid (note that the OMS-to-NE connection security
information panel is skipped for 1643 Access Multiplexer AM / 1643 Access
Multiplexer Small AMS Es).
Result:The OMS-to-NE connection summary panel is displayed.
...................................................................................................................................................................................................
8 Review the summary for this OMS-to-E connection.
...................................................................................................................................................................................................
9 Do one of the following:
• If you wish to return to a panel to change a selection, either click the panel number on
the navigation aid, or click Edit for that panel, or click the hyperlink for that panel.Change the appropriate information, and then return to this step
• If the selections are all correct, click Submit to complete the modification of theOMS-to-E connection.
Result:A confirmation is issued in the Message section of the OMS-to-NE
connection summary page, and the OMS-to-E connection is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo modify an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-9
To deactivate an OMS-to-NE connection
When to use
Use this task to deactivate the communications connection between the management
system and an E. When you deactivate an OMS-to-E connection, the E is not
communicating with the management system.
Before you begin
In order to deactivate an OMS-to-E connection, the E communications status must be
either Up (the E is communicating with the management system) or Down (the E is
not communicating with the management system and the management system is
attempting to regain communications).
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Management Network→ OMS-to-NE
Connections.
Result:The Search section of the OMS-to-NE Connections page is displayed.
...................................................................................................................................................................................................
2 Make selections in one or more of the following fields in the Search section of the
window:
• In the NE type field, select a type of E.
• In the NE name(s) field, the Available table contains all Es of the selected Etype available on the management system. The Selected table contains the Es thatare to be considered in the search. Click an E and use the arrow buttons to move one
or more Es from the Available table to the Selected table, or click the doublearrows to move all the Es to the Available table.
• In the Comm Type field, select a type of communication interface between the Eand the management system.
• In the Net Comm Grp field select the CG name from the drop-down list. The CGnames displayed depend on the selection in the Comm Type field.
...................................................................................................................................................................................................
3 Click Search.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo deactivate an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-10 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the OMS-to-NE Connections page is populated
with a list of the OMS-to-E connections in the network that meet your search
criteria.
...................................................................................................................................................................................................
4 The NE name column of the table lists the names of the OMS-to-E connections. Click
the radio button next to the OMS-to-E connection you wish to deactivate. From the Go
menu, select Deactivate and click Go.
Result:A confirmation is issued in the Message section of the OMS to NE
connections page, the management system logs out of the E and sets the
communications status to Deactivated.
To update the OMS to NE connections page, click the refresh button.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo deactivate an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-11
To activate an OMS-to-NE connection
When to use
Use this task to activate the communications connection between the management system
and an E. When you activate an OMS-to-E connection, the E is not communicating
with the management system.
Before you begin
In order to activate an OMS-to-E connection, the E communication status must be
Deactivated. The E is not communicating with the management system because the
user manually deactivated the OMS-to-E connection.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Management Network→ OMS-to-NE
Connections.
Result:The Search section of the OMS-to-NE Connections page is displayed.
...................................................................................................................................................................................................
2 Make selections in one or more of the following fields in the Search section of the
window:
• In the NE type field, select a type of E.
• In the NE name(s) field, the Available table contains all Es of the selected Etype available on the management system. The Selected table contains the Es thatare to be considered in the search. Click an E and use the arrow buttons to move one
or more Es from the Available table to the Selected table, or click the doublearrows to move all the Es to the Available table.
• In the Comm Type field, select a type of communication interface between the Eand the management system.
• In the Net Comm Grp field select the CG name from the drop-down list. The CGnames displayed depend on the selection in the Comm Type field.
...................................................................................................................................................................................................
3 Click Search.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo activate an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-12 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the OMS-to-NE Connections page is populated
with a list of the OMS-to-E connections in the network that meet your search
criteria.
...................................................................................................................................................................................................
4 The NE name column of the table lists the names of the OMS-to-E connections. Click
the radio button next to the OMS-to-E connection you wish to activate. From the Go
menu, select Activate and click Go.
Result:A confirmation is issued in the Message section of the OMS to NE
connections page, the management system connects to the E and sets the
communications status to Activated.
To update the OMS to NE connections page, click the refresh button.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo activate an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-13
To test the communication with an NE
When to use
Use this task to test the communication with an E.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Perform Comms Test.
5. Click Go.
Result:The Comms Test page is displayed. It includes a list of DCC connections
tests for a selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the E name for which you would like to test
communications. From the Go menu, select Perform Comms Test and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Comms Test page that the communications between the management
system and the E are tested.
...................................................................................................................................................................................................
4 To update the Comms Test page, click the refresh button.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo test the communication with an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-14 365-312-877R7.2Issue 4 November 2009
Result:The columns Last Tested and Test Status show date and time and the result
of the latest test.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo test the communication with an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-15
To delete an OMS-to-NE connection
When to use
Use this task to delete the communications connection between the management system
and an E. When you delete an OMS-to-E connection, its corresponding E is also
deleted from the management system's database.
Before you begin
An E and its corresponding OMS-to-E connection cannot be deleted in the following
situations:
1. When the E is a GE for a etwork Communications Group, and it has REs
assigned to it
2. When the E has cross-connections being used in network connections. For
information about how to delete a network connection, see the OMS Connection
Management Guide.
3. When the E is being used as an FTP/FTAM gateway
4. When a database synchronization is in progress for that E
5. When a software download is in progress for that E
6. If the management system cannot delete the E from the primary network adapter
7. When a backup or restore is in progress for that E
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Management Network→ OMS-to-NE
Connections.
Result:The Search section of the OMS-to-NE Connections page is displayed.
...................................................................................................................................................................................................
2 Make selections in one or more of the following fields in the Search section of the
window:
• In the NE type field, select a type of E.
• In the NE name(s) field, the Available table contains all Es of the selected Etype available on the management system. The Selected table contains the Es thatare to be considered in the search. Click an E and use the arrow buttons to move one
or more Es from the Available table to the Selected table, or click the doublearrows to move all the Es to the Available table.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo delete an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-16 365-312-877R7.2Issue 4 November 2009
• In the Comm Type field, select a type of communication interface between the Eand the management system.
• In the Net Comm Grp field select the CG name from the drop-down list. The CGnames displayed depend on the selection in the Comm Type field.
...................................................................................................................................................................................................
3 Click Search.
Result:The list at the bottom of the OMS-to-NE Connections page is populated
with a list of the OMS-to-E connections in the network that meet your search
criteria.
...................................................................................................................................................................................................
4 The NE name column of the table lists the names of the OMS-to-E connections. Click
the radio button next to the OMS-to-E connection you wish to delete. From the Go
menu, select Delete and click Go.
Result:A confirmation window is displayed.
...................................................................................................................................................................................................
5 Click Yes.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Network Elements page, and the OMS-to-E connection is deleted.
The E is automatically deleted from the Network Map. The E is deleted from the
remaining pages of the management system after a refresh is executed.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo delete an OMS-to-NE connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-17
To delete an NE
When to use
Use this task to delete an E from the management system's database. When you delete
an E, its corresponding OMS-to-E connection is also deleted.
There are two methods for this task.
Before you begin
An E and its corresponding OMS-to-E connection cannot be deleted in the following
situations:
1. When the E is a GE for a etwork Communications Group, and it has REs
assigned to it
2. When the E has cross-connections being used in network connections. For
information about how to delete a network connection, see the OMS Connection
Management Guide.
3. When the E is being used as an FTP/FTAM gateway
4. When a database synchronization is in progress for that E
5. When a software download is in progress for that E
6. If the management system cannot delete the E from the primary network adapter
7. When a backup or restore is in progress for that E
Task, method 1: from the Network Elements page
...................................................................................................................................................................................................
1 Use the object links to follow this path: Network Elements.
Result:The Network Elements page is displayed. It includes a table that lists all
Es.
...................................................................................................................................................................................................
2 The NE name column of the table lists the names of the Es. Click the radio button next
to the E you wish to delete. From the Go menu, select Delete and click Go.
Result:A confirmation window is displayed asking you to confirm the deletion.
...................................................................................................................................................................................................
3 Click OK.
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo delete an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-18 365-312-877R7.2Issue 4 November 2009
Result:A progress indication followed by a confirmation is issued in the Message
section of the Network Elements page, and the E is deleted.
If the management system finds that the E to be deleted has cross-connections inthat E that are being used in network connections, a failure notice is displayed.
Task, method 2: from the Network Map
...................................................................................................................................................................................................
1 On the Network Map, right-click the ODO_AREA and select Expand all, then
right-click the E icon that represents the E you wish to delete.
Result:The Node menu is displayed.
...................................................................................................................................................................................................
2 Select Delete.
Result:A confirmation window is displayed asking you to confirm the deletion.
...................................................................................................................................................................................................
3 Click OK.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Network Map page, and the E is deleted.
If the management system finds that the E to be deleted has cross-connections inthat E that are being used in network connections, a failure notice is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to OMS-to-NE connectionsTo delete an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-19
E N D O F S T E P S...................................................................................................................................................................................................
Tasks related to DCC
To view a list of DCC/EOW status for the port overheads
When to use
Use this task to view a list of DCC/EOW status for the port overheads.
If you want to view these settings just for a single port, it is recommended to follow the
task “To modify the parameters of a physical or logical port” (p. 6-22).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC/EOW.
5. Click Go.
Result:The DCC/EOW Status page is displayed. It includes a list of ports and their
current DCC/EOW status for the port overheads.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-20 365-312-877R7.2Issue 4 November 2009
To modify the DCC/EOW status for a selected port overhead
When to use
Use this task to modify the DCC/EOW status for a selected port overhead.
If you want to view these settings just for a single port, use the task “To modify the
parameters of a physical or logical port” (p. 6-22).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC/EOW.
5. Click Go.
Result:The DCC/EOW Status page is displayed. It includes a list of ports and their
current DCC/EOW status for the port overheads.
...................................................................................................................................................................................................
3 Click the radio button next to the port overhead parameter you wish to modify. From the
Go menu, select Modify and click Go.
Management communication setup tasks Tasks related to DCCTo modify the DCC/EOW status for a selected port
overhead...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-21
Result:The Modify DCC/EOW page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable fields that you wish to update.
• DCC – select enabled to enable the DCC termination for the respective port ordisabled to disable it.
• LAPD Mode – select either UITS (unacknowledged information transfer service,which is the default) or AITS (acknowledged information transfer service).
• LAPD Side – choose the LAPD role either user (user side, which is the default) ornetwork (network side).
...................................................................................................................................................................................................
5 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify DCC/EOW page, and the DCC/EOW status for a selected port
overhead is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo modify the DCC/EOW status for a selected port
overhead...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-22 365-312-877R7.2Issue 4 November 2009
To modify DCN parameters
When to use
Use this task to modify DC parameters that apply to a selected network element as a
whole.
Related information
See also:
• “DC configurations” (p. 3-5)
• “Data communication channels (DCC)” (p. 3-13)
Important! Changing DC parameters on the E may cause the E to restart,
resulting in a temporary loss of association. Incorrect values for the DC parameters
may result in the E becoming unmanageable.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communication Networks.
4. In the Function field, select Retrieve/Set DCN parameters.
5. Click Go.
Management communication setup tasks Tasks related to DCCTo modify DCN parameters
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-23
Result:The Modify DCN Parameters page is displayed. It includes a series of
panels from which to view or modify DC parameters.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• NE location – enter the user defined name for the location of the E.
• IS-IS on NE – select one of the following radio buttons:
– Level 1: the E is designated a level 1 intermediate system (IS). This E routes
messages within an area.
– Level 1 + Level 2: the E has both level 1 and level 2 capabilities. A level 2 E is
able to route messages in between areas.
– Level 1 + Level 2 + Area Repair Access: allows a level 2 IS to become a “tunnel”
entrance/exit in the case of an area becoming partitioned due to a network failure.
This allows a level 1 “tunnel” to be built through the level 2 subnetwork, rerouting
the connection back to the level 1 area. ote that only the end nodes of the tunnel
should be provisioned as Level 1 + Level 2 + Area Repair Access. All the other
Es in the repair path must support the partition repair feature, but need not be
provisioned to provide area repair access.
• IS-IS on LAN – select one of the following radio buttons:
– ormal IS-IS: LA IS-IS protocol follows the IS-IS setting on the E.
– Level 2: LA IS-IS protocol is set to level 2 (inter-area).
– o IS-IS: LA IS-IS protocol is not supported.
• Designated router priority – enter the router priority. This is used by the IS-ISfunction to select which E attached to the management LA in an area will become
the designated router.
• Additional Manual Area Address 1, Additional Manual Area Address 2 –enter the area address format used by equipment other than Lucent Technologies Es.
This enables the Es in the area to be aware of the different area address formats used
within that area.
• Maximum LSP size – used to determine the maximum size of link state protocoldata units (LSP) that can be provisioned for each E.
– Lucent: 512 bytes
– ISO8473: 1492 bytes
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify DCN Parameters page, and the DC parameters are modified
for the selected E port.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo modify DCN parameters
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-24 365-312-877R7.2Issue 4 November 2009
To view the DCC in MSP mode
When to use
Use this task to view the settings of DCC in MSP mode for an E.
If you want to view these settings just for a single port, it is recommended to follow the
task “To modify the parameters of a physical or logical port” (p. 6-22).
Important! This task is supported for all CMISE Es participating in an MSP
scheme.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC in MSP Mode.
5. Click Go.
Result:The DCC in MSP Mode page is displayed. It includes a list of “DCC in MSP
mode settings” for an E.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo view the DCC in MSP mode
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-25
To set the DCC in MSP mode to slave or to independent
When to use
Use this task to set the DCC mode for a port overhead to slave or to independent.
If you want to change the settings just for a single port, it is recommended to follow the
task “To modify the parameters of a physical or logical port” (p. 6-22).
Before you begin
Important! If you want to set the DCC mode for a port overhead to slave, the DC
parameters for the port to be used must have been set in advance, following the task
“To modify the DCC/EOW status for a selected port overhead” (p. 4-21).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC in MSP Mode.
5. Click Go.
Result:The DCC in MSP Mode page is displayed. It includes a list of “DCC in MSP
mode settings” for an E.
...................................................................................................................................................................................................
3 Click the radio button next to the DCC in MSP mode setting that you wish to set to slave.
From the Go menu, select Set to Slave or Set to Independent, respectively, and click
Go.
Management communication setup tasks Tasks related to DCCTo set the DCC in MSP mode to slave or to independent
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-26 365-312-877R7.2Issue 4 November 2009
Result:A progress indication followed by a confirmation is issued in the Message
section of the DCC in MSP Mode page, and the DCC in MSP mode setting is set as
requested. If the mode is set to slave, the DCC management traffic is carried only on
the port carrying traffic. If the mode is set to independent, the DCC management
traffic is carried on both the worker and protection ports.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo set the DCC in MSP mode to slave or to independent
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-27
To view a list of overhead access ports
When to use
Use this task to view a list of overhead access ports.
Related information
See also:
• “Data communication channels (DCC)” (p. 3-13)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communication Networks.
4. In the Function field, select Retrieve/Set overhead bytes information.
5. Click Go.
Result:The Overhead Access Ports page is displayed. It includes a list of overhead
access ports.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo view a list of overhead access ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-28 365-312-877R7.2Issue 4 November 2009
To view a list of transparent DCC cross-connections
When to use
Use this task to view a list of transparent DCC cross-connections for a selected network
element.
Related information
See also:
• “Transparent DCC cross-connections” (p. 3-13)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC Connections.
5. Click Go.
Result:The DCC Connections page is displayed. It includes a list of transparent
DCC cross-connections for the selected E.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo view a list of transparent DCC cross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-29
To add a transparent DCC cross-connection
When to use
Use this task to add a transparent DCC cross-connection between two port overheads in a
selected E.
Related information
See also:
• “Data communication channels (DCC)” (p. 3-13)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC Connections.
5. Click Go.
Result:The DCC Connections page is displayed. It includes a list of transparent
DCC cross-connections for the selected E.
...................................................................................................................................................................................................
3 Click on the New tool in the toolbar.
Management communication setup tasks Tasks related to DCCTo add a transparent DCC cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-30 365-312-877R7.2Issue 4 November 2009
Result:The Add DCC Connection page is displayed.
...................................................................................................................................................................................................
4 In the TTP1 Port field, select side A of the transparent DCC cross-connection to be
created. The drop-down list contains all available ports that are able to terminate a
multiplex section or regenerator section, respectively.
ote that the specified port must not be used for “traditional” DCC processing. That
means DCC must be disabled for that port overhead. Follow “To view a list of overhead
access ports” (p. 4-28) to check the current setting.
...................................................................................................................................................................................................
5 In the TTP1 overhead field, select whether the DCC cross-connection is to be
established via the multiplex section overhead (MS-OH) or the regenerator section
overhead (RS-OH).
...................................................................................................................................................................................................
6 In the TTP2 Port field, select side B of the transparent DCC cross-connection to be
created. The drop-down list contains all available ports that are able to terminate a
multiplex section or regenerator section, respectively.
ote that the specified port must not be used for “traditional” DCC processing. That
means DCC must be disabled for that port overhead. Follow “To view a list of overhead
access ports” (p. 4-28) to check the current setting.
...................................................................................................................................................................................................
7 In the TTP2 overhead field, select the same as in the TTP1 overhead field.
...................................................................................................................................................................................................
8 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Add DCC Connection page, and the transparent DCC
cross-connection is added.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo add a transparent DCC cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-31
To delete a transparent DCC cross-connection
When to use
Use this task to delete a transparent DCC cross-connection
Related information
See also:
• “Data communication channels (DCC)” (p. 3-13)
Important!Disconnecting a transparent DCC cross-connection may lead to a loss of
association with other network elements.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Communications Networks.
4. In the Function field, select Retrieve/Set DCC Connections.
5. Click Go.
Result:The DCC Connections page is displayed. It includes a list of transparent
DCC cross-connections for the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the transparent DCC cross-connection you wish to delete.
From the Go menu, select Disconnect and click Go.
Management communication setup tasks Tasks related to DCCTo delete a transparent DCC cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
4-32 365-312-877R7.2Issue 4 November 2009
Result:A progress indication followed by a confirmation is issued in the Message
section of the DCC Connections page, and the transparent DCC cross-connection is
disconnected, that is, it is deleted.
E N D O F S T E P S...................................................................................................................................................................................................
Management communication setup tasks Tasks related to DCCTo delete a transparent DCC cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
4-33
5 5Equipment provisioning
concepts
Overview
Purpose
This chapter presents concept information related to equipment provisioning on 1643
Access Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using
OMS.
Contents
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS
configuration possibilities
5-2
ode creation 5-6
E hardware components and their identifiers 5-8
Miscellaneous discrete inputs and outputs 5-9
SHDSL service concepts 5-11
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-1
1643 Access Multiplexer AM / 1643 Access Multiplexer SmallAMS configuration possibilities
Network application
“1643 AM / 1643 AM” and “1643 AM / 1643 AM” are high capacity, flexible, and
cost-effective wideband multiplexers. They multiplex standard PDH and SDH signals as
well as Ethernet signals to line transport rates. Both systems are useful elements in
building efficient and flexible networks because of their wide-ranging in capacity in
addition to a compact and flexible design.
The system provides the ability to add one option card. In the access network, “1643 AM
/ 1643 AM” and “1643 AM / 1643 AM” can be installed at the customer premises for
fiber-to-the-business applications or in street cabinets. Other applications include
LA-to-LA traffic on campus networks or WAs.
1643 AM
1643 AM is an SDH STM-1 or STM-4 terminal or add/drop-multiplexer optimized to
provide various tributary services.
Transmission architecture
The principle transmission architecture is shown in the following figure:
Line interfaces:
STM-1
STM-4
16 E1´
Line I/FLine I/F
(optional)
HO Cross-connect VC-4
LO Cross-connectVC-3, VC-12
Option cardPowersupply
Option cards:
STM-1 el./opt.
E1/DS1
E3/DS3
X.21
SHDSL
10/100BASE-T
1000BASE-X
Power supply options:
2 –16 V ... –72 V DC
1 100 V ... 240 V 50/60 Hz AC
´
´
Control:
10BASE-T (Management)
RS-232 (ITM-CIT)
4 MDI
4 MDO
´
´
Equipment provisioning concepts 1643 Access Multiplexer AM / 1643 Access MultiplexerSmall AMS configuration possibilities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-2 365-312-877R7.2Issue 4 November 2009
SDH aggregate interfaces
1643 AM supports the synchronous transmission signal types STM-1 (155 Mbps) and
STM-4 (622 Mbps).
SDH tributary interfaces
Using an option card, 1643 AM can be configured with electrical or optical STM-1
interfaces (155 Mbps).
PDH interfaces
The following PDH interfaces can be configured via an option card:
• DS1 (1.5 Mbps)
• E1 (2 Mbps)
• DS3 (44.7 Mbps)
• E3 (34.4 Mbps)
LAN interfaces
The following LA interfaces can be configured via an option card:
• Four Ethernet/Fast Ethernet interfaces (10/100BASE-T).
• Three Ethernet/Fast Ethernet interfaces (10/100BASE-T) and two Gigabit Ethernet
interface (10/100/1000BASE-T and 1000BASE-FX via SFP).
• Eight Ethernet/Fast Ethernet interfaces (10/100BASE-T) in private line mode.
1643 AMS
1643 AMS is an SDH STM-1 terminal or add/drop-multiplexer optimized to provide
various tributary services.
Transmission architecture
The principle transmission architecture is shown in the following figure:
Equipment provisioning concepts 1643 Access Multiplexer AM / 1643 Access MultiplexerSmall AMS configuration possibilities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-3
SDH aggregate interfaces
1643 AMS supports the synchronous transmission signal type STM-1 (155 Mbps).
Different interface types can be realized in a modular way by only changing a small
form-factor pluggable optics (SFP)
PDH interfaces
The following PDH interfaces can be configured via an option card:
• DS1 (1.5 Mbps)
• E1 (2 Mbps)
• DS3 (44.7 Mbps)
• E3 (34.4 Mbps)
SHDSL interfaces
Using an option card, 12 SHDSL interfaces can be configured.
LAN interfaces
The following LA interfaces can be configured via an option card:
• Four Ethernet/Fast Ethernet interfaces (10/100BASE-T)
• Three Ethernet/Fast Ethernet interfaces (10/100BASE-T) and two Gigabit Ethernet
interface (10/100/1000BASE-T and 1000BASE-FX via SFP).
• Eight Ethernet/Fast Ethernet interfaces (10/100BASE-T) in private line mode
16 E1or´
16 DS1´
Line I/FLine I/F
(optional)
HO Cross-connect VC-4
LO Cross-connectVC-3, VC-12
Option cardPowersupply
Line interfaces:
STM-1
Power supply options:
2 –16 V ... –72 V DC
1 100 V ... 240 V 50/60 Hz AC
´
´
Control:
10BASE-T (Management)
RS-232 (ITM-CIT)
4 MDI
4 MDO
´
´
Option cards:
E1/DS1
E3/DS3
X.21
SHDSL
10/100BASE-T
1000BASE-X
SFP SFP
Equipment provisioning concepts 1643 Access Multiplexer AM / 1643 Access MultiplexerSmall AMS configuration possibilities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-4 365-312-877R7.2Issue 4 November 2009
Possible configurations
Possible configurations are described in more detail in the 1643 Access Multiplexer AM /
1643 Access Multiplexer Small AMS Applications and Planning Guide.
Equipment provisioning concepts 1643 Access Multiplexer AM / 1643 Access MultiplexerSmall AMS configuration possibilities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-5
Node creation
Node
A node is literally “a point at which subsidiary parts originate or center.” So, in other
words the E or the node is the central collection point of its various parts. Creating a
node means, then, identifying this central point (the E name and address) and inputting
the exact parts comprising the node. All of this information is compiled and stored in the
management information base (MIB).
Management information base
The management information base (MIB) is the provisioning information stored in the
database of the E. This includes the configuration of the units within the E, the name
and type of the E, as well as addressing information and network information necessary
for management. In OMS, the MIB is also referred to as E database.
Confirm MIB
Confirming the MIB will send all of the basic E information that has been entered to the
system controller. This is an essential step in the creation of the E.
Update MIB
The MIB can be updated rather than confirmed, if the MIB already exists and there have
been few changes made. This operation can be advantageous as it takes considerably less
time than that of confirming the MIB.
Isolated state
Arriving from the factory, the 1643 Access Multiplexer AM / 1643 Access Multiplexer
Small AMS is in an isolated state. This means that communication via DC is not
possible. In other words, no association with the OMS can be established while the
network element is in the isolated state.
To enable an association with the OMS, the network element must be brought out of the
isolated state. To do so, use the ITM-CIT to either change or re-select any of the
“Provisioned DC Information” parameters. Once this is done, the network element will
be removed from isolation.
MIB management
MIB management includes the following
• Association Management
• Synchronization – including MIB download, MIB upload, MIB image update
Equipment provisioning concepts Node creation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-6 365-312-877R7.2Issue 4 November 2009
Association management
The management system attempts to maintain an association through a set of association
states with each E in its management domain. This association runs over the data
communication network (DC). The E and the management system can communicate
only when the association is active (connected).
The management system allows the user to enable or disable management of the E. The
effect of this command depends on the current association state.
MIB synchronization
The management system can maintain images in its database of each managed E’s MIB.
The MIB is the database located in the E which has all the configuration data required
for management of the E. During normal operations, the E MIB and management
system MIB image of each E both have the same information within them.
During the management of the Es, communication may be lost between the
management system and the managed Es. In order to regain proper management
control, the MIB and MIB image must be synchronized by performing one of the
following operations. On association recovery, the management system will automatically
perform the most appropriate option, or let the user decide which to perform.
• MIB upload – the current MIB in the E is copied to the management system (similar
to the process of backing up E database to the management system)
• MIB download – the current MIB image in the management system is copied over the
MIB in the E (similar to the process of restoring E database to the E).
• Update MIB Image – the management system checks which parts of the E's MIB
differ from the MIB image. The management system then gets the latest copy of these
parts which will resynchronize the MIB. This is normally quicker than performing a
full MIB Upload.
• Enable association – make management association with the E so that it can be
managed.
• Disable association – release management association with the E so the E will no
longer be managed.
Equipment provisioning concepts Node creation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-7
NE hardware components and their identifiers
Reference
For a complete and up-to-date list of all hardware items with the respective comcodes,
refer to the Engineering Drawings ED8C940-10 and ED8C940-20. You can order them in
the latest version from the Lucent's Product Documentation web site (http://www.cic.
lucent.com/drawings.html) .
Equipment provisioning concepts NE hardware components and their identifiers
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-8 365-312-877R7.2Issue 4 November 2009
Miscellaneous discrete inputs and outputs
MDIs and MDOs
A network element contains miscellaneous discrete inputs (MDI) and miscellaneous
discrete outputs (MDO) allowing the network provider to use the system to monitor and
control other equipment co-located with the system.
• MDIs are inputs to a network element for external equipment. MDIs can be monitored
by the management system. An MDI can be connected to monitor a temperature
sensor or a door contact, for example.
• MDOs are outputs from a network element used to drive external equipment. MDOs
can be activated or deactivated by the management system. An MDO can be
connected to control a fan or a generator, for example.
Objective
MDIs can be used to collect status information from other transmission equipment or to
monitor external events (for example a door contact).
MDOs are used to drive external equipment or to influence the behavior of equipment
external to the system.
About
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS contains four
MDIs and four MDOs.
To help with general purpose surveillance, each network element MDI and MDO can be
given a unique name, which is stored in the management system. The name can be no
longer than 26 characters.
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS supports a
specific alarm supervision via the MDI and MDO contacts which allows to supervise the
MDI status of several Es and signal an alarm condition via the MDO contact of a
dedicated 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS in a
central location without the intervention of a management system.
The user can select between three alarm signaling modes:
• Local alarms signaling
• Centralized alarms signaling
• Centralized MDI signaling.
Equipment provisioning concepts Miscellaneous discrete inputs and outputs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-9
Outcome
With the MDIs, external events are reported to the management system via the alarm
representation. If this event occurs an alarm is raised. Also, the severity of these alarms
can be set. Once provisioned, MDOs can place external equipment under the control of
the system.
MDI/MDO use for SHDSL remote power supply
Management of the SHDSL remote power supply (RPS) box is achieved by reassigning
the MDI/MDO ports of the 1643 Access Multiplexer AM / 1643 Access Multiplexer
Small AMS . The E uses the four MDIs and four MDOs to communicate with the RPS
box control port. The four MDIs and four MDOs on the E are no longer available to the
user. Instead, the three MDIs and three MDOs on the RPS box can be used.
The configuration in principle is shown in the following figure:
1148615NE
X12S
HD
SL
option c
ard
NTU
NTU
RPS
MDI
MDO
MDI
MDO2 4×
2 4×
2
2
2 3×
2 3×
SRU
Equipment provisioning concepts Miscellaneous discrete inputs and outputs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-10 365-312-877R7.2Issue 4 November 2009
SHDSL service concepts
SHDSL definitions
Symmetrical single-pair high speed digital subscriber line (SHDSL) is a protocol which
provides high speed data transport over copper wire connections.
If 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS is equipped with
an X12SHDSL option card, it supports 12 line termination unit (LTU) ports.
Depending on the span connected, each SHDSL link can have up to two SHDSL
regenerator units (SRU). Each SHDSL line is terminated with a network termination unit
(TU) which acts as modem.
Two types of TU are supported:
• T2M: a 1-port SHDSL modem with a single 2 Mbps interface toward the end user.
• T10ETH: a 1- to 4-port SHDSL modem with two 10BASE-T Ethernet interfaces
toward the end user.
The principle SHDSL network architecture using 1643 Access Multiplexer AM / 1643
Access Multiplexer Small AMS is shown in the following figure:
ManagementSystem
NT2M
NT2M
NT10ETH
NT10ETH
E1
E1
2
10BASE-T
×
12 SHDSL× 0, 1, or 2 SRUs per SHDSL span
SRU NTULTU
NE
SDH network
STM-1 or STM-4
SHDSL "segment"
X12S
HD
SL
option c
ard
2
10BASE-T
×
1145849
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-11
E1 and TU-12 payload mapping
All ports of the X12SHDSL option card operate either in the E1 or in the TU-12 mode. In
E1 mode, an E1 signal is directly mapped into the SHDSL signal. In TU-12 mode, a
TU-12 containing a VC-12 is mapped into the SHDSL signal. This VC-12 itself may
contain various signal types, for example E1, Ethernet data, and others.
Protocols for remote SHDSL device management
EOC Embedded operations channel – a basic message protocol allowing minimum
management functions, for example SHDSL link discovery, remote SHDSL device
inventory, and synchronize remote SHDSL device.
QD2 This is an extended message protocol allowing EOC management functions and
additional management functions such as reset remote SHDSL device.
SHDSL network rules
The following rules apply for the SHDSL management:
• All line terminating unit (LTU) ports are either in E1 or in TU-12 mode.
• An SHDSL link between a line terminating unit (LTU) and a network terminating unit
(TU) can 0, 1, or 2 SHDSL regenerator units (SRU), where the number of SRUs is
independent for each SHDSL link.
• Only one LTU port can be associated with an E1 interface via a single T2M TU.
• Up to four LTU ports can be associated with two Ethernet (10/100BASE-T/X)
interfaces via s single T10ETH TU.
• TUs with mixed Ethernet / E1 interfaces are not supported.
Numbering system for remote SHDSL devices
The LTU can manage up to 12 TUs and 24 SRUs. To identify the particular SRU or
TU quickly, a fixed naming scheme is used that allows easy recognition of the relative
location of the device.
Each TU or SRU is identified with a four digit number, prefixed with the string “SRU”
or “TU” depending on the object addressed.
The first digit indicates the slot number in which the SHDSL unit is inserted in the E.
For 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS , this value is
always “2”.
The following two digits indicate the LTU port number, ranging from “01” to “12”,
corresponding with the TP1 to TP12 numbering that is used on the X12SHDSL option
card faceplate.
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-12 365-312-877R7.2Issue 4 November 2009
The last digit can be “1”, “2”, or “3”. “1” is used for the TU, while “2” and “3” are used
for numbering the SRUs, starting from the SRU connected to the LTU and numbering
incrementally in the direction of the TU.
For T10ETH TUs, the LTU port number connected to TU port 1 is used.
Configuration examples
The following figures show the configuration of remote SHDSL devices in TU-12 mode
and in E1 mode.
1146625
option c
ard
X12S
HD
SL
NT2M NTU
N-C
NTU2011
QD2 SRU
SRU2013
QD2 SRU
SRU2012
NTU2091
QD2 SRU
SRU2093
QD2 SRU
SRU2092
QD2 SRU
SRU2112
NT10ETH NTU
NT
U1.V
CG
.1
TP2.1
TP2.9
TP2.10
TP2.11
TP2.12
N-CSHDSL port
VC-12 TTP
E1 logical port
P12TP
2 MBps port
Ethernet port
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-13
NTU support
The following sections describe Ethernet TU support features for SHDSL
configurations.
NTUs bridge mode provisioning
The “1643 AM / 1643 AM” supports bridge mode provisioning to the Ethernet TU.
The following bridge modes are supported. They are:
• Self learning bridge (IEEE 802.1D)
• V-LA bridge (IEEE 802.1Q)
• Provider bridge (IEEE 802.1ad)
1146717
option c
ard
X12S
HD
SL
EOC NTU
N-C
NTU2011
EOC SRU
SRU2013
EOC SRU
SRU2012
EOC SRU
SRU2102
TP2.1
TP2.9
TP2.10
TP2.11
TP2.12
N-CSHDSL port
VC-12 TTP
E1 logical port
P12TP
Generic customer port
Ethernet port
N-C
EOC NTU
NTU2101
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-14 365-312-877R7.2Issue 4 November 2009
NTU VLAN functionality (VLAN bridge mode) support
The “1643 AM / 1643 AM” provides enhanced PM support for third party TUs. It
supports a two port Ethernet SHDSL modem (TU) which is connected via 1 to 4 parallel
TU-12s over SHDSL mapped links.The Ethernet traffic bandwidth is optimized by GFP-F
encapsulation and VC-12-Xv virtual concatenation using LCAS.
When an TU works in VLA bridge mode (IEEE802.1Q), the TU's VLA table is
used to assign the VID to ETH ports and WA ports. The network element is the
configuration master and retains a VLA table of its own. It ensures by corresponding
commands that the VLA table in the TU matches the VLA table in the E.
Individual entries in the table can be added, modified or deleted.
NTU LPT functionality support
The “1643 AM / 1643 AM” supports Link Pass Through (LPT) functionality via EOC
commands.
Users can enable or disable LPT using the following parameters:
• CA-CSF: GFP Client Signal Fail Signalling
• CA-SSF: Disabling LA interfaces during WA connection failure
NTU Ethernet QoS support
The “1643 AM / 1643 AM” supports the following TU Ethernet QoS functions:
• PriorityMode
• IngressRateControl
• CIRAverageBitRate
• CIRMaxBurstSize
• PortPriority
SHDSL parameters for remote bridge VLANs
Parameter Values Description
TU name
TU ID
TU Location
VLA ID
VLA status
VLA Label
Port
PV ID
Untagged frame processing
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-15
Parameter Values Description
Default user priority
Committed information rate
Committed burst size
Bridge mode IEEE 802.1D Self learning bridge
IEEE 802.1Q V-LA bridge
IEEE 802.1ad Provider bridge
Priority mode port priority
tag priority
Ingress rate control mode
Maximum Supported VLAs
Provisioned VLAs
Create Time
NTU web interface
The MS of the “1643 AM / 1643 AM” can be used to set user passwords for the TU
web interface.
NTU general configuration support
The “1643 AM / 1643 AM” provides enhanced PM support for third party TUs. It
supports a two port Ethernet SHDSL modem (TU) which is connected via 1 to 4 parallel
TU-12s over SHDSL mapped links. The Ethernet traffic bandwidth is optimized by
GFP-F encapsulation and VC-12-Xv virtual concatenation using LCAS. The GFP
encapsulation mode and LCAS are independent of bridge mode.
The “1643 AM / 1643 AM” supports the following enhanced TU configuration.
1. Enhanced TU SDH port configuration
2. Enhanced TU Ethernet LA port configuration
3. Enhanced TU Ethernet WA port configuration
4. TU Ethernet Bridging Configuration
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
5-16 365-312-877R7.2Issue 4 November 2009
NTU Performance Monitoring support
The “1643 AM / 1643 AM” supports the following TU Performance Monitoring
functions:
• SHDSL port PM
• remote VC12TTP PM
• WA/LA PM
SHDSL remote power supply
The SHDSL remote power supply (RPS) box is a third-party equipment used to provide
power to remote SHDSL devices via SHDSL lines. The RPS box contains 12 power
supply ports, each one powering the SHDSL devices on an SHDSL span. A hardware DIP
switch controls the hardware power setting (“On” or “Off”) for each port.
Management of the RPS box is achieved by reassigning the MDI/MDO ports of the 1643
Access Multiplexer AM / 1643 Access Multiplexer Small AMS .
Equipment provisioning concepts SHDSL service concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
5-17
6 6Equipment provisioning
tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to equipment
provisioning.
Contents
Provisioning of slots and SFPmodules 6-4
To view a list of slots 6-4
To modify a slot 6-6
To view a list of SFP modules 6-8
To view SFP module information 6-10
To set the SFP module assignment state 6-13
Port provisioning 6-15
To view a list of physical ports 6-15
To view a list of logical ports 6-16
To view a list of contained logical ports 6-17
To view a list of loopback-enabled ports 6-19
To provision or deprovision a loopback on a port 6-20
To modify the parameters of a physical or logical port 6-22
Parameters for SDH/PDH ports 6-24
Parameters for SHDSL ports 6-33
Parameters for Ethernet ports 6-39
Parameters for VCG ports 6-43
Data service 6-50
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-1
To view Ethernet card information 6-51
To modify Ethernet card information 6-52
To view virtual concatenation groups 6-54
To modify virtual concatenation groups 6-56
To view VC TTPs 6-59
To reset the wait to restore timer for VC TTPs 6-60
MIB management 6-62
To upload the MIB into the management system 6-62
To download the MIB to an E 6-63
To update the MIB image 6-64
To enable the association with an E 6-65
To disable the association with an E 6-66
Provisioning of E event controls 6-68
To modify E event controls 6-68
To view E event parameter settings 6-70
To modify E event parameter settings 6-72
Provisioning of MDIs and MDOs 6-74
To view a list of MDOs 6-74
To view alarms associated with an MDO 6-75
To modify an MDO 6-76
To view a list of MDIs 6-78
To modify an MDI 6-79
Tasks related to SHDSL devices and services 6-81
To view a list of SHDSL units 6-81
To modify the SHDSL transport mode 6-82
To view SHDSL spans 6-83
To restart the discovery sequence for an SHDSL span 6-84
To restart the low-level SHDSL hardware 6-85
To remove remote devices on an SHDSL span 6-86
To modify the SHDSL span diagnostic mode 6-87
To view SHDSL device information 6-88
To modify a remote SHDSL device 6-89
To synchronize a remote SHDSL device 6-91
Equipment provisioning tasks Overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-2 365-312-877R7.2Issue 4 November 2009
To reset a remote SHDSL device 6-92
To assign a password to a remote SHDSL device 6-93
To download a software image to a remote SHDSL device 6-95
To set the SHDSL remote power supply management mode 6-97
To view a list SHDSL remote power supply ports 6-98
To restart an SHDSL remote power supply port 6-99
To modify the alarm suppression settings of an SHDSL remote power supply
port
6-100
To view remote bridges on Ethernet TUs 6-101
To switch or modify remote bridges on Ethernet TUs 6-103
To view remote bridge VLAs member ports on Ethernet TUs 6-105
To view remote bridge member ports 6-107
To create or modify remote bridge VLAs on Ethernet TUs 6-109
To view the VLA member ports of a remote bridge 6-111
To modify the Ethernet parameters of remote bridge member ports and VLA
member ports
6-113
To delete remote bridge VLAs on Ethernet TUs 6-114
Equipment provisioning tasks Overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-3
Provisioning of slots and SFP modules
To view a list of slots
When to use
Use this task to view a list of slot information for a selected E.
This task has two methods.
Task, method 1: from the Network Elements page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set Equipment.
5. Click Go.
Result:The Slots page is displayed. It includes a list of slots for the selected E.
Task, method 2: from the Slots page
...................................................................................................................................................................................................
1 Use the object links to follow this path: Network Elements→ Equipment.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view a list of slots
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-4 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Result:The Search for Equipment page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E.
2. In the NE name field, select the name of the target E.
3. In the Equipment type field, select Slot/Circuit pack.
4. For the Search by field, select the option Equipment ID.
5. Leave the Equipment ID field empty.
6. Click Search.
Result:The Equipment - Slots/Circuit Packs page is displayed. It includes a list
of slots for the selected E.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view a list of slots
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-5
To modify a slot
When to use
Use this task to modify a slot for a selected network element.
Before you begin
The ports that are related to the slot in question must be free of traffic.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set Equipment.
5. Click Go.
Result:The Slots page is displayed. It includes a list of slots for the selected E.
...................................................................................................................................................................................................
3 The Slot column of the table lists the names of the slots. Click the radio button next to the
slot you wish to modify.
...................................................................................................................................................................................................
4 From the Go menu, select Modify.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo modify a slot
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-6 365-312-877R7.2Issue 4 November 2009
Result:The Modify Slot page is displayed.
...................................................................................................................................................................................................
5 Change the entries or selections for any modifiable fields that you wish to update.
• Set unit type – select a type of unit from the drop down list to change the unit type:
– 12 SHDSL Option Card (CMC417): selects the SHDSL option card (12
× SHDSL), also referred to as X12SHDSL.
– 12 SHDSL Option Card (Enh) (CMC417B): selects the enhanced SHDSL option
card (12 × SHDSL), also referred to as X12SHDSL-V2.
– 16 DS1 Option Card (CMC409): selects the DS1 option card (16 × DS1, 100 Ω),
also referred to as X16DS1.
– 16 E1 (2 Mb) 75/120 (CMC414): selects the E1 option card (16 × E1, 75 Ω or
120 Ω), also referred to as X16E1-V3.
– 2 DS-3 (45 Mbit/s) (CMC408): selects the DS3 option card (2 × DS3), also
referred to as X2DS3-V2.
– 2 E-3 (34 Mbit/s) (CMC407): selects the E3 option card (2 × E3), also referred to
as X2E3-V2.
– 2 STM-1e Option Card (CMC416) (1643 AM only): selects the STM-1 option
card, also referred to as X2STM1ETRIB.
– 2 STM-1o Option Card (CMC415) (1643 AM only): selects the STM-1 option
card, also referred to as X2S11TRIB.
– Ethernet Private Line Opt. Card (CMC418): selects the Ethernet private line
option card, also referred to as X8PL.
– LA Interconnect Unit V1 (CMC413): selects the 10/100BASE-T LA option
card, also referred to as X4IP-V1.
– LA Interconnect Unit V2 (CMC410): selects the 10/100BASE-T TransLA®
option card, also referred to as X4IP-V2.
– LA X5IP E/FE/GbE Option Card (CMC419): selects the switched Ethernet
TransLA® option card, also referred to as X5IP.
– X.21 Option Card (CMC411): selects the X.21 option card (4 × X.21), also
referred to as X4X.21.
• Slot state – select a radio button to modify the slot state. Possible values are Auto,Assign, or Unassign.
...................................................................................................................................................................................................
6 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify Slot page, and the slot is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of slots and SFP modulesTo modify a slot
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-7
To view a list of SFP modules
When to use
Use this task to view a list of small form-factor pluggable optics (SFP) modules for a
selected E.
There are two methods to this task.
Task, method 1: from the Network Elements page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set SFP Modules.
5. Click Go.
Result:The Search for SFP Modules page is displayed, having the fields for NE
type and NE name preselected.
...................................................................................................................................................................................................
3 For the Slot field, select a slot from the drop-down list, then click Search.
Result:The SFP Modules page is displayed. It includes a list of SFP modules for the
selected slot of the selected E in question.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view a list of SFP modules
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-8 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Task, method 2: from the Slots page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set Equipment.
5. Click Go.
Result:The Slots page is displayed. It includes a list of slots for the selected E.
...................................................................................................................................................................................................
3 The Slot column of the table lists the names of the slots. Click the radio button next to the
slot for which you wish to view SFP modules.
...................................................................................................................................................................................................
4 From the Go menu, select SFP Modules.
Result:The Search for SFP Modules page is displayed, having the fields for NE
type and NE name preselected.
...................................................................................................................................................................................................
5 For the Slot field, select a slot from the drop-down list, then click Search.
Result:The SFP Modules page is displayed. It includes a list of SFP modules for the
selected slot of the selected E in question.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view a list of SFP modules
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-9
To view SFP module information
When to use
Use this task to view SFP information for a selected slot of an E. This includes data like
module type, serial number, and ordering information.
This task has two methods.
Task, method 1: from the Network Elements page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set SFP Modules.
5. Click Go.
Result:The Search for SFP Modules page is displayed, having the fields for NE
type and NE name preselected.
...................................................................................................................................................................................................
3 For the Slot field, select a slot from the drop-down list, then click Search.
Result:The SFP Modules page is displayed. It includes a list of SFP modules for the
selected slot of the selected E in question.
...................................................................................................................................................................................................
4 The SFP module column of the table lists the names of the SFP modules. Click the radio
button next to the SFP module you wish to view.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view SFP module information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-10 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
5 From the Go menu, select View.
Result:The SFP Module details page is displayed, which lists information for the
selected SFP module.
Task, method 2: from the Slot list
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set Equipment.
5. Click Go.
Result:The Slots page is displayed. It includes a list of slots for the selected E.
...................................................................................................................................................................................................
3 The Slot column of the table lists the names of the slots. Click the radio button next to the
respective slot.
...................................................................................................................................................................................................
4 From the Go menu, select SFP Modules.
Result:The Search for SFP Modules page is displayed, having the fields for NE
type and NE name preselected.
...................................................................................................................................................................................................
5 For the Slot field, select a slot from the drop-down list, then click Search.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view SFP module information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-11
E N D O F S T E P S...................................................................................................................................................................................................
Result:The SFP Modules page is displayed. It includes a list of SFP modules for the
selected slot of the selected E in question.
...................................................................................................................................................................................................
6 From the Go menu, select View.
Result:The SFP Module details page is displayed, which lists information for the
selected SFP module.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of slots and SFP modulesTo view SFP module information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-12 365-312-877R7.2Issue 4 November 2009
To set the SFP module assignment state
When to use
Use this task to set the SFP module assignment state for a selected slot to unassigned
when the SFP module has been removed.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Equipment.
4. In the Function field, select Retrieve/Set SFP Modules.
5. Click Go.
Result:The Search for SFP Modules page is displayed, having the fields for NE
type and NE name preselected.
...................................................................................................................................................................................................
3 For the Slot field, select a slot from the drop-down list, then click Search.
Result:The SFP Modules page is displayed. It includes a list of SFP modules for the
selected slot of the selected E in question.
...................................................................................................................................................................................................
4 The SFP module column of the table lists the names of the SFP modules. Click the radio
button next to the SFP module you wish to view.
...................................................................................................................................................................................................
5 From the Go menu, select View.
Equipment provisioning tasks Provisioning of slots and SFP modulesTo set the SFP module assignment state
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-13
Result:The SFP Module details page is displayed, which lists information for the
selected SFP module.
...................................................................................................................................................................................................
6 The SFP module column of the table lists the names of the SFP modules. Click the radio
button next to the SFP module you wish to view.
...................................................................................................................................................................................................
7 From the Go menu, select Unassign and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the SFP Modules page, and the SFP module assignment state is set to
Unassigned.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of slots and SFP modulesTo set the SFP module assignment state
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-14 365-312-877R7.2Issue 4 November 2009
Port provisioning
To view a list of physical ports
When to use
Use this task to view a list of physical ports.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network. The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Element→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Search for Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of an E (if not already present).
3. In the Port type field, select Physical.
...................................................................................................................................................................................................
3 If… then…
you want the search to return a
single port,
in the Search by field, select Port ID. In the Port ID
field, enter the port ID. Click Search.
you want the search to return a list
of multiple ports,
in the Search by field, select Port list. Select a Port
rate and/or a Slot / Circuit Pack. Click Search.
Result:The list at the bottom of the Ports page is populated with a list of ports in the
E that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo view a list of physical ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-15
To view a list of logical ports
When to use
Use this task to view a list of logical ports.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network . The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Element→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Search for Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of an E (if not already present).
3. In the Port type field, select Logical.
...................................................................................................................................................................................................
3 If… then…
you want the search to return a
single port,
in the Search by field, select Port ID. In the Port ID
field, enter the port ID. Click Search.
you want the search to return a list
of multiple ports,
in the Search by field, select Port list. Select a Port
rate, a Parent port rate, and a Slot / Circuit Pack.
Click Search.
Result:The list at the bottom of the Ports page is populated with a list of ports in the
E that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo view a list of logical ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-16 365-312-877R7.2Issue 4 November 2009
To view a list of contained logical ports
When to use
Use this task to view a list of logical ports contained within a physical port.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network . The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Element→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Search for Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of an E (if not already present).
3. In the Port type field, select Logical.
...................................................................................................................................................................................................
3 If… then…
you want the search to return a
single port,
in the Search by field, select Port ID. In the Port ID
field, enter the port ID. Click Search.
you want the search to return a list
of multiple ports,
in the Search by field, select Port list. Select a port
rate, parent port rate, and a slot/circuit pack. Click
Search.
Result:The list at the bottom of the Ports page is populated with a list of ports in the
E that meet your search criteria.
...................................................................................................................................................................................................
4 The Native name column of the table lists the names of the physical or logical ports.
Click the radio button next to the port for which you wish to view contained logical ports.
...................................................................................................................................................................................................
5 From the Go menu, select Display all contained ports or one of the menu options to
display contained ports of a certain rate, and click Go.
Equipment provisioning tasks Port provisioningTo view a list of contained logical ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-17
Result:The list at the bottom of the Ports page is populated with a list of the logical
ports contained in the physical or logical port.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo view a list of contained logical ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-18 365-312-877R7.2Issue 4 November 2009
To view a list of loopback-enabled ports
When to use
Use this task to view a list of loopback-enabled ports.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network. The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Elements→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to specify the criteria for your search:
1. In the NE type field, select a type of E.
2. In the NE name field, enter the name of the E from the drop-down menu.
3. In the Search by field, click the radio button Port list.
4. In the Port type field, click the radio button Physical.
5. Make a selection in the Port rate and the Slot / Circuit pack fields.ote: If the “Slot / Circuit pack” field is not selectable, change the selection of the
Port rate and try again.
6. In the Filter by field, click the check-box next to Loopback provisioned.
7. Click Search.
Result:The Ports panel is populated at the bottom containing a list of records that
meet your search criteria.
If the list is empty, no loopbacks are provisioned.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo view a list of loopback-enabled ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-19
To provision or deprovision a loopback on a port
When to use
Use this task to provision or deprovision a loopback on a port.
NOTICE
Service-disruption hazard
Provisioning a loopback may result in a disruption of traffic, timing, and the possible loss
of DC connections.
Before you begin
Loopback is supported only on physical ports.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network . The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Element→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Search for Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of an E (if not already present).
3. In the Port type field, select Physical.
...................................................................................................................................................................................................
3 If… then…
you want the search to return a
single port,
in the Search by field, select Port ID. In the Port ID
field, enter the port ID. Click Search.
you want the search to return a list
of multiple ports,
in the Search by field, select Port list. Select a Port
rate, a Parent port rate, and a Slot / Circuit Pack.
Click Search.
Equipment provisioning tasks Port provisioningTo provision or deprovision a loopback on a port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-20 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Ports page is populated with a list of ports in the
E that meet your search criteria.
...................................................................................................................................................................................................
4 The Native name column of the table lists the names of the ports. Click the radio button
next to the port on which you wish to provision loopback.
...................................................................................................................................................................................................
5 From the Go menu, select Provision loopback and click Go.
Result:The Loopback Provisioning page is displayed.
...................................................................................................................................................................................................
6 In the Loopback type field, click the radio button in either of the following fields:
• Inloop Loopback
• Outloop Loopback
Result:The Operation field changes to Provision or Deprovision, depending on
your selection, and whether an inloop loopback or outloop loopback is provisioned on
the port.
...................................................................................................................................................................................................
7 In the Operation field, select Provision or Deprovision and click Submit.
Important! The E will reject loopback creation if the port is in service.
Result:A confirmation window is displayed asking you to confirm the provisioning
or deprovisioning.
...................................................................................................................................................................................................
8 Click Yes.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page, and the loopback is provisioned or deprovisioned on the port.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo provision or deprovision a loopback on a port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-21
To modify the parameters of a physical or logical port
When to use
Use this task to modify the parameters of a port.
NOTICE
Service-disruption hazard
Modification of port parameters may affect traffic.
Before you start to modify port parameters, ensure that the port is not in use.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network . The Network Map is displayed.Right-click an E icon. From the resulting Node menu, select Network Element→ Ports.
• Use the object links to follow this path: Network Elements→ Ports.
Result:The Ports page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E.
2. In the NE name field, select the name of an E.
3. In the Port type field, select Physical or Logical, respectively, depending on thetype of port you want to modify.
...................................................................................................................................................................................................
3 If… then…
you want the search to return a
single port,
in the Search by field, select Port ID. In the Port ID
field, enter the port ID. Click Search.
you want the search to return a list
of multiple ports,
in the Search by field, select Port list. Select a port
rate, parent port rate, and a slot/circuit pack. Click
Search.
Equipment provisioning tasks Port provisioningTo modify the parameters of a physical or logical port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-22 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Ports page is populated with a list of ports in the
E that meet your search criteria.
...................................................................................................................................................................................................
4 The Native name column of the table lists the names of the ports. Each name is a
hyperlink.
Do one of the following:
• Click the name of the port you wish to modify.
• Click the radio button next to the port you wish to modify. From the Go menu, select
View/modify port parameters and click Go.
Result:The Port page is displayed.
...................................................................................................................................................................................................
5 Change the entries or selections for any modifiable port parameters.
Detailed information about the parameters to be modified and the possible values is
provided in the following sections:
• “Parameters for SDH/PDH ports” (p. 6-24)
• “Parameters for SHDSL ports” (p. 6-33)
• “Parameters for Ethernet ports” (p. 6-39)
• “Parameters for VCG ports” (p. 6-43)
...................................................................................................................................................................................................
6 Click Submit.
Result:A confirmation window is displayed asking you to confirm the modification.
...................................................................................................................................................................................................
7 Click Yes.
Result:The port parameters are modified, and a confirmation is issued in the
Messages panel. The Job Updates page is displayed and reports the status of the
modification of the port parameters.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Port provisioningTo modify the parameters of a physical or logical port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-23
Parameters for SDH/PDH ports
Introduction
This section lists the parameters that can be modified for SDH or PDH ports. ot all
parameters and possible values apply to all port types, plug-in units, and network element
configurations.
For a number of parameters, the network elements can report the value not applicable.
This value is for information purposes only, it cannot be entered.
Transmission
In the Transmission section of the Port page, the following parameters can be modified:
Parameter Function Possible values
Port mode Indicates the monitoring state of the
specified port.
Depending on the port rate and type the
following values are possible:
• on – the port is being monitored.
• auto – the port is ready to transition
into a monitored state, when a signal
is detected.
• off – the port is not being monitored.
Auto mode hold time (min) For physical ports with port mode set to
auto, this parameter defines the time
period (in minutes), for which an incoming
signal must be maintained for the port
mode to automatically transition to on.
Integer in the range from 0 to 30.
Diagnostic mode Controls the diagnostic mode of an
SHDSL LTU port.
disabled, enabled, notSpecified,
notApplicable.
SPAN startup state Indicates which phase of the lowlevel span
startup an SHDSL LTU port is in.
String of up to 30 characters.
Customer side SA4 control For SHDSL E1 ports, this setting controls
how the SA4 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Customer side SA5 and SA6 control For SHDSL E1 ports, this setting controls
how the SA5 and SA6 bits are processed.
They can either be passed through
transparently or they can be reinserted.
transparent, reinsert, not applicable.
Customer side SA7 control For SHDSL E1 ports, this setting controls
how the SA7 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Customer side SA8 control For SHDSL E1 ports, this setting controls
how the SA8 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-24 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Customer side SA6 alarm code For SHDSL E1 ports, this setting selects
the value used to signal alarms towards
SDH side.
1100, 1000.
Ingress sa6 AIS code For non-SHDSL E1 ports in ISD modes,
this setting defines the bit sequence used
for the SA6 bits forwarded towards the
SDH network, to indicate that an alarm
condition was detected on the signal
incoming from the end-user.
1100, 1000, not applicable.
Customer side force AIS For SHDSL E1 ports, this setting controls
whether AIS is inserted on the respective
termination point.
disabled, enabled, not applicable.
Egress force AIS For non-SHDSL E1 ports in ISD modes,
this setting defines whether an AIS signal
should be forced in the direction towards
the end-user.
disabled, enabled, not applicable.
Customer side AIS forwarding
method
For SHDSL E1 ports, this setting specifies
the action to be taken when channel AIS is
received from SDH side.
transparent – the SA6 bits are forwarded
transparently to the customer; fullAis – an
all ones pattern is inserted towards the
customer; not applicable – signalling of
AIS is not applicable.
Egress channel AIS mapping For non-SHDSL E1 ports in ISD modes,
this setting defines the mode of
forwarding, towards the end-user, of a
“channel AIS” signal, received from the
network and carrying the bit-sequence
“1100” in the SA6 bits. The signal can be
forwarded either transparently or as a “full
AIS” signal (all binary ones).
transparent, full AIS, not applicable.
Customer side consequent action
control
For SHDSL E1 ports, this setting specifies
if a CRC-4 error or an E-bit error, received
on the customer side TP, triggers the
setting of an SA6biterror code on the
network side termination point.
disabled, enabled, not applicable.
Interface Mode For SHDSL E1 or DSL ports, this setting
determines whether the incoming signal
will be processed as a plain E1 signal or an
E1 signal contained in an ISD wrapper.
PDH 2Mb Interface, primary ISD PDH
2Mb interface, leased ISD PDH 2Mb
interface.
Customer side TS0 monitoring For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is monitored.
disabled, enabled, not applicable.
Customer side TS0 termination For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is terminated.
disabled, enabled, not applicable.
Customer side degraded values
selection
For SHDSL E1 or DSL ports, this setting
controls which of the two available
thresholds for degraded signal (DEG)
condition is to be used.
value1, value2, not applicable.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-25
Parameter Function Possible values
Customer side alarm monitoring For SHDSL E1 or DSL ports, this setting
controls if alarms are reported in the
corresponding direction.
monitored, not monitored, not applicable.
Customer side CRC4 processing For SHDSL E1 or DSL ports, this setting
specifies if the CRC4 is processed.
disabled, enabled, not applicable.
Network side TS0 monitoring For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is monitored.
disabled, enabled, not applicable.
Networkside degraded values
selection
For SHDSL E1 or DSL ports, this setting
controls which of the two available
thresholds for degraded signal (DEG)
condition is to be used.
value1, value2, not applicable.
Networkside alarm monitoring For SHDSL E1 or DSL ports, this setting
controls if alarms are reported in the
corresponding direction.
monitored, not monitored, not applicable.
Network side CRC4 processing For SHDSL E1 or DSL ports, this setting
specifies if the CRC4 is processed.
disabled, enabled, not applicable.
Network side SA6 loopback control For SHDSL E1 ports, this setting shows
whether the hardware is allowed to set a
loopback based on the incoming SA6 bits.
disabled, enabled, not applicable.
Network side force AIS For SHDSL E1 ports, this setting controls
whether AIS is inserted on the respective
termination point.
disabled, enabled, not applicable.
Ingress force AIS For non-SHDSL E1 ports in ISD modes,
this setting defines whether an AIS signal
should be forced in the direction towards
the SDH network.
disabled, enabled, not applicable.
Network side AIS method For SHDSL E1 ports, this setting specifies
the method is used to signal AIS towards
SDH side.
channelAis – the SA6 bit is used to signal
AIS; fullAis – the entire signal is filled
with “1”s; not applicable – signalling of
AIS is not applicable.
Ingress AIS type For non-SHDSL E1 ports in ISD modes,
this setting controls the method used to
signal AIS towards the SDH network.
full Ais – all binary ones; channel Ais –
TS0 retains overhead functions; not
applicable.
Remote lan port state This setting indicates whether a remote
LA port is enabled or disabled. If set to
disabled, no service is offered on the port
in question.
disabled, enabled, not applicable.
Untagged frame processing Controls how the remote LA port
processes incoming untagged packets.
forward – forward frames unchanged;
discard – drop the incoming untagged
packets; insert tag – insert tag into
incoming untagged packets before
forwarding.
Committed burst size The committed burst size for a T10ETH
remote LA port.
Integer in the range from 0 to 100 in steps
of 1 kbyte.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-26 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Consequent action on signal label
mismatch
This setting controls whether in a TSL
mismatch situation the consequent action
is carried out.
disabled, enabled, not specified, not
applicable.
Inloop/Facility loopback The field name is a hyperlink. To create or
delete a loopback, click the link and follow
the task “To provision or deprovision a
loopback on a port” (p. 6-20).
Outloop/Terminal loopback The field name is a hyperlink. To create or
delete a loopback, click the link and follow
the task “To provision or deprovision a
loopback on a port” (p. 6-20) .
MS DCC Controls the data communication channel
(DCC) in the overhead related to the
multiplex section terminated at the port.
enabled, disabled.
RS DCC Controls the data communication channel
(DCC) in the overhead related to the
regenerator section terminated at the port.
enabled, disabled.
MS LAPD role Defines the role of the port in case the MS
DCC is enabled.
network, user.
RS LAPD role Defines the role of the port in case the RS
DCC is enabled.
network, user.
MS LAPD mode Defines the LAPD mode of the port in case
the MS DCC is enabled.
UITS, AITS.
RS LAPD mode Defines the LAPD mode of the port in case
the RS DCC is enabled.
UITS, AITS.
MS MSP DCC Controls the MSP protected data
communication channel (DCC) in the
overhead related to the multiplex section
terminated at the port.
enabled, disabled.
RS MSP DCC Controls the MSP protected data
communication channel (DCC) in the
overhead related to the regenerator section
terminated at the port.
enabled, disabled.
MS MSP DCC mode Used to select the operation mode of the
MSP protected DCC (if enabled) in the
overhead related to the multiplex section
terminated at the port.
independent, via MSP.
RS MSP DCC mode Used to select the operation mode of the
MSP protected DCC (if enabled) in the
overhead related to the regenerator section
terminated at the port.
independent, via MSP.
MS MSP LAPD role Used to select the role of the port in case
the MS MSP DCC is enabled.
network, user.
RS MSP LAPD role Used to select the role of the port in case
the RS MSP DCC is enabled.
network, user.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-27
Parameter Function Possible values
MS MSP LAPD mode Defines the LAPD mode of the port in case
the MS MSP DCC is enabled.
UITS, AITS.
RS MSP LAPD mode Defines the LAPD mode of the port in case
the RS MSP DCC is enabled.
UITS, AITS.
ISDN mode This parameter defines the ISD mode, if
applicable. It determines the 2-Mbps signal
mapping.
• non-ISD – no ISD processing at
the respective port.
• ISD-STD – ISD standard mode.
• ISD-LL – ISD leased line mode.
Ingress PDH monitoring Controls the TS0 monitoring of the
incoming signal.
disabled – TS0 monitoring turned off;
enabled – TS0 monitoring turned on.
Egress PDH monitoring Controls the TS0 monitoring of the
outgoing signal.
disabled – TS0 monitoring turned off;
enabled – TS0 monitoring turned on.
Line coding Defines the line coding of the signal at a
DS1 port.
B8ZS (bipolar with eight-zero
substitution), AMI (alternate mark
inversion).
Cable length (m) Cable length connected to the DS1 or DS3
PTP.
0-40, 40-80, 80-120, 120-160, 160-200.
RDI/REI insertion For a trail termination point, this setting
enables or disables the remote defect
indicator (RDI) and remote error indicator
(REI) in the path overhead. The disabled
state is appropriate when the TP terminates
a unidirectional path, while the enabled
state is appropriate when the TP terminates
a bidirectional path.
enabled, disabled, notSpecified,
notApplicable (fixed)
Trace information
In the Trace Information section of the Port page, the following parameters can be
modified:
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-28 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Transmitted trail trace format Selects the format of the transmitted trail
trace identifier (TTI).
Depending on the port and signal type, a
subset of the following:
• non-specific byte – a single byte with
a fixed hexadecimal value of 0x00
(ITU/ETSI mode 2).
• specific byte (1-byte string) – a single
byte (hexadecimal format using the
printable T.50/ASCII character set)
(SOET mode).
• 16-byte string – a 16-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the first byte being a CRC-7
(ITU/ETSI mode 1).
• 64-byte string – a 64-byte
hexadecimal format using the
printable T.50/ASCII character set,
with the last two bytes being a
carriage return, line feed (SOET).
Transmitted trail trace value If the transmitted trail trace format
parameter is set to specific byte (1-byte
string), 16-byte string, or 64-byte string,
the transmitted character string is set here.
Since the possible values depend on the
setting of the transmitted trace display
mode parameter, it is recommended to set
that parameter in advance.
The field name is a hyperlink. Click it to
open a window where you can enter the
desired string.
Transmitted trace display mode If the transmitted trail trace format
parameter is set to specific byte (1-byte
string), 16-byte string, or 64-byte string,
the format of the transmitted character
string is set here.
ascii, hex.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-29
Parameter Function Possible values
Expected trail trace format Selects the format of the expected trail
trace identifier (TTI).
Depending on the port and signal type, a
subset of the following:
• non-specific byte – a single byte with
a fixed hexadecimal value of 0x00
(ITU/ETSI mode 2).
• specific byte (1-byte string) – a single
byte (hexadecimal format using the
printable T.50/ASCII character set)
(SOET mode).
• 16-byte string – a 16-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the first byte being a CRC-7
(ITU/ETSI mode 1).
• 64-byte string – a 64-byte
hexadecimal format using the
printable T.50/ASCII character set,
with the last two bytes being a
carriage return, line feed (SOET).
Expected trail trace value If the expected trail trace format parameter
is set to specific byte (1-byte string),
16-byte string, or 64-byte string, the
transmitted character string is set here.
Since the possible values depend on the
setting of the expected trace display mode
parameter, it is recommended to set that
parameter in advance.
The field name is a hyperlink. Click it to
open a window where you can enter the
desired string.
Expected trace display mode If the expected trail trace format parameter
is set to specific byte (1-byte string),
16-byte string, or 64-byte string, the format
of the expected character string is set here.
ascii, hex.
Trail trace mismatch detection mode Controls the detection mode. enabled, disabled.
Consequent action on trail trace
mismatch
Enables / disables consequent action in
case of a trace identifier mismatch
detection. For SDH: ote that this function
is only supported if the related trace read
format is set to 16-byte string.
enabled, disabled.
Timing
In the Timing section of the Port page, the following parameters can be modified:
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-30 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Timing mode Controls the retiming of a PDH port (E1,
X21, DS1).
Possible values are:
• self-timed – the outgoing PDH signal
is demapped from the SDH signal and
sent out with its own timing frquency.
• re-timed – the timing of the PDH
output signal is derived from the E
system timing.
• not applicable
Acceptance quality level If retiming is enabled, this parameter sets
the acceptance quality level.
If the system quality level (in case of
system timing) or the QL-out (in case of
independent timing) falls below the
acceptance quality level, the timing will go
into the fallback mode.
This parameter is dependent on the timing
mode. When timing mode is set to
re-timed, then all values except not
applicable are valid. When timing mode is
not set to re-timed, then not applicable is
the only valid value.
Possible values are:
• PRC – Primary Reference Clock
• SSU-T – Synchronization Supply
Unit-Transit
• SSU-L – Synchronization Supply
Unit-Local
• SEC – SDH equipment clock
• DU – Do ot Use
• not applicable
Fallback mode If a port is operating in the re-timed mode
and if the QL mode is enabled, the output
is automatically switched to the
provisioned fallback mode, if the quality
level of the system timing drops below the
acceptance quality level.
This parameter is dependent on the timing
mode. When timing mode is set to
re-timed, then all values except not
applicable are valid. When timing mode is
not set to re-timed, then not applicable is
the only valid value.
The three fallback modes are:
• re-timed AIS – a re-timed AIS is sent
out.
• self-timed – the signal is sent out,
from the port in the self-timed mode.
• none – no fallback applies.
• not applicable
Timing alarm reporting When the timing state of a tributary output
port is fallback, a defect is declared. The
reporting of this timing alarm can be
enabled or disabled for each individual
output port. This is done with the timing
alarm reporting parameter.
reported, not reported, not applicable.
ForceDNU Force DU allows to force an S1bytevalue
DU into an outgoing signal. When an
outgoing signal is forced to carry DU,
this signal cannot be used for
synchronization by another E.
reported, not reported, not applicable.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-31
Fault management
In the Fault Management section of the Port page, the following parameters can be
modified:
Parameter Function Possible values
Degraded value selection Selects one of the two available threshold
definitions for the degraded signal (DEG)
condition for the given layer rate.
1, 2.
Ingress PDH degraded value
selection
This parameter indicates (in conjunction
with the setting of the Ingress PDH
monitoring parameter) the number of
errors (EB: Errored Blocks) that can occur
during the given period for the incoming
signal. If this number is exceeded and the
port mode is set to monitored, a signal
degrade alarm is generated. A choice can
be made between two pre-defined
thresholds.
not applicable, 1, 2.
Egress PDH degraded value selection For a PDH port supporting PDH layer
monitoring, this setting selects one of the
two available threshold definitions for the
degraded signal (DEG) condition for the
given layer rate.
not applicable, 1, 2.
Equipment provisioning tasks Port provisioningParameters for SDH/PDH ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-32 365-312-877R7.2Issue 4 November 2009
Parameters for SHDSL ports
Introduction
This section lists the parameters that can be modified for SHDSL ports. ote that not all
parameters and possible values apply to all port types, plug-in units, and network element
configurations.
For a number of parameters, the network elements can report the value not applicable.
This value is for information purposes only, it cannot be entered.
Transmission
In the Transmission section of the Port page, the following parameters can be modified:
Parameter Function Possible values
Port mode Indicates the monitoring state of the
specified port.
Depending on the port rate and type the
following values are possible:
• on – the port is being monitored.
• auto – the port is ready to transition
into a monitored state, when a signal
is detected.
• off – the port is not being monitored.
Auto mode hold time (min) For physical ports with port mode set to
auto, this parameter defines the time
period (in minutes), for which an incoming
signal must be maintained for the port
mode to automatically transition to on.
Integer in the range from 0 to 30.
Diagnostic mode Controls the diagnostic mode of an
SHDSL LTU port.
disabled, enabled, not specified, not
applicable.
SPAN startup state Indicates which phase of the low level
span startup an SHDSL LTU port is in.
String of up to 30 characters.
Customer side SA4 control For SHDSL E1 ports, this setting controls
how the SA4 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Customer side SA5 and SA6 control For SHDSL E1 ports, this setting controls
how the SA5 and SA6 bits are processed.
They can either be passed through
transparently or they can be reinserted.
transparent, reinsert, not applicable.
Customer side SA7 control For SHDSL E1 ports, this setting controls
how the SA7 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Customer side SA8 control For SHDSL E1 ports, this setting controls
how the SA8 bit is processed. It can either
be passed through transparently or it can
be reinserted.
transparent, reinsert, not applicable.
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-33
Parameter Function Possible values
Customer side SA6 alarm code For SHDSL E1 ports, this setting selects
the value used to signal alarms towards
SDH side.
1100, 1000.
Ingress sa6 AIS code For non-SHDSL E1 ports in ISD modes,
this setting defines the bit sequence used
for the SA6 bits forwarded towards the
SDH network, to indicate that an alarm
condition was detected on the signal
incoming from the end-user.
1100, 1000, not applicable.
Customer side force AIS For SHDSL E1 ports, this setting controls
whether AIS is inserted on the respective
termination point.
disabled, enabled, not applicable.
Egress force AIS For non-SHDSL E1 ports in ISD modes,
this setting defines whether an AIS signal
should be forced in the direction towards
the end-user.
disabled, enabled, not applicable.
Customer side AIS forwarding
method
For SHDSL E1 ports, this setting specifies
the action to be taken when channel AIS is
received from SDH side.
transparent – the SA6 bits are forwarded
transparently to the customer; fullAis – an
all ones pattern is inserted towards the
customer; not applicable – signaling of
AIS is not applicable.
Egress channel AIS mapping For non-SHDSL E1 ports in ISD modes,
this setting defines the mode of
forwarding, towards the end-user, of a
“channel AIS” signal, received from the
network and carrying the bit-sequence
“1100” in the SA6 bits. The signal can be
forwarded either transparently or as a “full
AIS” signal (all binary ones).
transparent, full AIS, not applicable.
Customer side consequent action
control
For SHDSL E1 ports, this setting specifies
if a CRC-4 error or an E-bit error, received
on the customer side TP, triggers the
setting of an SA6 bit error code on the
network side termination point.
disabled, enabled, not applicable.
Interface Mode For SHDSL E1 or DSL ports, this setting
determines whether the incoming signal
will be processed as a plain E1 signal or an
E1 signal contained in an ISD wrapper.
PDH 2Mb Interface, primary ISD PDH
2Mb interface, leased ISD PDH 2Mb
interface.
Customer side TS0 monitoring For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is monitored.
disabled, enabled, not applicable.
Customer side TS0 termination For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is terminated.
disabled, enabled, not applicable.
Customer side degraded values
selection
For SHDSL E1 or DSL ports, this setting
controls which of the two available
thresholds for degraded signal (DEG)
condition is to be used.
value1, value2, not applicable.
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-34 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Customer side alarm monitoring For SHDSL E1 or DSL ports, this setting
controls if alarms are reported in the
corresponding direction.
monitored, not monitored, not applicable.
Customer side CRC4 processing For SHDSL E1 or DSL ports, this setting
specifies if the CRC4 is processed.
disabled, enabled, not applicable.
Network side TS0 monitoring For SHDSL E1 or DSL ports, this setting
specifies if timeslot 0 is monitored.
disabled, enabled, not applicable.
Networkside degraded values
selection
For SHDSL E1 or DSL ports, this setting
controls which of the two available
thresholds for degraded signal (DEG)
condition is to be used.
value1, value2, not applicable.
Networkside alarm monitoring For SHDSL E1 or DSL ports, this setting
controls if alarms are reported in the
corresponding direction.
monitored, not monitored, not applicable.
Network side CRC4 processing For SHDSL E1 or DSL ports, this setting
specifies if the CRC4 is processed.
disabled, enabled, not applicable.
Network side SA6 loopback control For SHDSL E1 ports, this setting shows
whether the hardware is allowed to set a
loopback based on the incoming SA6 bits.
disabled, enabled, not applicable.
Network side force AIS For SHDSL E1 ports, this setting controls
whether AIS is inserted on the respective
termination point.
disabled, enabled, not applicable.
Ingress force AIS For non-SHDSL E1 ports in ISD modes,
this setting defines whether an AIS signal
should be forced in the direction towards
the SDH network.
disabled, enabled, not applicable.
Network side AIS method For SHDSL E1 ports, this setting specifies
the method is used to signal AIS towards
SDH side.
channelAis – the SA6 bit is used to signal
AIS; fullAis – the entire signal is filled
with “1”s; not applicable – signaling of
AIS is not applicable.
Ingress AIS type For non-SHDSL E1 ports in ISD modes,
this setting controls the method used to
signal AIS towards the SDH network.
full Ais – all binary ones; channel Ais –
TS0 retains overhead functions; not
applicable.
Remote lan port state This setting indicates whether a remote
LA port is enabled or disabled. If set to
disabled, no service is offered on the port
in question.
disabled, enabled, not applicable.
Untagged frame processing Controls how the remote LA port
processes incoming untagged packets.
forward – forward frames unchanged;
discard – drop the incoming untagged
packets; insert tag – insert tag into
incoming untagged packets before
forwarding.
Committed burst size The committed burst size for a T10ETH
remote LA port.
Integer in the range from 0 to 100 in steps
of 1 kbyte.
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-35
Parameter Function Possible values
Consequent action on signal label
mismatch
This setting controls whether in a TSL
mismatch situation the consequent action
is carried out.
disabled, enabled, not specified, not
applicable.
Inloop/Facility loopback The field name is a hyperlink. To create or
delete a loopback, click the link and follow
the task “To provision or deprovision a
loopback on a port” (p. 6-20).
Outloop/Terminal loopback The field name is a hyperlink. To create or
delete a loopback, click the link and follow
the task “To provision or deprovision a
loopback on a port” (p. 6-20) .
ISDN mode This parameter defines the ISD mode, if
applicable. It determines the 2-Mbps signal
mapping.
• non-ISD – no ISD processing at
the respective port.
• ISD-STD – ISD standard mode.
• ISD-LL – ISD leased line mode.
Ingress PDH monitoring Controls the TS0 monitoring of the
incoming signal.
disabled – TS0 monitoring turned off;
enabled – TS0 monitoring turned on.
Egress PDH monitoring Controls the TS0 monitoring of the
outgoing signal.
disabled – TS0 monitoring turned off;
enabled – TS0 monitoring turned on.
Line coding Defines the line coding of the signal at a
DS1 port.
B8ZS (bipolar with eight-zero
substitution), AMI (alternate mark
inversion).
Cable length (m) Cable length connected to the DS1 or DS3
PTP.
0-40, 40-80, 80-120, 120-160, 160-200.
Timing
In the Timing section of the Port page, the following parameters can be modified:
Parameter Function Possible values
Timing mode Controls the retiming of a PDH port (E1,
X21, DS1).
Possible values are:
• self-timed – the outgoing PDH signal
is demapped from the SDH signal and
sent out with its own timing frquency.
• re-timed – the timing of the PDH
output signal is derived from the E
system timing.
• not applicable
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-36 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Acceptance quality level If retiming is enabled, this parameter sets
the acceptance quality level.
If the system quality level (in case of
system timing) or the QL-out (in case of
independent timing) falls below the
acceptance quality level, the timing will go
into the fallback mode.
This parameter is dependent on the timing
mode. When timing mode is set to
re-timed, then all values except not
applicable are valid. When timing mode is
not set to re-timed, then not applicable is
the only valid value.
Possible values are:
• PRC – Primary Reference Clock
• SSU-T – Synchronization Supply
Unit-Transit
• SSU-L – Synchronization Supply
Unit-Local
• SEC – SDH equipment clock
• DU – Do ot Use
• not applicable
Fallback mode If a port is operating in the re-timed mode
and if the QL mode is enabled, the output
is automatically switched to the
provisioned fallback mode, if the quality
level of the system timing drops below the
acceptance quality level.
This parameter is dependent on the timing
mode. When timing mode is set to
re-timed, then all values except not
applicable are valid. When timing mode is
not set to re-timed, then not applicable is
the only valid value.
The three fallback modes are:
• re-timed AIS – a re-timed AIS is sent
out.
• self-timed – the signal is sent out,
from the port in the self-timed mode.
• none – no fallback applies.
• not applicable
Timing alarm reporting When the timing state of a tributary output
port is fallback, a defect is declared. The
reporting of this timing alarm can be
enabled or disabled for each individual
output port. This is done with the timing
alarm reporting parameter.
reported, not reported, not applicable.
ForceDNU Force DU allows to force an S1 byte
value DU into an outgoing signal. When
an outgoing signal is forced to carry DU,
this signal cannot be used for
synchronization by another E.
reported, not reported, not applicable.
Fault management
In the Fault Management section of the Port page, the following parameters can be
modified:
Parameter Function Possible values
Degraded value selection Selects one of the two available threshold
definitions for the degraded signal (DEG)
condition for the given layer rate.
1, 2.
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-37
Parameter Function Possible values
Ingress PDH degraded value
selection
This parameter indicates (in conjunction
with the setting of the Ingress PDH
monitoring parameter) the number of
errors (EB: Errored Blocks) that can occur
during the given period for the incoming
signal. If this number is exceeded and the
port mode is set to monitored, a signal
degrade alarm is generated. A choice can
be made between two pre-defined
thresholds.
not applicable, 1, 2.
Egress PDH degraded value selection For a PDH port supporting PDH layer
monitoring, this setting selects one of the
two available threshold definitions for the
degraded signal (DEG) condition for the
given layer rate.
not applicable, 1, 2.
Equipment provisioning tasks Port provisioningParameters for SHDSL ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-38 365-312-877R7.2Issue 4 November 2009
Parameters for Ethernet ports
Introduction
This section lists the parameters that can be modified for Ethernet ports. ot all
parameters and possible values apply to all port types, plug-in units, and network element
configurations.
For a number of parameters, the network elements can report the value not applicable.
This value is for information purposes only, it cannot be entered.
Transmission
In the Transmission section of the Port page, the following parameters can be modified:
Parameter Function Possible values
Port mode Indicates the monitoring state of the
specified port.
Depending on the port rate and type the
following values are possible:
• on – the port is being monitored.
• auto – the port is ready to transition
into a monitored state, when a signal
is detected.
• off – the port is not being monitored.
Auto mode hold time (min) For physical ports with port mode set to
auto, this parameter defines the time
period (in minutes), for which an incoming
signal must be maintained for the port
mode to automatically transition to on.
Integer in the range from 0 to 30.
Remote lan port state disabled, enabled, not applicable.
Equipment provisioning tasks Port provisioningParameters for Ethernet ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-39
Parameter Function Possible values
MAC address learning mode Defines the learning and forwarding
method for received Ethernet frames.• automaticmodeon: the source address
of the frame will be automatically
learned (i.e. dynamic MAC address
entry is created or updated within the
forwarding table). If there exists
already a dynamic or static MAC
address matching the destination
address and vlanId of the frame, it
will be forwarded according to the
table entry; otherwise the frame will
be forwarded to all output ports of the
virtual switch, except the port where
the frame was received.
• automaticmodeoff: received frames
are not treated as input of the
automatic learning process. The
packet will be handled in the
following way:
– If there exists not a dynamic
or static MAC address
matching the source address
and vlanId of the frame, the
frame will be dropped and
trapped into the CPU. A trap
control reduces the traffic to
the CPU to one MAC
Address per second, which
will be displayed in the
Mismatched MAC Address
List.
– If there exists a dynamic or
static MAC address matching
the destination address and
vlanId of the frame, it will be
forwarded according to the
table entry.
• notapplicable: attribute is not
applicable in current lanCTP/wanCTP
provisioning context; that is, lan CTP/
wan CTP is not member of a virtual
switch operating in spanning tree
mode.
Mismatched MAC address list For an Ethernet port which has its
mACAddressLearningMode turned off, and
is a member of a virtualSwitch in the
spanning tree mode, this parameter
specifies a set of source MAC addresses
for which Ethernet frames have been
dropped on account of there being no
matching static or dynamic entry in the
forwarding table during the current
observation period.
A list of MAC addresses where each
address is represented as a string of 12
characters, where each character is the
ASCII representation of a hexadecimal
digit.
Equipment provisioning tasks Port provisioningParameters for Ethernet ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-40 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Link pass through consequent action
mode
Defines the link pass through consequent
action active mode for a LA PTP which
is involved in a point-to-point service over
the WA.
active, inactive, inactive (fixed).
Port label Assigns a user specified name to the PTP. String.
Provisioned crossover mode Indicates the wiring of the physical
Ethernet port.
MDI – PC or end station wiring is used;
MDIX – hub or switch wiring is used; not
applicable; auto-negotiate.
Provisioned interface type Indicates the provisioned interface signal
for switchable interfaces.
100Base FX, 1000Base FX, unexpected
interface type.
Provisioned bit rate (Mb/s) For a port operating with autonegotiation
disabled, this setting defines the bit rate
which is provisioned for the port (in
Mbps).
10, 100, 1000, not applicable.
Provisioned duplex mode For a port operating with autonegotiation
disabled, this setting defines the duplex
mode which is provisioned for the port.
half duplex, full duplex, not applicable.
Provisioned pause mode The applicable pause mode. enabled, disabled, not applicable.
Auto negotiation mode Controls the autonegotiation mode. enabled, disabled.
Auto negotiation for pause mode Defines whether the transmission of
PAUSE frames (flow control) and the
processing of received PAUSE frames
should be disabled or should be
auto-negotiated by the PTP.
pause mode disabled, auto-negotiate,
auto-negotiate (fixed).
Default user priority The default priority for the port. Integer in the range from 0 to 7.
Ingress filtering mode For a LA or WA TP which is operating
under tagging mode “ieee8021Q”, but not
in repeater mode, this setting defines the
VLA filtering of packets received at the
Ethernet-switch port. If the parameter is set
to “enabled”, the port discards all
incoming packets which are assigned to
VLAs which do not register the given
port.
enabled, disabled.
GbE auto negotiation mode Sets the autonegotiation mode of the
optical Gigabit Ethernet LA-PITTP.
enabled, disabled.
Bridge PDU MAC suffix Defines the last byte of the destination
MAC address as used for bridge PDU
packets by the STP protocol.
String of two characters, where each
character represents a hexadecimal digit.
Bridge PDU VLAN tag Defines the VLA tag value used for
bridge PDU packets by the STP protocol.
no tag or an integer in the range from 1 to
4095.
Equipment provisioning tasks Port provisioningParameters for Ethernet ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-41
Parameter Function Possible values
Acceptable frame type For a LA or WA TP which is operating
under tagging mode “ieee8021Q”, but not
in repeater mode, this parameter defines
whether the TP will accept or drop
untagged packets.
only VLAtagged, all frames.
Spanning tree
In the Spanning Tree section of the Port page, the following parameters can be
modified:
Parameter Function Possible values
STP port priority The priority of the port for the spanning
tree protocol.
Integer in the range from 0 to 255.
Port path cost The port path cost. For a port with the
spanning tree protocol active, this
parameter defines the contribution of this
port to the path cost of paths toward the
spanning tree root which included this
port.
Integer.
Port path cost details
According to IEEE 802.1Q 1998, this parameter should be related to the bandwidth of the
link in which the port participates. Link speed is mapped to port path costs as follows:
Link speed Path cost
2 Mbps 10,000,000
4 Mbps 5,000,000
6 Mbps 3,400,000
8 Mbps 2,500,000
10 Mbps 2,000,000
50 Mbps 400,000
100 Mbps 200,000
1 Gbps 20,000
10 Gbps 2,000
Equipment provisioning tasks Port provisioningParameters for Ethernet ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-42 365-312-877R7.2Issue 4 November 2009
Parameters for VCG ports
Introduction
This section lists the parameters that can be modified for VCG ports. ote that not all
parameters and possible values apply to all port types, plug-in units, and network element
configurations.
For a number of parameters, the network elements can report the value not applicable.
This value is for information purposes only, it cannot be entered.
Transmission
In the Transmission section of the Port page, the following parameters can be modified:
Parameter Function Possible values
Port mode Indicates the monitoring state of the
specified port.
Depending on the port rate and type the
following values are possible:
• on – the port is being monitored.
• auto – the port is ready to transition
into a monitored state, when a signal
is detected.
• off – the port is not being monitored.
GID monitor enable Controls whether monitoring and alarming
of the group identifier (GID) is enabled for
this VCG.
disabled, enabled, not specified, not
applicable.
LPT consequent action for client
signal fail
Controls whether the link pass through
consequent action function for client signal
fail (CA-CSF) is enabled when the far-end
LA interface fails.
• enabled – if the far-end LA
interface receives the GFP signal
CSF, the transmit direction is disabled
at the VCG TTP. Applicable on LA
port 1, with LA port 2 disabled.
• disabled – no link pass through
consequent action on client signal
fail.
LPT consequent action for server
signal fail
Controls the link pass through consequent
action function for server signal fail in the
transmit direction.
• enabled – if the VCG TTP fails (e.g.
fiber is broken or XCs removal), the
transmit direction is disabled at the
LA interface
• disabled – no link pass through
consequent action on VCG TTP fail.
LCAS state sink For a VC-n TTP which is capable of being
allocated to a virtually concatenated group
for which LCAS support is available, this
parameter indicates the service state of the
VC-n TTP sink with respect to its
participation in a virtually concatenated
group.
not applicable, unavailable, failed, active,
wait to restore, add, DU Loopback.
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-43
Parameter Function Possible values
LCAS mode The operation mode of the link capacity
adjustment scheme (LCAS) for this VCG.
on, off.
LCAS hold-off time (ms) The LCAS hold-off time. If a tributary is
configured to be a member of the VCG,
and a fault is detected for that tributary,
then it is taken out of transmission by
LCAS after the hold off time. By means of
different hold-off times, it can be defined
which protection should switch first. The
hold-off time is configured on group level,
that means all tributaries of a VCG have
the same hold-off time.
Integer in the range from 0 to 10000 in
steps of 100.
LCAS wait to restore time (min) The LCAS wait-to-restore (WTR) time. If
a tributary is configured to be a member of
the VCG, and that tributary recovers from
a faulty state then it is taken in again to
transmission by LCAS after the
wait-to-restore time. The wait-to-restore
time is configured on group level, that
means all tributaries of a VCG have the
same wait-to-restore time.
Integer in the range from 0 to 60.
Encapsulation mode The method of encapsulation for adapting
asynchronous Ethernet traffic over
synchronous TDM traffic.
unknown, Ethernet over SDH, link access
procedure SDH, generic framing
procedure
Encapsulation mode determination For a VCG/WA TP, this setting defines
the method of determination for the
Ethernet encapsulation mode.
provisioned, automatic.
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-44 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
MAC address learning mode Defines the learning and forwarding
method for received Ethernet frames.• automaticmodeon: the source address
of the frame will be automatically
learned (i.e. dynamic MAC address
entry is created or updated within the
forwarding table). If there exists
already a dynamic or static MAC
address matching the destination
address and vlanId of the frame, it
will be forwarded according to the
table entry; otherwise the frame will
be forwarded to all output ports of the
virtual switch, except the port where
the frame was received.
• automaticmodeoff: received frames
are not treated as input of the
automatic learning process. The
packet will be handled in the
following way:
– If there exists not a dynamic
or static MAC address
matching the source address
and vlanId of the frame, the
frame will be dropped and
trapped into the CPU. A trap
control reduces the traffic to
the CPU to one MAC
Address per second, which
will be displayed in the
Mismatched MAC Address
List.
– If there exists a dynamic or
static MAC address matching
the destination address and
vlanId of the frame, it will be
forwarded according to the
table entry.
• notapplicable: attribute is not
applicable in current lanCTP/wanCTP
provisioning context; i.e. lan CTP/
wan CTP is not member of a virtual
switch operating in spanningtree
mode.
Mismatched MAC address list For an Ethernet port which has its
mACAddressLearningMode turned off, and
is a member of a virtualSwitch in the
spanningTree mode, this parameter
specifies a set of source MAC addresses
for which Ethernet frames have been
dropped on account of there being no
matcing static or dynamic entry in the
forwarding table during the current
observation period.
A list of MAC addresses where each
address is represented as a string of 12
characters, where each character is the
ASCII representation of a hexadecimal
digit.
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-45
Parameter Function Possible values
Default user priority The default priority for the port. Integer in the range from 0 to 7.
Ingress filtering mode For a LA or WA TP which is operating
under tagging mode “ieee8021Q”, but not
in repeater mode, this setting defines the
VLA filtering of packets received at the
Ethernet-switch port. If the parameter is set
to “enabled”, the port discards all
incoming packets which are assigned to
VLAs which do not register the given
port.
enabled, disabled.
Acceptable frame type For a LA or WA TP which is operating
under tagging mode “ieee8021Q”, but not
in repeater mode, this parameter defines
whether the TP will accept or drop
untagged packets.
only VLAtagged, all frames.
RDI/REI insertion For a trail termination point, this setting
enables or disables the remote defect
indicator (RDI) and remote error indicator
(REI) in the path overhead. The disabled
state is appropriate when the TP terminates
a unidirectional path, while the enabled
state is appropriate when the TP terminates
a bidirectional path.
enabled, disabled, notSpecified,
notApplicable (fixed)
Trace information
In the Trace Information section of the Port page, the following parameters can be
modified:
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-46 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
Transmitted trail trace format Selects the format of the transmitted trail
trace identifier (TTI).
Depending on the port and signal type, a
subset of the following:
• non-specific byte – a single byte with
a fixed hexadecimal value of 0x00
(ITU/ETSI mode 2).
• specific byte (1-byte string) – a single
byte (hexadecimal format using the
printable T.50/ASCII character set)
(SOET mode).
• 16-byte string – a 16-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the first byte being a CRC-7
(ITU/ETSI mode 1).
• 64-byte string – a 64-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the last two bytes being a
carriage return, line feed (SOET).
Transmitted trail trace value If the transmitted trail trace format
parameter is set to specific byte (1-byte
string), 16-byte string, or 64-byte string,
the transmitted character string is set here.
Since the possible values depend on the
setting of the transmitted trace display
mode parameter, it is recommended to set
that parameter in advance.
The field name is a hyperlink. Click it to
open a window where you can enter the
desired string.
Transmitted trace display mode If the transmitted trail trace format
parameter is set to specific byte (1-byte
string), 16-byte string, or 64-byte string,
the format of the transmitted character
string is set here.
ascii, hex.
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-47
Parameter Function Possible values
Expected trail trace format Selects the format of the expected trail
trace identifier (TTI).
Depending on the port and signal type, a
subset of the following:
• non-specific byte – a single byte with
a fixed hexadecimal value of 0x00
(ITU/ETSI mode 2).
• specific byte (1-byte string) – a single
byte (hexadecimal format using the
printable T.50/ASCII character set)
(SOET mode).
• 16-byte string – a 16-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the first byte being a CRC-7
(ITU/ETSI mode 1).
• 64-byte string – a 64-bytes
hexadecimal format using the
printable T.50/ASCII character set,
with the last two bytes being a
carriage return, line feed (SOET).
Expected trail trace value If the expected trail trace format parameter
is set to specific byte (1-byte string),
16-byte string, or 64-byte string, the
transmitted character string is set here.
Since the possible values depend on the
setting of the expected trace display mode
parameter, it is recommended to set that
parameter in advance.
The field name is a hyperlink. Click it to
open a window where you can enter the
desired string.
Expected trace display mode If the expected trail trace format parameter
is set to specific byte (1-byte string),
16-byte string, or 64-byte string, the format
of the expected character string is set here.
ascii, hex.
Trail trace mismatch detection mode Controls the detection mode. enabled, disabled.
Consequent action on trail trace
mismatch
Enables / disables consequent action in
case of a trace identifier mismatch
detection. For SDH: ote that this function
is only supported if the related trace read
format is set to 16-byte string.
enabled, disabled.
Spanning tree
In the Spanning Tree section of the Port page, the following parameters can be
modified:
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-48 365-312-877R7.2Issue 4 November 2009
Parameter Function Possible values
STP port priority The priority of the port for the spanning
tree protocol.
Integer in the range from 0 to 255.
Port path cost The port path cost. For a port with the
spanning tree protocol active, this
parameter defines the contribution of this
port to the path cost of paths towards the
spanning tree root which included this
port.
Integer.
Port path cost details
According to IEEE 802.1Q 1998, this parameter should be related to the bandwidth of the
link in which the port participates. Link speed is mapped to port path costs as follows:
Link speed Path cost
2 Mbps 10,000,000
4 Mbps 5,000,000
6 Mbps 3,400,000
8 Mbps 2,500,000
10 Mbps 2,000,000
50 Mbps 400,000
100 Mbps 200,000
1 Gbps 20,000
10 Gbps 2,000
Equipment provisioning tasks Port provisioningParameters for VCG ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-49
Data service
Overview
Purpose
This section discusses Ethernet card provisioning and VCG provisioning.
Contents
To view Ethernet card information 6-51
To modify Ethernet card information 6-52
To view virtual concatenation groups 6-54
To modify virtual concatenation groups 6-56
To view VC TTPs 6-59
To reset the wait to restore timer for VC TTPs 6-60
Equipment provisioning tasks Data serviceOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-50 365-312-877R7.2Issue 4 November 2009
To view Ethernet card information
When to use
Use this task to view Ethernet card information on a selected E.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo view Ethernet card information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-51
To modify Ethernet card information
When to use
Use this task modify Ethernet card information.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the slot you wish to modify. From the Go menu, select
Modify and click Go.
Result:The Modify Ethernet Card page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable port parameters. Depending on the
type of plug-in unit used and on the setting of the Tagging mode, not all options apply.
• Tagging mode – select the Transparent or the IEEE 802.1Q/IEEE 802.1ad radiobutton.
• Customer Port Flow Granularity – select either the Whole port or theProvisioned flows only radio button..
Equipment provisioning tasks Data serviceTo modify Ethernet card information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-52 365-312-877R7.2Issue 4 November 2009
• Priority code point selection egress/ingress map – specify the map definingfor each possible incoming value of the P bits (user priority) and CFI bit (canonical
format identifier). Select values from the drop down list, or select “on-standard” for
manual mapping.
• Priority code point selection ingress map out vectors – specify the mapvectors for each possible incoming value of the P bits (user priority) and CFI bit
(canonical format identifier). A value can be entered if “on-standard” is selected in
the Priority code point selection egress/ingress map field. Otherwise thevalues are read-only.
• Priority code point selection egress map out vectors – specify the mapvectors for each possible incoming value of the P bits (user priority) and CFI bit
(canonical format identifier). A value can be entered if “on-standard” is selected in
the Priority code point selection egress/ingress map field. Otherwise thevalues are read-only.
• Aging pass timer – enter the period of expiration of a dynamic MAC address of theforwarding table. A dynamic MAC address is removed from the forwarding table if
the aging pass timer has elapsed since the entry has been created or updated within
the forwarding table. Possible values are: 10 to 630 in steps of 10 seconds. This field
is only applicable for dynamic MAC addresses advertised via the standard Ethernet
automatic learning process. Dynamic MAC addresses advertised via Internet Group
Management Protocol (IGMP snooping) are not covered.
...................................................................................................................................................................................................
5 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify Ethernet Card page, and the Ethernet card is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo modify Ethernet card information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-53
To view virtual concatenation groups
When to use
Use this task to view virtual concatenation group (VCG) information for an E slot.
There are two methods for this task.
Task, method 1: from the Ethernet Card Information page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the slot for which you wish to view VCG information.
From the Go menu, select VCG Information and click Go.
Result:The Virtual Concatenation Groups page is displayed.
Equipment provisioning tasks Data serviceTo view virtual concatenation groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-54 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Task, method 2: from the NE Management Functions page
Complete the following steps to view virtual concatenation group information.
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set VCG Information.
5. Click Go.
Result:The Virtual Concatenation Groups page is displayed.
...................................................................................................................................................................................................
3 In the Slot field, select the slot from the drop down list for which you wish to view
virtual concatenation group information.
...................................................................................................................................................................................................
4 Click Search.
Result:The virtual concatenation group information is displayed in the table below.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo view virtual concatenation groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-55
To modify virtual concatenation groups
When to use
Use this task to modify virtual concatenation groups.
Based on the Ethernet card support, different fields are displayed for modification. The
following are the types of Ethernet cards which apply:
• Ethernet card which supports LCAS
• Ethernet card which does not support LCAS
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the slot for which you wish to view VCG information.
From the Go menu, select VCG Information and click Go.
Result:The Virtual Concatenation Groups page is displayed.
...................................................................................................................................................................................................
4 Click the radio button next to the VCG you wish to modify. From the Go menu, select
Modify and click Go.
Equipment provisioning tasks Data serviceTo modify virtual concatenation groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-56 365-312-877R7.2Issue 4 November 2009
Result:The Modify Virtual Concatenation Group page is displayed.
...................................................................................................................................................................................................
5 For Ethernet cards that do support LCAS, the following fields can be modified:
• VC TTP view – select the VC TTP view. Possible values are:
– Separate Sink/Source
– Combined Sink/Source
If Separate Sink/Source is selected, then separate lists for Source Available andSource Selected and Sink Available and Sink Selected are displayed in theVC-N TTP window. If Combined Sink/Source is selected then combined lists forSource/Sink Available and Source/Sink Selected are displayed (each entrycovers both source and sink).
• VCG type – select the VCG type. Possible values are: VC-4, VC-3, or VC-12.
• TTP mode – select the TTP mode. Possible values are: monitored or not monitored.
• Encapsulation State – select the encapsulation state. Possible values are: automaticor manual.
• Encapsulation Mode – select the method of encapsulation for adaptingasynchronous Ethernet traffic over synchronous TDM traffic. Possible values are:
GFP (generic framing procedure) or EoS (Ethernet over SDH).
• LCAS Mode – select enabled or disabled.
• LCAS WTR time (mins) – enter the LCAS wait to restore time in minutes. Possiblerange is 0 minutes to 60 minutes.
• LCAS Hold-off (secs) – enter the LCAS hold-off time in seconds. Possible range is0 seconds to 10 seconds in incremental steps of 100 milliseconds.
The default hold-off timer is set to zero to allow fast LCAS protection. This means
that LCAS will act immediately upon disruptions. If the LCAS group (which is a
protection mechanism) is protected by a higher protection layer like SCP, the
hold-off timer should be set to a value (100 ms or higher) that allows SC protection
to happen before LCAS protection. If you want a double protection, set the hold-off
timer accordingly.
• CIR Ingress (kbit/s) – enter the ingress committed information rate (CIR).
• CIR Engress (kbit/s) – enter the egress committed information rate (CIR).
For Ethernet cards that do not support LCAS, the following fields can be modified:
• TTP Mode – select the TTP mode. Possible values are: monitored or not monitored.
• VCG Capacity – select the capacity of the VCG from the drop-down list.
...................................................................................................................................................................................................
6 Click Submit.
Equipment provisioning tasks Data serviceTo modify virtual concatenation groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-57
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify Virtual Concatenation Group page, and the virtual
concatenation group information is modified for the selected E slot.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo modify virtual concatenation groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-58 365-312-877R7.2Issue 4 November 2009
To view VC TTPs
When to use
Use this task to view the VC TTPs associated with a selected virtual concatenation group.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the slot for which you wish to view VCG information.
From the Go menu, select VCG Information and click Go.
Result:The Virtual Concatenation Groups page is displayed.
...................................................................................................................................................................................................
4 Select the VCG for which to view the VC TTP. From the Go menu, select Associated
VC TTPs and click Go.
Result:The VC TTPs page is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo view VC TTPs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-59
To reset the wait to restore timer for VC TTPs
When to use
Use this task to reset the wait to restore (WTR) timer for VC TTPs associated with a
selected virtual concatenation group.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data services.
4. In the Function field, select Retrieve/Set Ethernet Card Information.
5. Click Go.
Result:The Ethernet Cards page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the slot for which you wish to view VCG information.
From the Go menu, select VCG Information and click Go.
Result:The Virtual Concatenation Groups page is displayed.
...................................................................................................................................................................................................
4 Click the radio button next to the slot for which you wish to view VCG information.
From the Go menu, select VCG information and click Go.
Equipment provisioning tasks Data serviceTo reset the wait to restore timer for VC TTPs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-60 365-312-877R7.2Issue 4 November 2009
Result:The Virtual Concatenation Group Information page is displayed.
...................................................................................................................................................................................................
5 Select the VCG for which to view the VC TTP. From the Go menu, select Associated
VC TTPs and click Go.
Result:The VC TTPs page is displayed.
...................................................................................................................................................................................................
6 Select the VC TTP for which to reset the wait to restore timer. From the Go menu, select
Reset WTR Timer and click Go.
Result:The wait to restore timer is reset on the selected VC TTP.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Data serviceTo reset the wait to restore timer for VC TTPs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-61
MIB management
To upload the MIB into the management system
When to use
Use this task to upload the management information base (MIB) currently stored on an an
E into the management system.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Network Elements.
4. In the Function field, select Manage MIB.
5. Click Go.
Result:The MIB Management page is displayed. It includes information about the
current association status of the selected E.
...................................................................................................................................................................................................
3 In the Operation field, select MIB Upload. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MIB Management page, the MIB is uploaded from the E to the
management system, and the results are displayed in the Message bar.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks MIB managementTo upload the MIB into the management system
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-62 365-312-877R7.2Issue 4 November 2009
To download the MIB to an NE
When to use
Use this task to download the management information base (MIB) currently stored in the
management system to an E.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Network Elements.
4. In the Function field, select Manage MIB.
5. Click Go.
Result:The MIB Management page is displayed. It includes information about the
current association status of the selected E.
...................................................................................................................................................................................................
3 In the Operation field, select MIB Download. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MIB Management page, the MIB is downloaded from the management
system to the E, and the results are displayed in the Message bar.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks MIB managementTo download the MIB to an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-63
To update the MIB image
When to use
Use this task to initiate a check of the MIB image stored in the management system
against the MIB of a selected E. After the check, the management system gets the latest
copy of the different parts and will resynchronize the MIB. This is normally quicker than
performing a full MIB upload.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Network Elements.
4. In the Function field, select Manage MIB.
5. Click Go.
Result:The MIB Management page is displayed. It includes information about the
current association status of the selected E.
...................................................................................................................................................................................................
3 In the Operation field, select Update MIB image. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MIB Management page, the MIB stored in the management system is
checked against the MIB of the selected E. After the check, the management system
gets the latest copy of the different parts and will resynchronize the MIB. Results are
displayed in the Message bar.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks MIB managementTo update the MIB image
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-64 365-312-877R7.2Issue 4 November 2009
To enable the association with an NE
When to use
Use this task to enable the association of the management system with a selected E.
After the association is successfully enabled, the management system and the E are
connected and can communicate.
Before you begin
The association state of the E must be “Disconnected”.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Network Elements.
4. In the Function field, select Manage MIB.
5. Click Go.
Result:The MIB Management page is displayed. It includes information about the
current association status of the selected E.
...................................................................................................................................................................................................
3 In the Operation field, select Enable association. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MIB Management page. The association state changes to “Connected”.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks MIB managementTo enable the association with an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-65
To disable the association with an NE
When to use
Use this task to disable the association of the management system with a selected E.
After the association is successfully disabled, the management system and the E are
disconnected and cannot communicate anymore.
Before you begin
The association state of the E must be “Connected”.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Network Elements.
4. In the Function field, select Manage MIB.
5. Click Go.
Result:The MIB Management page is displayed. It includes information about the
current association status of the selected E.
...................................................................................................................................................................................................
3 In the Operation field, select Disable association. Click Submit.
Result:Awarning window opens.
...................................................................................................................................................................................................
4 If you are sure that you want to disable the association with the E, click Yes.
Equipment provisioning tasks MIB managementTo disable the association with an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-66 365-312-877R7.2Issue 4 November 2009
Result:A progress indication followed by a confirmation is issued in the Message
section of the MIB Management page. The association state changes to
“Disconnected”.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks MIB managementTo disable the association with an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-67
Provisioning of NE event controls
To modify NE event controls
When to use
Use this task to modify E event controls such as the lining-up mode.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Alarms and Events.
4. In the Function field, select Retrieve/Set Event Control Information.
5. Click Go.
Result:The Event control details page is displayed.
...................................................................................................................................................................................................
3 In the Lining up field, select No (which is the default) to enable reporting of alarms from
the E to the management system or Yes to disable it (alarm blocking).
When an E is put in to lining-up mode, no alarms but any other communication errors
will be reported. This mode prevents the system from becoming cluttered with
unnecessary alarms during installation or maintenance actions on the E. Any existing
alarms for the network element are cleared when the management system activates the
lining-up mode. This has the effect of moving all alarms to the history store. The E
re-evaluates the alarm status when the lining-up is deactivated.
Equipment provisioning tasks Provisioning of NE event controlsTo modify NE event controls
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-68 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Event control details page, and the event control is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of NE event controlsTo modify NE event controls
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-69
To view NE event parameter settings
When to use
Use this task to view the current E event parameter settings.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Event Parameters.
5. Click Go.
Result:The NE Event Parameters page is populated at the bottom containing a list
of records that meet your search criteria.
The following information is provided for each probable cause:
• Probable cause – the probable cause ID.
• Alarm description – the full text description of the probable cause.
• Additional information – if an event type is associated with an MDI, the MDIname is displayed.
• Configurable per resource – indicates whether severity and reporting relatedto the probable cause can be configured or not.
• Severity – indicates the importance of an alarm. Depending on the managementsystem installation parameters, possible values are either Prompt, Deferred,
Information or Critical, , Minor, Warning.
Equipment provisioning tasks Provisioning of NE event controlsTo view NE event parameter settings
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-70 365-312-877R7.2Issue 4 November 2009
• Reporting – indicates whether the alarms related to the probable cause arereported or not.
• MDO iD – the ID of the MDO which is activated at the E if the E event isdetected.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of NE event controlsTo view NE event parameter settings
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-71
To modify NE event parameter settings
When to use
Use this task to modify the current E event parameter settings.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Event Parameters.
5. Click Go.
Result:The NE Event Parameters page is populated at the bottom containing a list
of records that meet your search criteria.
...................................................................................................................................................................................................
3 In the list of probable causes, select the ones that you wish to modify. To do so, click in
the square symbol in the left most column.
...................................................................................................................................................................................................
4 Select the desired action from the Go menu:
If you want to… then select
change the severity assigned to the selected
probable causes,
Set severity to new value
turn on the reporting for the selected probable
causes,
Set reporting on
Equipment provisioning tasks Provisioning of NE event controlsTo modify NE event parameter settings
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-72 365-312-877R7.2Issue 4 November 2009
If you want to… then select
turn off the reporting for the selected probable
causes,
Set reporting off
relate an MDO to the selected probable causes Set MDO id new value, where new
value = 1 to 4.
cancel the relation of an MDO to the selected
probable causes
Set MDO id to not applicable
change all settings for the selected probable
causes to the factory defaults
Reset to factory defaults
Click Go.
Result:Awarning window is displayed that informs about the consequences of the
requested changes.
...................................................................................................................................................................................................
5 If you are sure about the modification settings, click Yes.
Result:A progress indication followed by a confirmation is issued in the NE Event
Parameters page.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of NE event controlsTo modify NE event parameter settings
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-73
Provisioning of MDIs and MDOs
To view a list of MDOs
When to use
Use this task to view a list of miscellaneous discrete outputs (MDO).
Related information
See also:
• “Miscellaneous discrete inputs and outputs” (p. 5-9)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select External Control and Monitoring Points.
4. In the Function field, select Retrieve/Set MDO.
5. Click Go.
Result:The MDOs page is displayed. It includes a list of MDOs.
If an SHDSL remote power supply (RPS) is managed, then the MDOs on the E areno longer available. Instead, the MDOs on the RPS are used. In that case an additionaltext field is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of MDIs and MDOsTo view a list of MDOs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-74 365-312-877R7.2Issue 4 November 2009
To view alarms associated with an MDO
When to use
Use this task to view alarms associated with an MDO.
Related information
See also:
• “Miscellaneous discrete inputs and outputs” (p. 5-9)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select External Control and Monitoring Points.
4. In the Function field, select Retrieve/Set MDO.
5. Click Go.
Result:The MDOs page is displayed. It includes a list of MDOs on the E.
If an SHDSL remote power supply (RPS) is managed, then the MDOs on the E areno longer available. Instead, the MDOs on the RPS are used. In that case an additionaltext field is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the MDO for which you wish to view alarms.
Result:The alarms associated with the MDO are displayed below the table.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of MDIs and MDOsTo view alarms associated with an MDO
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-75
To modify an MDO
When to use
Use this task to modify a miscellaneous discrete output (MDO).
Related information
See also:
• “Miscellaneous discrete inputs and outputs” (p. 5-9)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select External Control and Monitoring Points.
4. In the Function field, select Retrieve/Set MDO.
5. Click Go.
Result:The MDOs page is displayed. It includes a list of MDOs on the E.
If an SHDSL remote power supply (RPS) is managed, then the MDOs on the E areno longer available. Instead, the MDOs on the RPS are used. In that case, anadditional text field is displayed.
...................................................................................................................................................................................................
3 Do one of the following:
1. Click the radio button next to the MDO you wish to modify. From the Go menu,select Modify and click Go.
2. Click the radio button next to the MDO you wish to modify. Click the hyperlink in the
MDO id field.
Equipment provisioning tasks Provisioning of MDIs and MDOsTo modify an MDO
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-76 365-312-877R7.2Issue 4 November 2009
Result:The MDO details page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable fields that you wish to update.
• MDO name – enter or change the name associated to the respective MDO.
• MDO status – select Active (closed loop), Inactive (open loop), ot Available, or Econtrolled.
If MDO status is set to “E controlled”, the MDO depends on current alarms. The
following settings do not apply to 1643 Access Multiplexer AM / 1643 Access
Multiplexer Small AMS :
• MDO activation - dependent on disconnect –
• MDO activation - dependent on suppression –
...................................................................................................................................................................................................
5 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MDO details page, and the MDO is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of MDIs and MDOsTo modify an MDO
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-77
To view a list of MDIs
When to use
Use this task to view a list of miscellaneous discrete inputs (MDI).
Related information
See also:
• “Miscellaneous discrete inputs and outputs” (p. 5-9)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select External Control and Monitoring Points.
4. In the Function field, select Retrieve/Set MDI.
5. Click Go.
Result:The MDIs page is displayed. It includes a list of MDIs on the E.
If an SHDSL remote power supply (RPS) is managed, then the MDIs on the E areno longer available. Instead, the MDIs on the RPS are used. In that case an additionaltext field is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of MDIs and MDOsTo view a list of MDIs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-78 365-312-877R7.2Issue 4 November 2009
To modify an MDI
When to use
Use this task to modify a miscellaneous discrete input (MDI).
Related information
See also:
• “Miscellaneous discrete inputs and outputs” (p. 5-9)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select External Control and Monitoring Points.
4. In the Function field, select Retrieve/Set MDI.
5. Click Go.
Result:The MDIs page is displayed. It includes a list of MDIs on the E.
If an SHDSL remote power supply (RPS) is managed, then the MDIs on the E areno longer available. Instead, the MDIs on the RPS are used. In that case an additionaltext field is displayed.
...................................................................................................................................................................................................
3 Do one of the following:
1. Click the radio button next to the MDI you wish to modify. From the Go menu, selectModify and click Go.
2. Click the radio button next to the MDI you wish to modify. Click the hyperlink in the
MDI id field.
Equipment provisioning tasks Provisioning of MDIs and MDOsTo modify an MDI
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-79
Result:The Modify MDI page is displayed.
...................................................................................................................................................................................................
4 In the MDI name field, enter or change the name associated to the respective MDI.
...................................................................................................................................................................................................
5 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify MDI page, and the MDI is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Provisioning of MDIs and MDOsTo modify an MDI
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-80 365-312-877R7.2Issue 4 November 2009
Tasks related to SHDSL devices and services
To view a list of SHDSL units
When to use
Use this task to view a list of SHDSL units on a selected network element.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Units.
5. Click Go.
Result:The SHDSL Units page is displayed. It includes a list of SHDSL units
configured on the selected E.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-81
To modify the SHDSL transport mode
When to use
Use this task to modify the SHDSL transport mode of an SHDSL unit.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Units.
5. Click Go.
Result:The SHDSL Units page is displayed. It includes a list of SHDSL units
configured on the selected E. The column SHDSL transport mode shows the
current transport mode.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL unit for which you wish to modify the transport
mode. From the Go menu, select Set SHDSL transport mode to E1 or Set SHDSL
transport mode to TU12, respectively, and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The current SHDSL transport mode is changed accordingly.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify the SHDSL transport mode
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-82 365-312-877R7.2Issue 4 November 2009
To view SHDSL spans
When to use
Use this task to view SHDSL spans for a selected network element. An SHDSL span
comprises the SHDSL connection between the LTU port on the SDH network element
and the remote SHDSL devices (1 TU and 0, 1, or 2 SRUs).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL spans.
5. Click Go.
Result:The SHDSL Spans page is displayed. It includes a list of SHDSL span
settings configured on the selected E. To view additional information for an SHDSL
span, click the Display detail view icon in the respective row.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view SHDSL spans
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-83
To restart the discovery sequence for an SHDSL span
When to use
Use this task to restart the embedded operations channel (EOC) discovery sequence for
an SHDSL span. This enables the network element in question to rebuild the information
it has about the SRUs and TUs on the SHDSL span for the selected LTU port.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL spans.
5. Click Go.
Result:The SHDSL Spans page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL span for which you wish to restart the discovery
sequence. From the Go menu, select Discover and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The EOC discovery sequence begins.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo restart the discovery sequence for an SHDSL span
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-84 365-312-877R7.2Issue 4 November 2009
To restart the low-level SHDSL hardware
When to use
Use this task to restart the low-level SHDSL hardware enabling the end-to-end SHDSL
span for the selected LTU port to be started up again.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL spans.
5. Click Go.
Result:The SHDSL Spans page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL span for which you wish to restart the discovery
sequence. From the Go menu, select Restart and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The low-level SHDSL hardware is restarted, enabling the
end-to-end SHDSL span for the selected LTU port to be started up again.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo restart the low-level SHDSL hardware
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-85
To remove remote devices on an SHDSL span
When to use
Use this task to remove all remote devices on the SHDSL span for the selected LTU port.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL spans.
5. Click Go.
Result:The SHDSL Spans page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL span for which you wish to restart the discovery
sequence. From the Go menu, select Drop and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. All remote devices on the SHDSL span for the selected LTU port
are removed.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo remove remote devices on an SHDSL span
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-86 365-312-877R7.2Issue 4 November 2009
To modify the SHDSL span diagnostic mode
When to use
Use this task to modifythe diagnostic mode of an SHDSL span containing only SRUs
with no terminating TU.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL spans.
5. Click Go.
Result:The SHDSL Spans page is displayed.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL span for which you wish to restart the discovery
sequence. From the Go menu, select Diagnostic mode enable or Diagnostic mode
disable, respectively, and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The diagnostic mode is changed accordingly. Click the refresh
button to update the list in the SHDSL Spans page.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify the SHDSL span diagnostic mode
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-87
To view SHDSL device information
When to use
Use this task to view the SHDSL device information settings for a selected network
element.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view SHDSL device information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-88 365-312-877R7.2Issue 4 November 2009
To modify a remote SHDSL device
When to use
Use this task to modify the name, location, or station clock output setting of a remote
SHDSL device.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the remote SHDSL device you wish to modify. From the Go
menu, select Modify and click Go.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-89
Result:The SHDSL Devices page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable fields that you wish to update.
• Name – enter a name consisting of 1 to 20 alphanumeric characters.
• Location – enter a location identification consisting of 1 to 20 alphanumericcharacters.
• Station clock output – select Enabled or Disabled (applicable for QD2 managedT2M TUs only).
...................................................................................................................................................................................................
5 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The information is changed accordingly.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-90 365-312-877R7.2Issue 4 November 2009
To synchronize a remote SHDSL device
When to use
Use this task to align the remote SHDSL device MIB with that held in the LTU.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the remote SHDSL device you wish to synchronize. From
the Go menu, select Synchronize and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The synchronization of the remote SHDSL device MIB with that
held in the LTU begins.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo synchronize a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-91
To reset a remote SHDSL device
When to use
Use this task to reset a QD2 managed remote SHDSL device.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the remote SHDSL device you wish to reset. From the Go
menu, select Reset and click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The reset of the remote SHDSL device begins.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo reset a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-92 365-312-877R7.2Issue 4 November 2009
To assign a password to a remote SHDSL device
When to use
Use this task to assign a password to a QD2 managed remote SHDSL device or to change
an existing password. This task applies to Ethernet TUs (T10ETH) only.
Before you begin
ote that this procedure requires the user privileges of password administration and E
management function.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the remote SHDSL device for which you wish to assign a
password. From the Go menu, select Password management and click Go.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo assign a password to a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-93
Result:The Modify password page opens.
...................................................................................................................................................................................................
4 In the New password field, enter the new password. The password consists of 3 to 8
alphanumerical characters (“a” to “z”, “A” to “Z”, “0” to “9”, “-”, “_)”.
In the Repeat new password field, enter the same character string.
Click Submit
Result:A progress indication followed by a confirmation is issued in the Message
section of the page, and the password is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo assign a password to a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-94 365-312-877R7.2Issue 4 November 2009
To download a software image to a remote SHDSL device
When to use
Use this task to download a previously stored software image to a QD2 managed remote
SHDSL device.
ote that this procedure is only applicable for the SHDSL option board X12SHDSL_V2.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Devices.
5. Click Go.
Result:The SHDSL Devices page is displayed. It includes a list of SHDSL device
settings configured on the selected E.
...................................................................................................................................................................................................
3 Click the radio button next to the remote SHDSL device you wish to download software
to. From the Go menu, select Software download and click Go.
Result:A confirmation window is displayed asking you to confirm the deletion
...................................................................................................................................................................................................
4 Click Yes.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo download a software image to a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-95
Result:A progress indication followed by a confirmation is issued in the Message
section of the page. The software download the selected remote SHDSL device
begins.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo download a software image to a remote SHDSL device
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-96 365-312-877R7.2Issue 4 November 2009
To set the SHDSL remote power supply management mode
When to use
Use this task to set the SHDSL remote power supply management mode for a selected
E. Enabling the management re-assigns the MDI and MDO ports of the E to allow
management of the remote power supplies.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Manage SHDSL Remote Power Supply.
5. Click Go.
Result:The SHDSL remote power supply management page is displayed. It
shows the current management mode of the SHDSL remote power supply associated
to the E.
...................................................................................................................................................................................................
3 Select Managed to enable the management or Unmanaged to disable it.
Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page, and the SHDSL remote power supply management is changed
accordingly.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo set the SHDSL remote power supply management mode
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-97
To view a list SHDSL remote power supply ports
When to use
Use this task to view a list SHDSL remote power supply ports for a selected E. It
provides information about and the possibility to change alarm suppression and hardware
power settings for each port.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Remote Power Supply Ports.
5. Click Go.
Result:The SHDSL remote power supply ports page is displayed. It shows
information about alarm suppression and hardware power settings for each port.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view a list SHDSL remote power supply ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-98 365-312-877R7.2Issue 4 November 2009
To restart an SHDSL remote power supply port
When to use
Use this task to restart an SHDSL remote power supply port to restore power at that port.
Before you begin
The hardware power setting of the respective port must be on.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Remote Power Supply Ports.
5. Click Go.
Result:The SHDSL remote power supply ports page is displayed. It shows
information about alarm suppression and hardware power settings for each port.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL remote power supply port you wish to restart.
From the Go menu, select Restart and click the Go button.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page, and the SHDSL remote power supply port is restarted.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo restart an SHDSL remote power supply port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-99
To modify the alarm suppression settings of an SHDSL remotepower supply port
When to use
Use this task to modify the alarm suppression settings of an SHDSL remote power supply
port.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select SHDSL Service.
4. In the Function field, select Retrieve/Set SHDSL Remote Power Supply Ports.
5. Click Go.
Result:The SHDSL remote power supply ports page is displayed. It shows
information about alarm suppression and hardware power settings for each port.
...................................................................................................................................................................................................
3 Click the radio button next to the SHDSL remote power supply port for which you wish
to modify the alarm suppression settings. From the Go menu, select Alarm suppression
on or Alarm suppression on, respectively, and click the Go button.
Result:A progress indication followed by a confirmation is issued in the Message
section of the page, and the the alarm suppression settings of the SHDSL remote
power supply port are changed accordingly.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify the alarm suppression settings of an SHDSL
remote power supply port...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-100 365-312-877R7.2Issue 4 November 2009
To view remote bridges on Ethernet NTUs
When to use
Use this task in order to retrieve information on the remote bridges on the TUs which
are connected to a certain E.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Services.
4. In the Function field, select Retrieve/Set Remote Bridges (Ethernet modes).
5. Click Go.
Result:The Remote Bridges page is displayed. It includes a list of TUs with their
corresponding bridge modes. To view additional information for the remote bridges,
click the Table settings icon on top of the page.
The following data can be displayed:
• TU name
• TU ID
• TU Location
• Bridge mode
• Priority mode
• Ingress rate control mode
• Maximum Supported VLAs
• Provisioned VLAs
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridges on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-101
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridges on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-102 365-312-877R7.2Issue 4 November 2009
To switch or modify remote bridges on Ethernet NTUs
When to use
Use this task in order to switch remote bridges and to modify the remote bridge
parameters on an TU.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Services.
4. In the Function field, select Retrieve/Set Remote Bridges (Ethernet modes).
5. Click Go.
Result:The Remote Bridges page is displayed. It includes a list of TUs with their
corresponding bridge modes. To view additional information for the remote bridges,
click the Table settings icon on top of the page.
...................................................................................................................................................................................................
3 Select the TU for which you want to create or modify a remote bridge.
...................................................................................................................................................................................................
4 Select in the drop-down list at the bottom of the screen Modify and click Go.
Result:The Modify Remote Bridge Parameters page is displayed.
...................................................................................................................................................................................................
5 Set the Remote Bridge Mode.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo switch or modify remote bridges on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-103
The following values can be selected:
• Self Learning which corresponds to IEEE 802.1Q
• VLAN bridge which corresponds to IEEE 802.1D
• Provider Bridge which corresponds to IEEE 802.1ad.
...................................................................................................................................................................................................
6 Set the Priority Mode.
The following values can be selected:
• Use port priority:
• Use tag priority
...................................................................................................................................................................................................
7 Set the Ingress Rate Control Mode either to Strict or to None.
...................................................................................................................................................................................................
8 Click Submit.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo switch or modify remote bridges on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-104 365-312-877R7.2Issue 4 November 2009
To view remote bridge VLANs member ports on Ethernet NTUs
When to use
Use this task in order to view settings of ports belonging to a remote bridge VLA.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
...................................................................................................................................................................................................
3 Do one of the following:
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridge VLANs and click Go.
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridges (Ethernet modes) and click Go. In thedrop-down list at the bottom of the Remote Bridges page select Get ContainedVLANs and Click Go.
Result:The Search VLANs page is displayed.
...................................................................................................................................................................................................
4 Select an TU in the NTU name field and click Search.
Result:The VLAN list page is displayed.
The following parameters are listed :
• VLA ID
• Label
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridge VLANs member ports on Ethernet
NTUs...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-105
• Create Time
• VLA status
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridge VLANs member ports on Ethernet
NTUs...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-106 365-312-877R7.2Issue 4 November 2009
To view remote bridge member ports
When to use
Use this task in order to retrieve the list of member ports on the selected remote bridge on
an Ethernet TU.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Data Services.
4. In the Function field, select Retrieve/Set Remote Bridges (Ethernet modes).
5. Click Go.
Result:The Remote Bridges page is displayed. It includes a list of TUs with their
corresponding bridge modes. To view additional information for the remote bridges,
click the Table settings icon on top of the page.
...................................................................................................................................................................................................
3 Select the TU for which you want to create or modify a remote bridge.
...................................................................................................................................................................................................
4 Select in the drop-down list at the bottom of the screen View Member Ports and click
Go.
Result:The Remote Bridge Member Ports page is displayed.
On the page the following parameters of the member ports are displayed:
• Port
• PVID
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridge member ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-107
• Untagged frame processing
• Default user priority
• Committed information rate
• Committed burst size
...................................................................................................................................................................................................
5 If you want to modify the Ethernet parameters of the ports select Modify Ethernet port
parameters in the drop-down-list at the bottom of the page and click Go.
...................................................................................................................................................................................................
6 If you want to view the VLA assigned to the ports select View VLANs in the
drop-down-list at the bottom of the page and click Go.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view remote bridge member ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-108 365-312-877R7.2Issue 4 November 2009
To create or modify remote bridge VLANs on Ethernet NTUs
When to use
Use this task in order to create a new VLA or modify an existing VLA provisioned on
a remote bridge.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
...................................................................................................................................................................................................
3 Do one of the following:
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridge VLANs and click Go.
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridges (Ethernet modes) and click Go. In thedrop-down list at the bottom of the Remote Bridges page select Get ContainedVLANs and Click Go.
Result:The Search VLANs page is displayed.
...................................................................................................................................................................................................
4 Select an TU in the NTU name field and click Search.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo create or modify remote bridge VLANs on Ethernet
NTUs...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-109
Result:The VLAN list page is displayed.
...................................................................................................................................................................................................
5 Do one of the following:
• If you want to create a new VLA click on the New icon..
• If you want to modify an existing VLA select the respective one in the list and select
Modify VLAN in the drop-down-list at the bottom of the page and click Go.
Result:The Create/Modify VLAN page is displayed.
...................................................................................................................................................................................................
6 Insert a VLA label of max. 20 characters in the field VLAN Label.
...................................................................................................................................................................................................
7 For a new VLA insert an integer value as VLA ID in the field VLAN ID. For an
existing VLA this field is read-only.
...................................................................................................................................................................................................
8 Select up to two LA ports in the LAN ports available field.
...................................................................................................................................................................................................
9 Select a WA port in theWAN ports available field.
...................................................................................................................................................................................................
10 Click Submit.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo create or modify remote bridge VLANs on Ethernet
NTUs...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-110 365-312-877R7.2Issue 4 November 2009
To view the VLAN member ports of a remote bridge
When to use
Use this task in order to view the parameters of the ports belonging to a VLA on a
remote bridge.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
...................................................................................................................................................................................................
3 Do one of the following:
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridge VLANs and click Go.
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridges (Ethernet modes) and click Go. In thedrop-down list at the bottom of the Remote Bridges page select Get ContainedVLANs and Click Go.
Result:The Search VLANs page is displayed.
...................................................................................................................................................................................................
4 Select an TU in the NTU name field and click Search.
Result:The VLAN list page is displayed.
...................................................................................................................................................................................................
5 Select a VLA and select in the drop-down-list at the bottom of the page View Member
Ports. Click Go.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view the VLAN member ports of a remote bridge
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-111
Result:The VLAN Member Ports page is displayed.
The following parameters are displayed:
• E type
• E name
• TU name
• TU ID
• TU Location
• VLA ID
• VLA Label
• Port
• PVID
• Untagged frame processing
• Default user priority
• Committed information rate
• Committed burst size
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo view the VLAN member ports of a remote bridge
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-112 365-312-877R7.2Issue 4 November 2009
To modify the Ethernet parameters of remote bridge memberports and VLAN member ports
When to use
Use this task in order to modify the Ethernet parameters of the ports which belong to a
remote bridge on an TU or a VLA on a remote bridge.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Follow the steps of the procedure To view remote bridge member ports. Select Modify
Ethernet parameters from the drop-down-list at the bottom of the Remote BridgeMember Port screen and click Go.
• Follow the steps of the procedure To view the VLA member ports of a remote bridge.
Select Modify Ethernet parameters from the drop-down-list at the bottom of the
Remote Bridge VLAN Member Port screen and click Go.
Result:The Modify Ethernet port parameters page is displayed.
...................................................................................................................................................................................................
2 Set the PVID in the PVID field. An integer value of max. four characters is allowed.
...................................................................................................................................................................................................
3 Assign the Default user priority. Select a value between 1 and 7.
...................................................................................................................................................................................................
4 Select in the field Untagged Frame Processing the handling of untagged frames. Click
on one of the radio buttons Insert, Discard or Forward.
...................................................................................................................................................................................................
5 Insert a value in the field Committed information rate.
Values from 0 ... 255 kbit/s in steps of 100 kbit/s are possible.
...................................................................................................................................................................................................
6 Insert a value in the field Committed burst size.
Values from 0 ... 100 kBytes in steps of 1 kByte are possible.
...................................................................................................................................................................................................
7 Click Submit.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo modify the Ethernet parameters of remote bridge
member ports and VLAN member ports...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-113
To delete remote bridge VLANs on Ethernet NTUs
When to use
Use this task in order to view the list of VLAs provisioned on a remote bridge.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
...................................................................................................................................................................................................
3 Do one of the following:
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridge VLANs and click Go.
• In the Category field, select Data Services and in the Function field, selectRetrieve/Set Remote Bridges (Ethernet modes) and click Go. In thedrop-down list at the bottom of the Remote Bridges page select Get ContainedVLANs and Click Go.
Result:The Search VLANs page is displayed.
...................................................................................................................................................................................................
4 Select an TU in the NTU name field and click Search.
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo delete remote bridge VLANs on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
6-114 365-312-877R7.2Issue 4 November 2009
Result:The VLAN list page is displayed.
...................................................................................................................................................................................................
5 Select the VLA you want to delete in the list and select in the drop-down list at the
bottom of the page Delete VLAN and click Go.
E N D O F S T E P S...................................................................................................................................................................................................
Equipment provisioning tasks Tasks related to SHDSL devices and servicesTo delete remote bridge VLANs on Ethernet NTUs
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
6-115
7 7Alarm management
concepts
Overview
Purpose
This chapter presents concept information related to the alarm management on 1643
Access Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using
OMS.
Contents
Alarm Severity Assignment Profile (ASAP) concepts 7-2
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-1
Alarm Severity Assignment Profile (ASAP) concepts
Overview
AnAlarm Severity Assignment Profile (ASAP) is a list of alarms which can occur in a
network element and which each have an alarm severity assigned.
ASAPs can be assigned to 1643 AM functional system components (a circuit pack or a
specific port for example) during provisioning.
Each ASAP can be uniquely identified by its type and its name.
Concept
ASAP allows the user to control alarm reporting with more flexibility, and to create
multiple alarm profiles for each alarm category and to assign these profiles to entities
within the system.
The alarms contained in each category are predefined. The categories containing the
alarms are referred to as predefined profile types. Each profile type has a default profile
and a set of user-created profiles. The user-created profiles and the default profiles within
the profile types are referred to as ASAPs. The assigned alarm severity levels refer to
each alarm within each ASAP.
ote that predefined or default alarms or profile types cannot be changed or deleted by
the user. Only the profiles created by the user can be changed or deleted.
Alarm severities
The alarm severity levels are used in the following description of the ASAP types:
1. Prompt (Urgent alarm that requires immediate (prompt) maintenance action)
2. Deferred (on-urgent alarm that requires deferred maintenance action)
3. Info (Informational alarm).
Reporting state
Each alarm can be assigned to one of the following reporting states:
Reporting state Meaning
Reported The alarm - when raised - will be reported towards the management
systems, and displayed on the graphical user interfaces.
ot Reported The alarm - when raised - will not be reported.
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-2 365-312-877R7.2Issue 4 November 2009
Please note that changing the alarm reporting state does not affect the display of currently
present and history alarms. Especially the display of already present alarms cannot be
removed if their reporting state is changed from “Reported” to “ot Reported”.
ASAP types
The ASAP types, listed in alphabetical order according to their ITM-CIT representation,
are defined for 1643 AM network elements:
ASAP Type Functional category
dcn Alarms related to node level DC (including Q-LA)
equipment Alarms related to equipment (circuit pack and other equipment
alarms)
ethPath Transmission & TCA causes related to Path for Ethernet
ethPS Transmission causes related to Physical Section for Ethernet
mdi Alarms related to mdi
pdhPS Transmission causes related to Physical Section for PDH (LOS,
AIS)
pdhPath Transmission & TCA causes related to path for PDH (only
supported for E1)
timing Alarms related to timing (node, port and timing sources)
sdhPRS Transmission & TCA causes related to Physical and Regenerator
Section for SDH
sdhMS Transmission & TCA causes related to Multiplex Section for SDH
sdhMSP Alarms related to 1+1 Multiplex Section Protection for SDH
sdhHOPath Transmission & TCA causes related to HO Path for SDH (includes
ms/Sn adaptation, Sn IM, Sn termination and MS-SPRing circuit
audit)
sdhLOPath Transmission & TCA causes related to LO Path for SDH (includes
Sn/Sm adaptation, Sm IM, Sm termination)
sdhVCG Transmission & TCA causes related to Virtual Concatenation (GFP
causes should be handled via physical ethernet)
Default ASAPs
For each of the available ASAP types, there exists a default ASAP. These default ASAPs
are named “DEFAULT” for all ASAP types.
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-3
dcn ASAP
The following table lists the default alarm severity assignments of the “dcn” ASAP.
Alarm
identifier
“Probable
cause”
Alarm text Alarm
severity
Reporting state
(default setting)
DC-BUcLOST
Mandatory IS-IS parameters missing Prompt Reported
DCcCOF IS-IS configuration error Prompt Reported
DCcREPAIR IS-IS Level-2 Area repair, transmission/
configuration error
Deferred Reported
DCTAPc-COF
DCN-Tunnel auto provisioning configuration
error
Deferred Reported
MLQ2 Loss of Q2-communications Information Reported
AITScDCCF DCC Failure in AITS mode Prompt Reported
LAcTRM Q-LA termination loopback failed Information ot Reported
equipment ASAP
The following table lists the default alarm severity assignments of the “equipment”
ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
E11XcEQF 1.5 Mbit/s extension board (X16DS1) - defective Deferred Reported
E11XcUI 1.5 Mbit/s extension board (X16DS1) missing Prompt Reported
E11XcWUP Wrong extension board present Prompt Reported
E11XcUPF 1.5 Mbit/s extension board (X16DS1) - defective Prompt Reported
E12XcEQF 2 Mbit/s extension board - defective Deferred Reported
E12XcWUP Wrong 2 Mbits/s extension board present Prompt Reported
E12XcWFUP Wrong or failed 2 Mbits/s extension board present Prompt Reported
E12XcUI 2 Mbit/s extension board missing Prompt Reported
E12XcUPF 2 Mbit/s extension board - defective Prompt Reported
E31XcEQF 34 Mbit/s extension board (X2E3-V2) - defective Prompt Reported
E31XcUI 34 Mbit/s extension board (X2E3-V2) missing Prompt Reported
E31XcUPF 34 Mbit/s extension board (X2E3-V2) - defective Prompt Reported
E31XcWUP Wrong 34 Mbit/s extension board inserted Prompt Reported
E32XcEQF 45 Mbit/s extension board (X2DS3-V2) -defective
Prompt Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-4 365-312-877R7.2Issue 4 November 2009
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
E32XcUI 45 Mbit/s extension board (X2DS3-V2) missing Prompt Reported
E32XcUPF 45 Mbit/s extension board (X2DS3-V2) -defective
Prompt Reported
E32XcWUP Wrong 45 Mbit/s extension board inserted Prompt Reported
IPcEQF LAN unit failure - protected Deferred Reported
IPcUI LAN unit removed Deferred Reported
IPcUPF LAN unit failure Prompt Reported
IPcWUP Wrong LAN unit present Prompt Reported
PMcEQF Pluggable Module failure Deferred Reported
PMcUI Pluggable Module removed Deferred Reported
PMcUPF Unprotected Pluggable Module failure Prompt Reported
PMcWUP Wrong Pluggable Module present Prompt Reported
POWcLSV Loss of secondary input voltage Deferred Reported
RPScOVERL Remote power supply box - load greater than itscapacity
Prompt Reported
RPScOPEC Remote power supply box - o electric current Deferred Reported
RPScFSD Remote Power Supply is Autonomously ShutDown
Deferred Reported
RPScLEAK Remote Power Supply Asymetrical LeakageDetected
Deferred Reported
RPScHVOLT Remote power supply box - higher voltage Prompt Reported
RPScPS Remote power supply box - defective Prompt Reported
STM1XcEQF STM-1 interface extension board - HardwareFailure
Deferred Reported
STM1XcUI STM-1 interface extension board missing Prompt Reported
STM1XcUPF STM-1 interface extension board failure Prompt Reported
STM1XcWUP Wrong STM-1 interface extension board inserted Prompt Reported
UPUS Unit present in unassigned slot Information Reported
X21XcEQF X.21 interface extension board - defective Deferred Reported
X21XcWUP Wrong X.21 interface extension board inserted Prompt Reported
X21XcUI X.21 interface extension board missing Prompt Reported
X21XcUPF X.21 interface extension board - defective Prompt Reported
Notes:
1. Alarms marked with an asterisk (“*”) in the “Probable cause” column are not supported in
the present 1643 AM release. These alarms are prepared for future applications.
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-5
mdi ASAP
The following table lists the default alarm severity assignments of the “mdi” ASAP.
Alarm identifier
“Probable cause”1
Alarm text2 Alarm
severity
Reporting state
(default setting)
MDcIP1 MDI 1: <user entered string> Information Reported
MDcIP2 MDI 2: <user entered string> Information Reported
MDcIP3 MDI 3: <user entered string> Information Reported
MDcIP4 MDI 4: <user entered string> Information Reported
RPSMDcIP1 MDI 1 located on the remote power supply box - indicatesan environmental alarm condition
Deferred Reported
RPSMDcIP2 MDI 2 located on the remote power supply box - indicatesan environmental alarm condition
Deferred Reported
RPSMDcIP3 MDI 3 located on the remote power supply box - indicatesan environmental alarm condition
Deferred Reported
Notes:
1. In the ITM-CIT NE Alarm List, only “MISC” is displayed as the probable cause of an
environmental alarm.
2. You can change the alarm text of each individual Miscellaneous Discrete Input (MDI).
ethPath ASAP
The following table lists the default alarm severity assignments of the “ethPath” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
LADPcTHR15 LAN Dropped packets threshold
crossing 15-min
ot reported Reported
LADPcTHR24 LAN Dropped packets threshold
crossing 24-hrs
ot reported Reported
LAI3GEILScTHR15 LAN Loaded Sec for incoming traffic
with class 3 green traffic Thr 15min
Deferred Reported
LAI3GEILScTHR24 LAN Loaded Sec for incoming traffic
with class 3 green traffic Thr 24-hrs
Deferred Reported
LAI32GEILScTHR15 LAN Loaded Sec for inc Tr with class
3 or 2 green traffic Thr 15min
Deferred Reported
LAI32GEILScTHR24 LAN Loaded Sec for inc Tr with cl 3
or 2 green traffic Thr 24-hrs
Deferred Reported
LAI3GEISLScTHR15 LAN Severely Loaded Sec for inc Tr
with class 3 green traffic Thr 15min
Deferred Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-6 365-312-877R7.2Issue 4 November 2009
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
LAI3GEISLScTHR24 LA Severely Loaded Sec for inc Tr with class 3green traffic Thr 24-hrs
Deferred Reported
LAI32GEISLScTHR15 LA Severely Loaded Sec for inc Tr with Cl 3 or2 green traffic Thr 15min
Deferred Reported
LAI32GEISLScTHR24 LA Severely Loaded Sec for inc Tr with cl 3 or2 green traffic Thr 24-hrs
Deferred Reported
MACcMIS MAC address mismatch for LA/WA port Deferred Reported
MACcVCM VLA configuration mismatch Prompt Reported
MACcVLAOVFW Maximum number of VLA instances exceeded Information Reported
MIBcVLAOVFW Maximum number of VLA instances exceededin MIB
Information Reported
WADPcTHR15 WA Dropped packets threshold crossing 15-min ot reported Reported
WADPcTHR24 WA Dropped packets threshold crossing 24-hrs ot reported Reported
WAI3GEILScTHR15 WA Loaded Sec for incoming traffic with class3 green traffic Thr 15min
Deferred Reported
WAI3GEILScTHR24 WA Loaded Sec for incoming traffic with class3 green traffic Thr 24-hrs
Deferred Reported
WAI32GEILScTHR15 WA Loaded Sec for inc Tr with class 3 or 2green traffic Thr 15min
Deferred Reported
WAI32GEILScTHR24 WA Loaded Sec for inc Tr with cl 3 or 2 greentraffic Thr 24-hrs
Deferred Reported
WAI3GEISLScTHR15 WA Severely Loaded Sec for inc Tr with class 3green traffic Thr 15min
Deferred Reported
WAI3GEISLScTHR24 WA Severely Loaded Sec for inc Tr with class 3green traffic Thr 24-hrs
Deferred Reported
WAI32GEISLScTHR15 WA Severely Loaded Sec for inc Tr with Cl 3 or2 green traffic Thr 15min
Deferred Reported
WAI32GEISLScTHR24 WA Severely Loaded Sec for inc Tr with cl 3 or2 green traffic Thr 24-hrs
Deferred Reported
pdhPS ASAP
The following table lists the default alarm severity assignments of the “pdhPS” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
E11cLOS 1.5 Mbit/s Loss of input signal Reported ot Reported
E11cES 1.5 Mbit/s ot expected input signal Information ot Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-7
ethPS ASAP
The following table lists the default alarm severity assignments of the “ethPS” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
EMACcLOF Encapsulated MediumAccess Control loss of framealignment
Deferred Reported
EMACcRCF GFP Client Signal Fail (CSF) indication Prompt Reported
LAcAM Ethernet interface Auto egotiation Mismatch Prompt Reported
LAcLOS Ethernet interface Loss of input signal Prompt Reported
LAcES Ethernet interface ot expected input signal Information ot Reported
GEcOSYC Loss of Synchronisation Prompt Reported
X21cLOS o input signal at the corresponding X.21 port Prompt Reported
X21cES Incoming signal on an X.21 interface port - otMonitored
Information ot Reported
X21OTMcSW Output timing mode automatically switched to theself-timed mode
Information Reported
Notes:
1. Alarms marked with an asterisk (“*”) in the “Probable cause” column are not supported in
the present 1643 AM release. These alarms are prepared for future applications.
pdhPath ASAP
The following table lists the default alarm severity assignments of the “pdhPath” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting
state (default
setting)
P11OTMcSW 1.5 Mbit/s output timing mode change Information Reported
P12OTMcSW 2 Mbit/s output timing mode change Information Reported
P12ScFEDEG Degraded signal condition Deferred Reported
P12ScFELOF Loss of frame - external TU modem Deferred Reported
P12ScSSF P12s etwork connection server signal fail Information Reported
P12SBBEcTHR15 P12s ear- end background block errors thresholdcrossing 15-min
Information ot Reported
P12SBBEcTHR24 P12s ear- end background block errors thresholdcrossing 24-hrs
Information ot Reported
P12SEScTHR15 P12s ear- end errored seconds threshold crossing15-min
Information ot Reported
P12SEScTHR24 P12s ear- end errored seconds threshold crossing24-hrs
Information ot Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-8 365-312-877R7.2Issue 4 November 2009
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting
state (default
setting)
P12SSEScTHR15 P12s ear- end severely ES threshold crossing 15-min Information ot Reported
P12SSEScTHR24 P12s ear- end severely ES threshold crossing 24-hrs Information ot Reported
P12SUAScTHR15 P12s ear- end unavailable seconds threshold crossing15-min
Information ot Reported
P12SUAScTHR24 P12s ear- end unavailable seconds threshold crossing24-hrs
Information ot Reported
FSCcTHR15 configurable 15-minuteframe slip/skip count (FSC)threshold - exceeded
Information ot Reported
FSCcTHR24 configurable 24-hour frame slip/skip count (FSC)threshold - exceeded
Information ot Reported
ISDcLBK ISD-PRA Loopback inband activated ot reported Reported
P12SgcSSF * P12s etwork connection server signal fail egress Information Reported
P12SBBEgcTHR15 * P12s ear-end background block errors thresh cross15-min egress
Information ot Reported
P12SBBEgcTHR24 * P12s ear-end background block errors thresh cross24-hrs egress
Information ot Reported
P12SESgcTHR15 * P12s ear-end errored seconds threshold crossing15-min egress
Information ot Reported
P12SESgcTHR24 * P12s ear-end errored seconds threshold crossing24-hrs egress
Information ot Reported
P12SSESgcTHR15 * P12s ear-end severely ES threshold crossing 15-minegress
Information ot Reported
P12SSESgcTHR24 * P12s ear-end severely ES threshold crossing 24-hrsegress
Information ot Reported
P12SUASgcTHR15 * P12s ear-end unavailable seconds threshold crossing15-min egress
Information ot Reported
P12SUASgcTHR24 * P12s ear-end unavailable seconds threshold crossing24-hrs egress
Information ot Reported
timing ASAP
The following table lists the default alarm severity assignments of the “timing” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
TBACKcUPM System timing in backup state Information Reported
TLIKcFLR Timing link failed Deferred Reported
TLIKcUEQ Timing link unequipped Deferred Reported
TSCOcSQ Station clock output squelched Information Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-9
sdhPRS ASAP
The following table lists the default alarm severity assignments of the “sdhPRS” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default
setting)
RS1cTIM STM-1 RS trace identifier mismatch Prompt Reported
RS4cTIM STM-4 RS trace identifier mismatch Prompt Reported
STM1cLOF STM-1 Loss of frame alignment Prompt Reported
STM1cLOS STM-1 Loss of input signal Prompt Reported
STM1cES STM-1 ot expected input signal Information ot Reported
STM4cLOF STM-4 Loss of frame alignment Prompt Reported
STM4cLOS STM-4 Loss of input signal Prompt Reported
STM4cES STM-4 ot expected input signal Information ot Reported
sdhMS ASAP
The following table lists the default alarm severity assignments of the “ sdhMS” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
MS1cAIS STM-1 MSAlarm indication signal received ot reported Reported
MS1BBEcTHR15 STM-1 MS ear-end background block errorsthreshold crossing 15-min
Information ot Reported
MS1BBEcTHR24 STM-1 MS ear-end background block errorsthreshold crossing 24-hrs
Information ot Reported
MS1EScTHR15 STM-1 MS ear-end errored seconds thresholdcrossing 15-min
Information ot Reported
MS1EScTHR24 STM-1 MS ear-end errored seconds thresholdcrossing 24-hrs
Information ot Reported
MS1SEScTHR15 STM-1 MS ear-end severely ES threshold crossing15-min
Information ot Reported
MS1SEScTHR24 STM-1 MS ear-end severely ES threshold crossing24-hrs
Information ot Reported
MS1UAScTHR15 STM-1 MS ear-end unavailable seconds thresholdcrossing 15-min
Information ot Reported
MS1UAScTHR24 STM-1 MS ear-end unavailable seconds thresholdcrossing 24-hrs
Information ot Reported
MS4cAIS STM-4 MSAlarm indication signal received ot reported Reported
MS4BBEcTHR15 STM-4 MS ear-end background block errorsthreshold crossing 15-min
Information ot Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-10 365-312-877R7.2Issue 4 November 2009
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
MS4BBEcTHR24 STM-4 MS ear-end background block errorsthreshold crossing 24-hrs
Information ot Reported
MS4EScTHR15 STM-4 MS ear-end errored seconds thresholdcrossing 15-min
ot reported ot Reported
MS4EScTHR24 STM-4 MS ear-end errored seconds thresholdcrossing 24-hrs
Information ot Reported
MS4SEScTHR15 STM-4 MS ear-end severely ES threshold crossing15-min
Information Reported
MS4SEScTHR24 STM-4 MS ear-end severely ES threshold crossing24-hrs
Information ot Reported
MS4UAScTHR15 STM-4 MS ear-end unavailable seconds thresholdcrossing 15-min
ot reported Reported
MS4UAScTHR24 STM-4 MS ear-end unavailable seconds thresholdcrossing 24-hrs
Information ot Reported
sdhMSP ASAP
The following table lists the default alarm severity assignments of the “sdhMSP” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm
severity
Reporting state
(default setting)
MS1cFOP STM-1 MS Protection switching protocol failure Deferred Reported
sdhHOPath ASAP
The following table lists the default alarm severity assignments of the “sdhHOPath”
ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting
state (default
setting)
VC4BBEcTHR15 VC-4 ear-end background block errors thresholdcrossing 15-min
Information ot Reported
VC4BBEcTHR24 VC-4 ear-end background block errors thresholdcrossing 24-hrs
Information ot Reported
VC4EScTHR15 VC-4 ear-end errored seconds threshold crossing15-min
Information ot Reported
VC4EScTHR24 VC-4 ear-end errored seconds threshold crossing24-hrs
Information ot Reported
VC4SEScTHR15 VC-4 ear-end severely ES threshold crossing15-min
Information ot Reported
VC4SEScTHR24 VC-4 ear-end severely ES threshold crossing24-hrs
Information ot Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-11
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting
state (default
setting)
VC4UAScTHR15 VC-4 ear-end unavailable seconds thresholdcrossing 15-min
Information ot Reported
VC4UAScTHR24 VC-4 ear-end unavailable seconds thresholdcrossing 24-hrs
Information ot Reported
sdhLOPath ASAP
The following table lists the default alarm severity assignments of the “sdhLOPath”
ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
TU3cAIS TU-3 Alarm indication signal received Reported ot Reported
TU3cLOP TU-3 Loss of pointer Prompt Reported
VC3BBEcTHR15 VC-3 ear-end background block errorsthreshold crossing 15-min
Information ot Reported
VC3BBEcTHR24 VC-3 ear-end background block errorsthreshold crossing 24-hrs
Information ot Reported
VC3EScTHR15 VC-3 ear-end errored secondsthreshold crossing 15-min
Information ot Reported
VC3EScTHR24 VC-3 ear-end errored secondsthreshold crossing 24-hrs
Information ot Reported
VC3SEScTHR15 VC-3 ear-end severely ES thresholdcrossing 15-min
Information ot Reported
VC3SEScTHR24 VC-3 ear-end severely ES thresholdcrossing 24-hrs
Information ot Reported
VC3UAScTHR15 VC-3 ear-end unavailable secondsthreshold crossing 15-min
Information ot Reported
VC3UAScTHR24 VC-3 ear-end unavailable secondsthreshold crossing 24-hrs
Information ot Reported
VC11cPLM VC-11 Payload mismatch Prompt Reported
VC11cRDI VC-11 Remote defect indicator Information ot Reported
VC11cSSF VC-11 etwork connection serversignal fail
Information Reported
VC11cTIM VC-11 Path trace identifier mismatch Prompt Reported
VC11cUEQ VC-11 Unequipped Prompt Reported
VC11BBEcTHR15 VC-11 ear- end background blockerrors threshold crossing 15-min
Information ot Reported
VC11BBEcTHR24 VC-11 ear- end background blockerrors threshold crossing 24-hrs
Information ot Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-12 365-312-877R7.2Issue 4 November 2009
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
VC11EScTHR15 VC-11 ear- end errored secondsthreshold crossing 15-min
Information ot Reported
VC11EScTHR24 VC-11 ear- end errored secondsthreshold crossing 24-hrs
Information ot Reported
VC11SEScTHR15 VC-11 ear- end severely ES thresholdcrossing 15-min
Information ot Reported
VC11SEScTHR24 VC-11 ear- end severely ES thresholdcrossing 24-hrs
Information ot Reported
VC11UAScTHR15 VC-11 ear- end unavailable secondsthreshold crossing 15-min
Information ot Reported
VC11UAScTHR24 VC-11 ear- end unavailable secondsthreshold crossing 24-hrs
Information ot Reported
VC12BBEcTHR15 VC-12 ear-end background blockerrors threshold crossing 15-min
Information ot Reported
VC12BBEcTHR24 VC-12 ear-end background blockerrors threshold crossing 24-hrs
Information ot Reported
VC12EScTHR15 VC-12 ear-end errored secondsthreshold crossing 15-min
Information ot Reported
VC12EScTHR24 VC-12 ear-end errored secondsthreshold crossing 24-hrs
Information ot Reported
VC12SEScTHR15 VC-12 ear-end severely ES thresholdcrossing 15-min
Information ot Reported
VC12SEScTHR24 VC-12 ear-end severely ES thresholdcrossing 24-hrs
Information ot Reported
VC12UAScTHR15 VC-12 ear-end unavailable secondsthreshold crossing 15-min
Information ot Reported
VC12UAScTHR24 VC-12 ear-end unavailable secondsthreshold crossing 24-hrs
Information ot Reported
sdhVCG ASAP
The following table lists the default alarm severity assignments of the “sdhVCG” ASAP.
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
VC12VcLOM VC-12 Virtual concatenated Loss of multiframe Prompt Reported
VC12VcSQM VC-12 Virtual concatenated Sequence mismatch Prompt Reported
VC12VcMD VC-12 virtual concatenated group memberdifferential delay out of range
Deferred Reported
VC12VcVCFAIL VC-12 member of the VC-12-4v VirtualConcatenation Group (VCG) multiple parallelSHDSL links - failed
Deferred Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-13
Alarm identifier
“Probable cause”
Alarm text Alarm severity Reporting state
(default setting)
VC12VcLOA VC-12 Virtual concatenated Loss of alignment Prompt Reported
VC12VcSSF VC-12 Virtual concatenated server signal fail Prompt Reported
VC12VcSSD VC-12 Virtual concatenated server signal degrade Deferred Reported
VC12VcPLM VC-12-Xv Payload mismatch Prompt Reported
VC3VcLOA VC-3 Virtual concatenated Loss of alignment Prompt Reported
VC3VcSSF VC-3 Virtual concatenated server signal fail Prompt Reported
VC3VcSSD VC-3 Virtual concatenated server signal degrade Deferred Reported
VC3VcPLM VC-3-Xv Payload mismatch Prompt Reported
VC3VcLOM VC-3 Virtual concatenated Loss of multiframe Prompt Reported
VC3VcMD VC-3 virtual concatenated group member differentialdelay out of range
Deferred Reported
VC4VcMD VC-4 virtual concatenated group member differentialdelay out of range
Deferred Reported
VC3VcSQM VC-3 Virtual concatenated Sequence mismatch Prompt Reported
VC12VcLOPC VC-12 Virtual concatenated loss of partial capacity Prompt Reported
VC12VcLOTC VC-12 Virtual concatenated loss of total capacity Prompt Reported
VC12VcFOPR VC-12 Virtual concatenated failure of protocolreceived
Prompt Reported
VC12VcFOPT VC-12 Virtual concatenated failure of protocoltransmitted
Prompt Reported
VC3VcLOPC VC-3 Virtual concatenated loss of partial capacity Prompt Reported
VC3VcLOTC VC-3 Virtual concatenated loss of total capacity Prompt Reported
VC3VcFOPR VC-3 Virtual concatenated failure of protocolreceived
Prompt Reported
VC3VcFOPT VC-3 Virtual concatenated failure of protocoltransmitted
Prompt Reported
VC12VcTLCR VC-12 VCG total loss of capacity (receive) Prompt Reported
VC12VcPLCR VC-12 VCG partial loss of capacity (recieve) Prompt Reported
VC12VcTLCT VC-12 VCG total loss of capacity (transmission) Prompt Reported
VC12VcPLCT VC-12 VCG partial loss of capacity (transmission) Prompt Reported
VC3VcTLCR VC-3 VCG total loss of capacity (receive) Prompt Reported
VC3VcPLCR VC-3 VCG partial loss of capacity (recieve) Prompt Reported
VC3VcTLCT VC-3 VCG total loss of capacity (transmission) Prompt Reported
VC3VcPLCT VC-3 VCG partial loss of capacity (transmission) Prompt Reported
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
7-14 365-312-877R7.2Issue 4 November 2009
ASAP name
The ASAP name is used to distinguish different ASAPs of the same type.
The following provisioning rules apply to the ASAP name:
1. The “DEFAULT” ASAPs cannot be renamed.
2. The ASAP name is an alphanumeric string of up to 20 characters.
3. The following characters are permitted in an ASAP name:
• Upper case letters (A… Z),
• Lower case letters (a … z),
• Digits (0 … 9),
• Hyphens (-).
Maximum number of ASAPs
The total number of ASAPs is restricted to 64, including the “DEFAULT” ASAPs, and
independent from the ASAP type, i.e. beyond the overall maximum number of 64, there is
no specific restriction per ASAP type.
Alarm management concepts Alarm Severity Assignment Profile (ASAP) concepts
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
7-15
8 8Alarm management tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to the alarm
management.
Contents
To create a newAlarm Severity Assignment Profile (ASAP) 8-2
To modify an existing ASAP 8-3
To delete an ASAP 8-5
To view ASAP information 8-6
To view an assignment list for a specified ASAP 8-7
To assign an ASAP to one or several managed objects 8-10
To view assigned ASAPs for a specified managed object 8-13
To assign one or more ASAPs in different groups to one or several managed
objects
8-16
To assign one or several E resources to an ASAP 8-19
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-1
To create a new Alarm Severity Assignment Profile (ASAP)
When to use
Use this task to create new alarm severity assignment profile (ASAP).
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task
Complete the following steps to create a newASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Click the New profile button right to the drop down menu.
Result:The New NE Profile page is displayed.
...................................................................................................................................................................................................
3 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. In the NE name field, select the name of the target E.
4. In the Profile group field, select the profile group to which you wish to create a newprofile.
5. In the Profile name field, enter an case-sensitive up to 20 characters alphanumeric(A…Z, a…z, 0…9, and hyphen) string for the new profile name. The profile name
should be unique per profile type.
6. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the New NE Profile page and the new Alarm Severity Assignment Profile
is created.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To create a new Alarm Severity Assignment Profile (ASAP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-2 365-312-877R7.2Issue 4 November 2009
To modify an existing ASAP
When to use
Use this task to modify and/or rename an existing alarm severity assignment profile
(ASAP).
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
The maximumASAP number to define is 64 including default ASAP.
Important! To modify the default ASAP will be forbidden.
Task
Complete the following steps to modify and/or rename an existing ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing a list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to modify, select
View/Modify from the Go menu, and click Go.
Alarm management tasks To modify an existing ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-3
Result:The Modify NE Profile details page is displayed.
To modify the ASAP continue with Step 4, to rename the ASAP profile name continue
with Step 5.
...................................................................................................................................................................................................
4 Change the severity and reporting state for any of the alarm identifier fields that are
modifiable from the drop-down menus.
Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify NE Profile details page and the Alarm Severity Assignment
Profile is modified.
...................................................................................................................................................................................................
5 In the New Profile Name field, enter the new ASAP profile name.
Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify NE Profile details page and the Alarm Severity Assignment
Profile is renamed.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To modify an existing ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-4 365-312-877R7.2Issue 4 November 2009
To delete an ASAP
When to use
Use this task to delete an alarm severity assignment profile (ASAP). DefaultASAPs
cannot be deleted.
Task
Complete the following steps to delete an user-created ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing a list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to delete, select Delete
from the Go menu, and click Go.
Result:A confirmation window appears. Click Yes.
The user-created alarm severity assignment profile is deleted.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To delete an ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-5
To view ASAP information
When to use
Use this task to view alarm severity assignment profile (ASAP) information.
Related information
For related information, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task
Complete the following steps to view ASAP information:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing a list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to view, select
View/Modify from the Go menu, and click Go.
Result:The NE Profile details page is displayed with the alarm severity assignment
profile information.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To view ASAP information
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-6 365-312-877R7.2Issue 4 November 2009
To view an assignment list for a specified ASAP
When to use
Use this task to view an assignment list for a specified ASAP.
There are two methods for this task.
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task, method 1: via NE Profiles
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to assign, select
Current Assignment from the Go menu, and click Go.
Alarm management tasks To view an assignment list for a specified ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-7
Result:The ASAP Assignments page is displayed.
...................................................................................................................................................................................................
4 Do the following:
• In the NE type field, select the type of the target E (if not already present).
• In the NE name field, select the name of the target E (if not already present).
• For View, click the radio button ASAP (if not already present).
• In the ASAP group field, select the ASAP group.
• In the ASAP name field, select a current active ASAP name.
• In the NE resource type field, select the E resource type.
• In the NE resource name field, enter a E resource name (optional).
• Click Search.
Result:The ASAPAssignments panel is populated at the bottom with a list of the
specified ASAP assignments that meet your search criteria.
ote: If no records are displayed change your search criteria of this step and try again.
Task, method 2: via NE management functions
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Alarm Severity Assignment ProfileAssignment.
5. Click Go.
Alarm management tasks To view an assignment list for a specified ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-8 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Result:The ASAPAssignment page is displayed. Continue with Step 4 of task
method 1.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To view an assignment list for a specified ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-9
To assign an ASAP to one or several managed objects
When to use
Use this task to assign an ASAP to one or several manageable object(s).
There are two methods for this task.
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task, method 1: via NE Profiles
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to assign, select
Current Assignment from the Go menu, and click Go.
Alarm management tasks To assign an ASAP to one or several managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-10 365-312-877R7.2Issue 4 November 2009
Result:The ASAP Assignments page is displayed.
...................................................................................................................................................................................................
4 Do the following:
• In the NE type field, select the type of the target E (if not already present).
• In the NE name field, select the name of the target E (if not already present).
• For View, click the radio button ASAP (if not already present).
• In the ASAP group field, select the ASAP group.
• In the ASAP name field, select a current active ASAP name.
• In the NE resource type field, select the E resource type.
• In the NE resource name field, enter a E resource name (optional).
• Click Search.
Result:The ASAPAssignments panel is populated at the bottom with a list of ASAP
assignments that meet your search criteria.
ote: If no records are displayed change your search criteria of this step and try again.
...................................................................................................................................................................................................
5 Mark the objects you wish to assign to a new ASAP, select Modify ASAPs assigned to
selected NE resources from the Go menu and click Go.
Result:The ASAP Assignment page is displayed.
...................................................................................................................................................................................................
6 In the ASAP assignment panel select the ASAP to which you wish to assign to the
previously selected objects displayed above in the NE resources panel and click
Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the ASAPAssignment page and a new ASAP is assigned to one or several
objects.
Alarm management tasks To assign an ASAP to one or several managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-11
E N D O F S T E P S...................................................................................................................................................................................................
Task, method 2: via NE management functions
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Alarm Severity Assignment ProfileAssignment.
5. Click Go.
Result:The ASAPAssignment page is displayed. Continue with Step 4 of task
method 1.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To assign an ASAP to one or several managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-12 365-312-877R7.2Issue 4 November 2009
To view assigned ASAPs for a specified managed object
When to use
Use this task to view assigned ASAPs for a specified managed object.
There are two methods for this task.
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task, method 1: via NE Profiles
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to assign, select
Current Assignment from the Go menu, and click Go.
Alarm management tasks To view assigned ASAPs for a specified managed object
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-13
Result:The ASAP Assignments page is displayed.
...................................................................................................................................................................................................
4 Do the following:
• In the NE type field, select the type of the target E (if not already present).
• In the NE name field, select the name of the target E (if not already present).
• For View, click the radio button NE resources (if not already present).
• In the NE resource type field, select the E resource type.
• In the Slot field, select the slot.ote: This field can be omitted depending on the selection of the NE resource typefield.
• In the NE resource name field, enter a E resource name (optional).
• Click Search.
Result:The ASAPAssignments panel is populated at the bottom with a list of ASAP
assignments that meet your search criteria. If the assignment list contains more than
50 entries than click in bottom Result pages panel on next the highlighted number/s to
skip to the next page/s for displaying.
ote: If no records are displayed change your search criteria of this step and try again.
Task, method 2: via NE management functions
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Alarm Severity Assignment Profiles.
Alarm management tasks To view assigned ASAPs for a specified managed object
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-14 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
4. In the Function field, select Retrieve/Set Alarm Severity Assignment ProfileAssignment.
5. Click Go.
Result:The ASAPAssignment page is displayed. Continue with Step 4 of task
method 1.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To view assigned ASAPs for a specified managed object
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-15
To assign one or more ASAPs in different groups to one orseveral managed objects
When to use
Use this task to assign one or more alarm severity assignment profiles (ASAPs) in
different groups to one or several manageable objects.
There are two methods for this task.
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task, method 1: via NE Profiles
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to assign, select
Current Assignment from the Go menu, and click Go.
Alarm management tasks To assign one or more ASAPs in different groups to one orseveral managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-16 365-312-877R7.2Issue 4 November 2009
Result:The ASAP Assignments page is displayed.
...................................................................................................................................................................................................
4 Do the following:
• In the NE type field, select the type of the target E (if not already present).
• In the NE name field, select the name of the target E (if not already present).
• For View, click the radio button NE resources (if not already present).
• In the NE resource type field, select the E resource type.
• In the Slot field, select the slot.ote: This field can be omitted depending on the selection of the NE resource typefield.
• In the NE resource name field, enter a E resource name (optional).
• Click Search.
Result:The ASAPAssignments panel is populated at the bottom with a list of ASAP
assignments that meet your search criteria. If the assignment list contains more than
50 entries than click in bottom Result pages panel on next the highlighted number/s to
skip to the next page/s for displaying.
ote: If no records are displayed change your search criteria of this step and try again.
...................................................................................................................................................................................................
5 Mark the objects you wish to assign to new ASAPs, select Modify ASAPs assigned to
selected NE resources from the Go menu and click Go.
Result:The ASAP Assignment page is displayed.
...................................................................................................................................................................................................
6 In the ASAP assignment panel select the ASAPs to which you wish to assign to the
previously selected objects displayed above in the NE resources panel and click
Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the ASAPAssignment page and the new ASAPs are assigned to one or
several objects.
ote: Always the last established ASAPs are used primarily on the assigned objects.
Alarm management tasks To assign one or more ASAPs in different groups to one orseveral managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-17
E N D O F S T E P S...................................................................................................................................................................................................
Task, method 2: via NE management functions
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Alarm Severity Assignment ProfileAssignment.
5. Click Go.
Result:The ASAPAssignment page is displayed. Continue with Step 4 of task
method 1.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To assign one or more ASAPs in different groups to one orseveral managed objects
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-18 365-312-877R7.2Issue 4 November 2009
To assign one or several NE resources to an ASAP
When to use
Use this task to assign one or several E resources to an ASAP.
There are two methods for this task.
Related information
For related informations, please refer to section ASAP concepts.
Before you begin
Prior to performing this task, you must have an overview of the current network topology.
Task, method 1: via NE Profiles
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Profiles→ NE Profiles.
Result:The NE Profiles page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Profile class, click the radio button Alarm.
2. In the NE type field, select the type of the target E (if not already present).
3. For the NE name field, click the Find button to populate the available Es. Mark asingle E or several Es from which you wish to display profiles and click on > forits selection, or click on >> to select all available Es.
4. In the Profile group field, select the profile group.
5. In the Profile name field, enter profile name (optional).
6. Click Search.
Result:The NE Profiles panel is populated at the bottom containing a list of the E
profiles that meet your search criteria.The displayed profiles in the Profile name
column depends on the selection of the profile class in the above search panel.
...................................................................................................................................................................................................
3 Mark the user-created alarm severity assignment profile you wish to assign, select
Current Assignment from the Go menu, and click Go.
Alarm management tasks To assign one or several NE resources to an ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-19
Result:The ASAP Assignments page is displayed.
...................................................................................................................................................................................................
4 Do the following:
• In the NE type field, select the type of the target E (if not already present).
• In the NE name field, select the name of the target E (if not already present).
• For View, click the radio button ASAP (if not already present).
• In the ASAP group field, select the ASAP group.
• In the ASAP name field, select a current active ASAP name.
• In the NE resource type field, select the E resource type.
• In the NE resource name field, enter a E resource name (optional).
• Click Search.
Result:The ASAPAssignments panel is populated at the bottom with a list of E
resource assignments that meet your search criteria.
ote: If no records are displayed it doesn't matter for this task. Continue with the nextstep.
...................................................................................................................................................................................................
5 Select Modify NE resources assigned to selected ASAP from the Go menu and click
Go.
Result:The ASAP Assignment page is displayed.
...................................................................................................................................................................................................
6 Complete the following items in the E resource assignment panel:
• In the NE resource type field, select the E resource type.
• In the NE resource name field, click the Find button to populate the availablemanageable objects. Mark a single object or several objects you wish to assign and
click on > for its selection, or click on >> to select all available objects.
• Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the ASAPAssignment page and the manageable object/s is/are assigned to
the ASAP displayed in the ASAP panel.
Alarm management tasks To assign one or several NE resources to an ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
8-20 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Task, method 2: via NE management functions
Complete the following steps to assign an ASAP:
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Alarm Severity Assignment Profiles.
4. In the Function field, select Retrieve/Set Alarm Severity Assignment ProfileAssignment.
5. Click Go.
Result:The ASAPAssignment page is displayed. Continue with Step 4 of task
method 1.
E N D O F S T E P S...................................................................................................................................................................................................
Alarm management tasks To assign one or several NE resources to an ASAP
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
8-21
9 9Timing provisioning
concepts
Overview
Purpose
This chapter presents concept information related to timing provisioning on 1643 Access
Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using OMS.
Contents
etwork element timing 9-2
etwork synchronization 9-5
Timing quality levels 9-7
Priorities 9-9
Retiming 9-11
Parameters for provisioning timing sources 9-12
Parameters for provisioning system timing 9-17
Parameters for provisioning station clock output 9-21
Parameters for provisioning output port timing 9-25
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-1
Network element timing
Introduction
To transmit signals with the correct speed, an E is equipped with an internal oscillator.
This oscillator is called the SDH equipment clock (SEC). The SEC provides a clock signal
to all transmission units and can either be free running or locked to an external timing
reference.
For pure transmission purposes, an E can be in the free running mode, in which no
synchronization reference is used. This timing mode is accurate enough for transmission,
but when the SDH network is also used to carry a timing reference, all Es must be
synchronized with a single timing reference.
The transmission signals in an SDH network can be used to transport the network
synchronization signals. Therefore each E in the network has to derive a timing signal
and send it to other Es. In this way the whole network can be synchronized with one
system timing reference.
Timing reference
The timing signal received by an E is called the timing reference.
The different physical ports that provide the input signals that are available as timing
references are:
• Station clock input ports (main timing ports, MTP)
• Line ports (LP)
• Tributary ports (TP)
Timing output
AE can provide a synchronization signal to other equipment by sending an output
timing signal.
The following timing outputs can be used:
• Station clock output (SCO) ports (MTP)
• Line ports (LP)
• Tributary ports (TP)
External clock output
For synchronization of equipment that is not connected to the E by tributary or line
signals, the E can provide an external clock signal (usually 2 MHz). However, this
equipment must be in close proximity to the E as the clock signal can only be carried a
few hundred meters.
Timing provisioning concepts Network element timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-2 365-312-877R7.2Issue 4 November 2009
Timing sources and outputs
A schematic drawing of an E with the timing sources and outputs is shown below. The
dotted arrows indicate outgoing timing signals. The straight arrows indicate the timing
inputs on which the internal clock of the E can be synchronized.
Timing modes
Timing units can be set in different modes:
• Free running
• Holdover
• Locked
Free running
In the free running mode, the timing unit generates a clock signal from its own oscillator.
o timing signal from other equipment is used for the E synchronization.
Holdover
The holdover mode will prevent a frequency step in case of a reference failure. Therefore
it uses a frequency memory of the last available frequency.
Locked
In the locked mode, the timing unit locks the oscillator-frequency to one of the external
timing sources.
Line signal
Clock
Tributary signal
Line signal
Station clock input Station clock output
NE
Timing provisioning concepts Network element timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-3
Schematic view of the timing modes
A schematic view of the three different timing modes is shown in the following figure:
+/-
Hold overmemory
Hold over
Feedback loopTimingsources
Locked
Free running
Timing provisioning concepts Network element timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-4 365-312-877R7.2Issue 4 November 2009
Network synchronization
Introduction
For telephone exchanges or switches, accurate timing is critical. Therefore switches are
synchronized with each other. One way of synchronizing is through the network. In this
case all the SDH-Es in the network are synchronized with one master clock. All the
switches in the network can synchronize with the network, and consequently to the master
clock.
Timing equipment
A network can use different types of equipment as a timing reference, each having its
own, well defined, accuracy.
• Primary reference clock (PRC)
• Synchronization supply unit-transit (SSU-T)
• Synchronization supply unit-local (SSU-L)
• SDH equipment clock (SEC)
• Do not use (DU).
Synchronization status message (SSM) signal
A timing marker or synchronization status message signal can be used to transfer the
signal-quality level throughout a network. This will guarantee that all network elements
are always synchronized to the highest-quality clock that is available.
Primary reference clock (PRC)
The master clock should be a primary reference clock (PRC), that provides a very
accurate network clock (a clock satisfying the ITU-T recommendation G.811). The other
Es in the ring are slaved to this clock. A second clock in the network can be used to act
as the backup of the master clock.
The PRC can either be an autonomous clock or it is able to accept synchronization from a
radio or satellite signal.
Synchronization supply unit (SSU)
oise, called jitter, may accumulate on the signal after passing through many nodes. It
therefore becomes necessary at some point to recover and reshape the signal. In this case
a synchronization supply unit (SSU) will be used. In addition to recovering and reshaping,
the SSU will also be able to run on its own when the reference signal (for instance
coming from the PRC) is lost. In this case, the SSU will be able to maintain the quality of
the reference signal it produces by means of a holdover mode: the frequency and phase of
the reference signal are stored in a memory and used to generate a reference signal
locally.
Timing provisioning concepts Network synchronization
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-5
Two kinds of SSUs exist:
• SSU-T: SSU-transit
• SSU-L: SSU-local
The functionality of both SSUs is equal, the accuracy of the SSU-T is higher than the
accuracy of the SSU-L.
SDH equipment clock SEC
An SDH E has its own internal oscillator, called the SDH equipment clock (SEC). The
accuracy of a SEC is lower than the accuracy of both the SSU and the PRC.
Network example
An example of a network is shwon in the following figure. Four Es of a large network
are drawn, plus a master clock (PRC) and an SSU.
NE NE
NE
NELine A Line B
Line A
Line B
Line B
Line A
Line B Line A
SDHNetwork
SDHNetwork
Station clockinput
Station clockoutput
SSUSSU
SSUPRC
Station clockinput
Standby synchronization
Working synchronization
Master clock
Timing provisioning concepts Network synchronization
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-6 365-312-877R7.2Issue 4 November 2009
Timing quality levels
Introduction
To choose the most appropriate timing signal from all the incoming timing signals, the
quality of the timing signals must be known.
Different quality levels are defined for timing signals. The quality levels specify the
quality of the incoming or outgoing timing signal. The quality levels are related to the
equipment used to produce the corresponding timing signal.
Accuracy
The accuracy of a timing signal can be given in an accuracy value. Every timing signal
will have an average frequency, and a deviation in time from the average frequency value.
The deviation from the average frequency, can be represented as a fraction of the average
frequency. This fraction is known as the accuracy value.
Example
When a timing reference has an average frequency of 2048 MHz, and varies in time
between 2048.01 MHz and 2047.99 MHz, the deviation from the average value is plus or
minus 0.01 MHz. This can be expressed in an accuracy value:
Accuracy = 0.01 / 2048 ≈ 0.0000049 = 4.9 × 10–6
Quality levels
The quality level (QL) values are transported as a synchronization status message in the
S1 byte in the STM-N signal or in the 4th to 8th position of the Sa bit in a framed 2 Mbps
signal.
QL S1-byte Accuracy Description
Quality
Unknown
S1=0 /A o QL information of the signal is available.
PRC S1=02 10–11 Primary reference clock indicates that the timing signal is
provided by a primary reference clock.
SSU-T S1=04 1.5 × 10–9 Synchronization supply unit-transit indicates that the timing
signal is derived from a transit SSU.
SSU-L S1=08 3 × 10–8 Synchronization supply unit-local indicates that the timing
signal was derived from a local SSU.
SEC S1=11 4.6 × 10–6 SDH equipment clock indicates that the timing signal is
provided by an SDH equipment clock.
Timing provisioning concepts Timing quality levels
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-7
QL S1-byte Accuracy Description
DU S1=15 /A Do not use for synchronization indicates that the timing signal
should not be used, since it may cause timing loops.
Timing provisioning concepts Timing quality levels
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-8 365-312-877R7.2Issue 4 November 2009
Priorities
Introduction
The timing reference signal is transported through a synchronized network by the Es.
The path this timing signal will follow can be controlled by the network operator.
Description
When only the quality level of the timing reference signal is used, a number of signals
with equal quality level can arrive at an E. To determine the timing source that the E
will choose in such a case, a priority is assigned to each timing source.
In choosing a timing source, the E first selects the timing source with the highest quality
level. When there are several timing sources available with this highest quality level, the
priority is taken into account additionally.
Example
In this figure, notice how the priorities define the timing path when each node receives
two signals of PRC quality. The priority in the upper node is disabled since this input
signal depends on an output signal of this E; this could cause a timing loop.
An example of priority settings in a network is shown in the following figure:
1
PRC PRC
PRC
DNU
DNU
DNU
Line signal Line signal2
Station Clock Input
1
2
2
1
1
2Line signal Line signal
PRC PRC
Priority = 11
2 Priority = 2
Priority = disabled
Timing provisioning concepts Priorities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-9
Timing provisioning concepts Priorities
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-10 365-312-877R7.2Issue 4 November 2009
Retiming
Introduction
When, for instance, a 2 Mbps PDH signal enters an SDH network, it is mapped into a
VC-12. This VC-12 itself is aligned to a TU-12 in larger containers (for instance VC-4)
and then transported through the network. A pointer is carried along to indicate the
position of the VC-12 in the container. During transport through the SDH network, the
VC-12 may shift in the TU-12. As a consequence, the pointer will also change, since it
dynamically indicates the position of the VC-12.
In other words, the payload can float in the container. Due to this floating, the phase
information of the original 2 Mbps signal inside the VC-12 can no longer be used.
This problem can be overcome using (2 Mbps) retiming. The main idea of retiming is the
enforcement of timing integrity at the cost of data integrity.
Retiming
A phase difference might occur between the tributary signal entering the SDH network
and the E clock of the node where this signal leaves the SDH network. Even if the
whole SDH network is synchronized with one reference clock, this clock can be out of
phase with the original clock of the tributary signal. To clock the signal out with the
SDH-PRC frequency, the signal is unpacked (from its virtual container) and stored in an
elastic buffer. From there it is sent out, and then the re-timed signal will carry the
SDH-PRC frequency. ow it can be used as a timing reference outside the SDH network.
Retiming is possible on the following tributary interfaces:
• 1.5 Mbps
• 2 Mbps
Self-timed
In the self-timed mode, the timing signal is derived from the bit rate of the VC-12, in case
of 2 Mbps retiming. The bit rate may fluctuate due to pointer adjustments within the SDH
network. Therefore the self-timed mode is not suitable for carrying a timing reference
through the SDH network.
Timing provisioning concepts Retiming
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-11
Parameters for provisioning timing sources
Introduction
An overview of the relationship between the physical ports, the timing references, and the
logical timing sources is shown in the following figure:
The physical ports and the timing references are indicated on the left side, the logical
timing sources on the right side. Timing references can be assigned to the timing sources.
Clear wait to restore state
Clear wait to restore state resets the wait to restore timer and the signal status will revert
to normal.
Possible values of the clear wait to restore state are yes and no.
Global wait to restore time
In case of a failure the system switches to a valid reference. When the failure is no longer
present, the system switches back, after a certain waiting period (the switching is
revertive). This waiting period is called the global wait to restore time. It can range from
0 minutes to 60 minutes. The signal status will become wait to restore.
The global wait to restore time setting holds for all the timing in the E. That is, for the
timing sources, for the system timing, and for the station clock output timing.
MTP 1.1
MTP 1.2
TS 1.<Port#>
TS 4.<Port#>
LP 1.1...LP 1.4
Station clockinput process
Input porttiming
process
STCLK-1
STCLK-2
TRIB-1
TRIB-4
LINE_1
LINE_2
TimingReferences
TimingSources
Timing SourceAssignment
PhysicalPorts
Timing provisioning concepts Parameters for provisioning timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-12 365-312-877R7.2Issue 4 November 2009
Port mode
The user can enable or disable the option for monitoring a timing source. If a timing
source is monitored, the timing source will forward the reference fail and reference
unequipped alarms to the management system when applicable.
Monitored can have the values auto, yes, or no.
Protection reference
The protection ports that can be assigned to the timing sources:
Timing sources Possible timing references
TRIB-1 TP2.1 to TP2.2
TRIB-2 TP2.1 to TP2.2
QL-in
When the quality level is read from the S1-byte or the Sa-bit from the timing references,
it is reflected in the QL-in parameter. This parameter can have all of the defined quality
level values; see “Timing quality levels” (p. 9-7).
QL-in status
The user can view the status of the incoming quality level (QL-in status) for each timing
source. Possible values are:
QL-in status Description
Valid The received quality level is in the valid range.
Invalid The received quality level falls outside the valid range or
is unstable.
ot supported The corresponding input port does not provide S1-byte
extraction.
ot applicable o reference is assigned to the timing source, or the
assigned signal experiences a reference fail.
QL-out
The QL-out parameter indicates the actual quality level value of the timing source that is
used by the system timing block and the station clock output block. The QL-out value, is
the quality level that enters the system timing and station clock output blocks. When
QL-provisioned is AUTO, QL-out equals QL-in. When QL-provisioned has a value which
is different from AUTO, QL-out equals QL-provisioned.
Timing provisioning concepts Parameters for provisioning timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-13
QL-provisioned
The quality level of timing references can be provisioned by the user. The provisioned
quality level is called QL-provisioned. In case of a timing reference without an S1-byte,
QL-provisioned allows the user to provision a quality level.
When a timing reference does have an S1-byte (QL-in can be read by the system), this
QL-provisioned. can be set to Auto; in this case the S1- byte will be read from the
incoming signal and will be sent to the System Timing function.
Reference fail
When the incoming signal cannot provide a timing reference, the timing reference is
considered to fail. Reference fail can take the values yes or no.
Signal status
The signal status is received in the timing sources block and forwarded to the system
timing block and the station clock output timing block. Possible values are:
Signal Status Description
ot Connected o reference is assigned to the timing source.
Failed A timing link fail is declared for the assigned timing link.
Wait to Restore The assigned reference signal will be available again when the
Wait to Restore timer has expired.
ormal The logical timing source is assigned to a valid timing reference.
Switch request
Switch requests are shown in the table, together with their description and priority.
Priority Switch Request Description
o request This is the default value. The system timing is operating under
normal conditions.
1 Clear Replaces the status by the normal status (in case of a previous
switch).
2 Forced to working Unconditional switch, issued by the user, even if this is service
degrading.
3 Forced to protection Unconditional switch, issued by the user, even if this is service
degrading.
4 Reference failure Initiates a switch to protection. This request is not issued by the
user, but by the node itself.
Timing provisioning concepts Parameters for provisioning timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-14 365-312-877R7.2Issue 4 November 2009
Priority Switch Request Description
5 Manual to working A conditional switch, which is issued by the user. The switch will
not be performed if it is service degrading.
6 Manual to protection A conditional switch, which is issued by the user. The switch will
not be performed if it is service degrading.
Switch status
This parameter indicates the latest switch request. When no protection reference is
provisioned, this parameter is not available. The possible values of this parameter are
listed in the table below:
Switch Status Description
o request o switch request has been issued.
Forced to worker A forced switch has been made to the timing reference that
is provisioned as the worker timing reference.
Forced to protection A forced switch has been made to the timing reference that
is provisioned as the protection timing reference.
Manual to worker Amanual switch has been made to the timing reference
that is provisioned as the worker timing reference.
Manual to protection Amanual switch has been made to the timing reference
that is provisioned as the protection timing reference.
Failed o switch could be made.
o protection has been provisioned
Timing source
Physical timing references can be assigned to logical timing sources. Once a timing
reference is assigned to a timing source, no other reference can be assigned to the same
source.
Transmission protected
Transmission protected indicates whether the timing reference is MSP-protected for
transmission. The values for transmission protected are yes and no.
Timing provisioning concepts Parameters for provisioning timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-15
Worker reference
The worker ports that can be assigned to the timing sources:
Timing sources Possible timing references
Line_1 LP1.1, LP2.1
Line_2 LP1.1, LP2.1
TRIB-1 TP1.1 to TP1.16
TP2.1 .. TP2.16, if an optional 2-Mps board is
present
TP2.1 to TP 2.2, if an optional STM-1 board is
present
TRIB-2 TP1.1 to TP1.16
TP2.1 to TP 2.2, if an optional STM-1 board is
present
Timing provisioning concepts Parameters for provisioning timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-16 365-312-877R7.2Issue 4 November 2009
Parameters for provisioning system timing
Introduction
The system timing functional block in the E is responsible for:
• Selecting the timing sources to synchronize the system
• Selecting the timing mode for the system
• Translating the quality level into the S1-byte of the outgoing signal
The different parameters that can be set in the system timing functionality are indicated in
the following figure:
Active timing source
The active timing source indicates the timing source currently used to synchronize the
system, together with the switch status of the source and the latest issued switch request.
Lock out request
The lock out state can be changed with the lock out request parameter. This can be set to
no request, clear, or set.
STCLK-1
STCLK-2
TRIB_1
TRIB_3
Free Running
Holdover
TRIB_2
TRIB_4
TimingSource Selection
TimingMode Selection
Clock Distributionto all transport units
LINE_1
LINE_2
Timing Sources
Timing provisioning concepts Parameters for provisioning system timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-17
The lock out request is for maintenance purposes. A timing source, which has a priority
value assigned to it, can be temporarily locked out. When the timing source is already
disabled, set is rejected. A lockout request is set to no request automatically when the
timing source is disabled.
To turn off a locked out state, the lock out request must be set to clear.
When priority = disabled the lock out request field is greyed out.
When a timing source is locked out, the E is in the abnormal state.
Lockout
The user can disable a specific timing source that enters the timing source selection
without changing the priority settings. If a timing source is locked out, it will not take part
in the timing source selection.
Whether a timing source is locked out is indicated by the lockout parameter. The possible
values for the lockout parameter are: yes and no.
Priority
The priority can be set for each timing source. There is a maximum of 8 timing sources.
The priority can have values from 1 to 8.
The priority parameter can also have the value disabled. A disabled timing source will not
be taken account in the timing source selection for the system timing.
Make sure not to provision identical priority values to multiple timing sources.
QL
The quality level of a timing source, that is used for automatic timing mode selection.
This QL is identical to the QL-out as described in “Parameters for provisioning timing
sources” (p. 9-12).
Switch request
Switch requests are shown in the table in order of priority, together with their description.
Switch request Description
o Request This is the default value. The system timing is operating
under normal conditions.
Clear Replaces the status by the normal status (in case of a
previous switch).
Forced Unconditional switch, issued by the user, even if it is
service degrading.
Timing provisioning concepts Parameters for provisioning system timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-18 365-312-877R7.2Issue 4 November 2009
Switch request Description
Manual A conditional switch, which is issued by the user. The
switch will not be performed if it is service degrading.
Switch status
This parameter indicates the latest switch request. When no protection reference is
provisioned, this parameter is not available. The possible values of this parameter are
listed in the table below:
Value Description
o Request o switch request has been issued.
Clear The former switch request is cleared. Switching will be
system controlled after this request.
Forced to <timing source> A forced switch has been made to a timing source as
indicated by the user.
Manual to <timing source> Amanual switch has been made to a timing source as
indicated by the user.
System and output timing QL mode
The timing reference switch can operate in two modes: QL-enabled and QL-disabled.
• If the timing reference switch is set to QL-enabled, it selects the source according to
the quality level and the source priorities (if two or more sources have equal, highest
quality levels)
• If the timing reference switch is set to QL-disabled, it selects the best source according
to the signal status and the priorities (if several sources have equal signal status).
Signal status
The signal status is received in the timing sources block and forwarded to the system
timing block and the station clock output timing block. Possible values are:
Signal Status Description
ot connected o reference is assigned to the timing source.
Failed A timing link fail is declared for the assigned
timing link.
Wait to restore The assigned reference signal will be available
again when the wait to restore timer has
expired.
Timing provisioning concepts Parameters for provisioning system timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-19
Signal Status Description
ormal The logical timing source is assigned to a valid
timing reference.
System QL
This parameter shows the quality level value of the timing signal used to clock the
system. Possible values are the quality levels as described in “Timing quality levels”
(p. 9-7).
Timing mode
This parameter is used to set one of the three timing modes: locked, holdover, and free
running. The nature of the modes is discussed in “etwork element timing” (p. 9-2).
Timing state
While operating in the locked mode, the incoming reference becomes unacceptable, the
timing mode selector switches to holdover. This is reflected in the timing state parameter.
When the system stays in the lock out mode, the timing status remains normal.
In free running or locked mode, the timing state always reflects normal.
Timing provisioning concepts Parameters for provisioning system timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-20 365-312-877R7.2Issue 4 November 2009
Parameters for provisioning station clock output
Introduction
The station clock output functional block in the E is responsible for selecting the timing
source for the station clock output (SCO).
Acceptance QL
The user can provision an acceptance QL, applicable for both station clock output ports
(if more than one). This quality level is the minimal quality level value that is accepted by
the station clock output process. If the quality level of the signal for the station clock
output falls below the acceptance QL, the E “squelches” the station clock output signal.
Active timing source
The active timing source indicates the timing source currently used to synchronize the
system, together with the switch status of the source and the latest issued switch request.
Lock out request
The lock out state can be changed with the lock out request parameter. This can be set to
no request, clear or set.
LINE_1
LINE_2
TRIB_1
TRIB_3
System Timing
TRIB_2
TRIB_4
TimingSource Selection
Source SelectionStation Clock
Output Process
StationClockOutput
Timing Sources
Timing provisioning concepts Parameters for provisioning station clock output
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-21
The lock out request is for maintenance purposes. A timing source, which has a priority
value assigned to it, can be temporarily locked out. When the timing source is already
disabled, set is rejected. A lockout request is set to no request automatically when the
timing source is disabled.
To turn off a locked out state, the lock out request must be set to clear.
When priority = disabled the lock out request field is greyed out.
Important!When a timing source is locked out, the E is in the abnormal state.
Lockout
The user can disable a specific timing source that enters the timing source selection
without changing the priority settings. If a timing source is locked out, it will not take part
in the timing source selection.
Whether a timing source is locked out is indicated by the lockout parameter. The possible
values for the lockout parameter are: yes and no.
Output QL
In case of independent timing, QL-out is not necessarily equal to the system quality level.
Output state
The user can view the output state of the signal generated by the station clock output(s).
Possible values are normal, disabled, and unacceptable.
• ormal indicates that the output in not disabled and has a quality level above the
acceptance QL.
• Disabled indicates that the station clock output is disabled.
• Unacceptable indicates a quality level below the acceptance QL, or a signal status is
failed.
Priority
The priority can be set for each timing source. There is a maximum of 6 timing sources.
The priority can have values from 1 to 8.
The priority parameter can also have the value disabled. A disabled timing source will not
be taken account in the timing source selection for the system timing.
Timing provisioning concepts Parameters for provisioning station clock output
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-22 365-312-877R7.2Issue 4 November 2009
Signal type
The signal type for the station clock outputs is read only parameter, equivalent of the read
and write parameter: 2 Mbps signal mapping. It is identical for these two types of station
clock outputs. These values are:
Signal type Description
2 MHz A 2 MHz clock signal.
2 Mbps framed A 2 Mbps tributary signal, with a framed structure.
Source selection
The station clock output timing can be derived from the active system clock processes or
from the independent station clock output timing source reference selector. This is
provisioned by the user. Two options are available:
• System timing
• Independent station clock timing.
STCLK output
The user can enable or disable the station clock output. If it is disabled it forwards no
signal at all and cannot be used.
Switch request
Switch requests are shown in the table in order of priority, together with their description.
Switch request Description
o request This is the default value. The system timing is operating
under normal conditions.
Clear Replaces the status by the normal status (in case of a
previous switch).
Forced Unconditional switch, issued by the user, even if it is
service degrading.
Manual A conditional switch, which is issued by the user. The
switch will not be performed if it is service degrading.
If QL=enabled, the switch will not be performed if it is
service degrading.
If QL=disabled, the switch will be performed even if it is
service degrading.
Timing provisioning concepts Parameters for provisioning station clock output
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-23
Switch status
This parameter indicates the latest switch request. When no protection reference is
provisioned, this parameter is not available. The possible values of this parameter are
listed in the table below:
Value Description
o request o switch request has been issued.
Clear The former switch request is cleared. Switching will be
system controlled after this request.
Forced to <timing source> A forced switch has been made to a timing source as
indicated by the user.
Manual to <timing source> Amanual switch has been made to a timing source as
indicated by the user.
System and output timing QL mode
The timing reference switch can operate in two modes: QL-enabled and QL-disabled.
• If the timing reference switch is set to QL-enabled, it selects the source according to
the quality level and the source priorities (if two or more sources have equal, highest
quality levels)
• If the timing reference switch is set to QL-disabled, it selects the best source according
to the signal status and the priorities (if several sources have equal signal status).
Timing source
Physical timing references can be assigned to logical timing sources. Once a timing
reference is assigned to a timing source, no other reference can be assigned to the same
source.
Timing provisioning concepts Parameters for provisioning station clock output
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-24 365-312-877R7.2Issue 4 November 2009
Parameters for provisioning output port timing
Introduction
Transmission ports are managed by a number of parameters, which are related to timing.
This is shown in the functional diagram below:
Acceptance QL
For each individual 2 Mbps tributary output port in the re-timed mode, an acceptance QL
can be provisioned.
If the system QL (in case of system timing) or the QL-out (in case of independent timing)
falls below the acceptance QL, the timing will go into the fallback mode.
Fallback mode
If a 2 Mbps port is operating in the re-timed mode and if the system and output QL mode
is enabled, the output is automatically switched to the provisioned fallback mode, if the
quality level of the system timing drops below the acceptance QL.
The three fallback modes are:
• re-timed AIS – a re-timed AIS is sent out.
• self-timed – the signal is sent out, from the port in the self-timed mode.
• none – no fallback applies.
Force DNU
Force DU allows to force an S1 byte value DU into an outgoing signal.
Output porttiming process
(SDH output ports)
FromStation Clock
Output
ClockDistribution
Output porttiming process
(2 Mbps output ports)
FromStation Clock
Output
ClockDistribution
Timing provisioning concepts Parameters for provisioning output port timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-25
The values for Force DU are given below:
Option Description
Yes ADU is forced on the outgoing signal
o o DU is forced on the outgoing signal
o request This option resets a force DU setting. It is the default
value for Force DU.
When an outgoing signal is forced to carry DU, this signal cannot be used for
synchronization by another E.
Forced DNU
Forced DU is a read only parameter. It indicates whether a DU is forced on an
outgoing signal.
Outgoing QL
Outgoing QL indicates the quality level that is sent out on a given transmission output
port which supports S1-byte quality level information carriage.
SSM out
SSM out displays the current S1 byte value that is sent out from the selected port.
Timing mode
The timing mode of each individual 2 Mbps tributary output port can be set to the
self-timed or re-timed mode:
• In the self-timed mode the 2 Mbps signal is extracted from the container contents of
the VC-12.
• In the re-timed mode, the timing of the 2 Mbps output signal is derived from the E
system timing; the 2 Mbps signal is routed through the elastic buffer.
If the ISD mode of a 2 Mbps ISD port is set to leased line (LL), the default value of
the timing mode parameter will be re-timed.
Timing alarm reporting
When the timing state of a 2 Mbps tributary output port is fallback, a defect is declared.
The reporting of this timing alarm can be enabled or disabled for each individual 2 Mbps
tributary output port. This is done with the timing alarm report parameter.
Timing provisioning concepts Parameters for provisioning output port timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
9-26 365-312-877R7.2Issue 4 November 2009
Timing state (port)
The (port) timing state of each individual 2 Mbps tributary output port can be viewed.
The (port) timing state can have two values:
• ormal: The port operates as specified in the timing mode
• Fallback: The timing mode has fallen back as specified in the fallback mode
parameter.
Timing provisioning concepts Parameters for provisioning output port timing
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
9-27
10 10Timing provisioning tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to timing
provisioning.
Contents
To view a list of E timing ports 10-2
To modify an E timing port 10-3
To view a list of E system timing sources 10-5
To modify an E system timing source 10-6
To modify E system timing status details 10-7
To view a list of E timing sources 10-9
To modify an E timing source 10-10
To view a list of station clock output timing sources 10-12
To modify a station clock output timing source 10-13
To modify E station clock output timing status 10-14
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-1
To view a list of NE timing ports
When to use
Use this task to view a list of E timing ports.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set Port Information.
5. Click Go.
Result:The NE Timing Ports page is displayed. It includes a list of timing ports for
an E.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To view a list of NE timing ports
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-2 365-312-877R7.2Issue 4 November 2009
To modify an NE timing port
When to use
Use this task to modify an E timing port.
Related information
If you want to prevent an outgoing signal from being used for synchronization by forcing
it to DU, follow the instructions provided in “To modify the parameters of a physical or
logical port” (p. 6-22).
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set Port Information.
5. Click Go.
Result:The NE Timing Ports page is displayed. It includes a list of timing ports for
an E.
...................................................................................................................................................................................................
3 Click the radio button next to the E timing port you wish to modify. From the Go menu,
select Modify and click Go.
Timing provisioning tasks To modify an NE timing port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-3
Result:The Modify NE Timing Port page is displayed.
...................................................................................................................................................................................................
4 Change the entries or selections for any modifiable fields that you wish to update.
• Port mode – the configured mode of the port. Possible values are:
– Monitored: The port is in service and carrying traffic. Fault reporting and
performance monitoring are enabled.
– ot Monitored: The port is out of service and is not carrying live traffic. Fault
reporting and performance monitoring are disabled.
– Auto: The port is in an “automatic” state (that means a pre-service state). Fault
reporting and performance monitoring are disabled. The port will change to the
Monitored state after a fault free signal has been detected and the pre-service timer
expires.
• Auto mode time (min) – the pre-service timer. The time that a continuous, faultfree signal is required on the port before the port is brought into service. Enter an
integer in the range of 0 minutes to 30 minutes.
• Signal type – the 2-Mbps signal mapping of the station clock input ports. Select oneof the following, depending on the type of signal that is provided: 2MHz, 2Mbit/s
Unframed, 2Mbit/s Framed, 64KHz, or ot Specified.
• Sa Bit – if a framed 2-Mbps signal is used, this parameter specifies if SSM extractionfrom the station clock input signal is enabled and (if yes) the Sa bit carrying the SSM
words. Select one of the following:
– Disable Extraction: SSM extraction is disabled.
– 4: SSM extraction is disabled, Sa bit 4 is used.
– 5: SSM extraction is disabled, Sa bit 5 is used.
– 6: SSM extraction is disabled, Sa bit 6 is used.
– 7: SSM extraction is disabled, Sa bit 7 is used.
– 8: SSM extraction is disabled, Sa bit 8 is used.
...................................................................................................................................................................................................
5 Click Submit.
Result:The E timing port is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify an NE timing port
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-4 365-312-877R7.2Issue 4 November 2009
To view a list of NE system timing sources
When to use
Use this task to view a list of E system timing sources.
Related information
See also:
• “Parameters for provisioning system timing” (p. 9-17)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set System Timing Source Information.
5. Click Go.
Result:The NE System Timing Sources page is displayed. It includes a list of
system timing sources for an E.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To view a list of NE system timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-5
To modify an NE system timing source
When to use
Use this task to modify an E system timing source.
Related information
See also:
• “Parameters for provisioning system timing” (p. 9-17)
Task
...................................................................................................................................................................................................
1 View a list of E system timing sources using the task “To view a list of E system
timing sources” (p. 10-5).
Result:The NE System Timing Sources page is displayed. It includes a list of E
system timing sources for an E.
...................................................................................................................................................................................................
2 Click the radio button next to the E system timing source you wish to modify. From the
Go menu, select Modify and click Go.
Result:The NE System Timing Source details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Priority – the priority of the timing link from a system timing source entering atiming link switch. Possible values are either Disabled, or 1 through 8. If the source is
disabled, it does not participate in the timing link switching. The range of priorities
depends on the maximum number of timing sources that a given timing link switch
can use as inputs. Priority 1 is the highest priority.
• Lockout Request – clears or sets the locked out status of the system timing source.If a lockout request is set, the system timing source cannot participate in the timing
link switching. Possible values are: o Request, Set, or Clear.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the NE System Timing Source details page, and the E system timing
source is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify an NE system timing source
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-6 365-312-877R7.2Issue 4 November 2009
To modify NE system timing status details
When to use
Use this task to modify E system timing status details.
Related information
See also:
• “Parameters for provisioning system timing” (p. 9-17)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set System Timing Status Information.
5. Click Go.
Timing provisioning tasks To modify NE system timing status details
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-7
Result:The NE system timing status details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Switch Request – requests an E system timing switch action. Select one of thefollowing: o Request, Clear, Forced, or Manual.
If the action is Forced or Manual, a timing source to switch to has to be specified.
• Timing mode – the mode to be used by the system timing source. Possible valuesare:
– Free Running: the system time base is supplying timing to the system, uncorrected
by any external references, or from historical reference data.
– Holdover: the time base is taking reference from the holdover memory.
– Locked: the system time base is locked to one of the input reference signals as it is
determined by the system timing link switch.
• System & output timing QL mode – the quality level mode for system and outputtiming. Possible values are:
– Enabled: The E selects the best link according to the quality level (QL) of the
reference and the source priorities (if several sources have the same highest QL).
– Disabled: The E selects the best link according to the signal status and the
source priorities (if several sources have the same signal status). Only the links in
the normal status participate in the timing link switching.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the NE system timing status details page, and the E system timing
status details are modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify NE system timing status details
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-8 365-312-877R7.2Issue 4 November 2009
To view a list of NE timing sources
When to use
Use this task to view a list of E timing sources.
Related information
See also:
• “Parameters for provisioning system timing” (p. 9-17)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set Timing Source Information.
5. Click Go.
Result:The NE Timing Sources page is displayed. It includes a list of timing
sources for an E.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To view a list of NE timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-9
To modify an NE timing source
When to use
Use this task to modify an E timing source.
Related information
See also:
• “Parameters for provisioning system timing” (p. 9-17)
Task
...................................................................................................................................................................................................
1 View a list of E timing sources using the task “To view a list of E timing sources”
(p. 10-9).
Result:The NE Timing Sources page is displayed. It includes a list of E timing
sources for an E.
...................................................................................................................................................................................................
2 Click the radio button next to the E timing source you wish to modify. From the Go
menu, select Modify and click Go.
Result:The NE Timing Source details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Working reference – a timing reference (external signal which can be used forsynchronization purposes) assigned as worker to a given timing source. When no
timing reference is assigned to the timing source, the worker reference is one. When
a single timing reference is assigned, its identity is given by the working reference.
For an E which supports timing reference protection, and when two timing
references are assigned, the working reference gives the identity of the worker timing
reference.
• Protection reference – A timing reference (external signal which can be used forsynchronization) assigned as protection to a timing source.
• Switch Request – requests a timing protection switch action. Select one of thefollowing: o Request, Clear, Forced to Working, Forced to Protection, Manual to
Working, or Manual to Protection.
This field is only available if a timing protection has been set up for the respective
timing source.
Timing provisioning tasks To modify an NE timing source
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-10 365-312-877R7.2Issue 4 November 2009
• QL provisioned – allows to specify the acceptance quality level. If the station clockoutput timing source falls below that value, the E reacts as specified with the setting
of the Squelch method field. Possible values are:
– PRC: primary reference clock
– SSU_L: synchronization supply unit-local
– SSU_T: synchronization supply unit-transit
– SEC: SDH equipment clock
– DU: the output timing signal should not be used for synchronization.
– Auto: the timing source forwards the incoming QL value toward the timing link
switches; otherwise the timing source overrides the incoming QL with the
provisioned one.
– Monitored – determines whether defects are monitored for the timing source. Atiming source can report the alarms link failure or link unequipped. Select yes or
no.
– Clear wait to restore state – if this field is changed from the default no to yes,the wait to restore timer is reset, and the signal status reverts to “ormal”.
– Global wait to restore time – the period a timing source will wait, after therestoration of a reference signal following a timing link failure, before the timing
source reverts to normal operation. Applies to all timing sources. Enter an integer
value in the range 0 min. to 60 min.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the NE Timing Source details page, and the E timing source is
modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify an NE timing source
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-11
To view a list of station clock output timing sources
When to use
Use this task to view a list of station clock output (SCO) timing sources.
Related information
See also:
• “Parameters for provisioning station clock output” (p. 9-21)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set Station Clock Output Timing SourceInformation.
5. Click Go.
Result:The NE SCO Timing Sources page is displayed. It includes a list of SCO
timing sources for an E.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To view a list of station clock output timing sources
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-12 365-312-877R7.2Issue 4 November 2009
To modify a station clock output timing source
When to use
Use this task to modify a station clock output (SCO) timing source.
Related information
See also:
• “Parameters for provisioning station clock output” (p. 9-21)
Task
...................................................................................................................................................................................................
1 View a list of SCO timing sources using the task “To view a list of station clock output
timing sources” (p. 10-12).
Result:The NE SCO Timing Sources page is displayed. It includes a list of SCO
timing sources for an E.
...................................................................................................................................................................................................
2 Click the radio button next to the SCO timing source you wish to modify. From the Go
menu, select Modify and click Go.
Result:The NE SCO Timing Source details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Priority – the priority of the timing link from a system timing source entering atiming link switch. Possible values are either Disabled, or 1 through 8. If the source is
disabled, it does not participate in the timing link switching. The range of priorities
depends on the maximum number of timing sources that a given timing link switch
can use as inputs. Priority 1 is the highest priority.
• Lockout Request – clears or sets the locked out status of the station clock outputtiming source. If a station clock output timing source lockout request is set, the station
clock output timing source cannot participate in the timing link switching. Possible
values are: o Request, Set, or Clear.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the NE SCO Timing Source details page, and the SCO timing source is
modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify a station clock output timing source
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-13
To modify NE station clock output timing status
When to use
Use this task to modify settings of the station clock output (SCO) timing status.
Related information
See also:
• “Parameters for provisioning station clock output” (p. 9-21)
Task
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E. If you have selected the target E in theprevious step, this field is already populated with your selection.
2. In the NE name field, select the name of the target E. If you have selected the targetE in the previous step, this field is already populated with your selection.
3. In the Category field, select Timing References.
4. In the Function field, select Retrieve/Set Station Clock Output Timing StatusInformation.
5. Click Go.
Result:The NE station clock output timing status details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Switch Request – requests an E station clock output switch action. Select one ofthe following: o Request, Clear, Forced, or Manual.
If the action is Forced or Manual, a timing source to switch to has to be specified.
• Timing source to switch to – the timing source to be used for the switch requestfrom the drop-down list of available line or tributary timing sources. This field applies
to forced or manual switches.
Timing provisioning tasks To modify NE station clock output timing status
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-14 365-312-877R7.2Issue 4 November 2009
• System & output timing QL mode – the quality level mode for system and outputtiming. Possible values are:
– Enabled: The E selects the best link according to the quality level (QL) of the
reference and the source priorities (if several sources have the same highest QL).
– Disabled: The E selects the best link according to the signal status and the
source priorities (if several sources have the same signal status). Only the links in
the normal status participate in the timing link switching.
• Station clock output – enables or disables the station clock output signal.
• Signal type – the type of the signal generated by the station clock output ports. Thisfield is displayed if the station clock output is enabled. Possible values are: 2MHz,
2Mbit/s Framed, 2Mbit/s Unframed, or 6MHz.
• Force DNU – allows to force an S1-byte value DU into the outgoing clock signal.This field is displayed if the signal type is 2Mbit/s Framed. If an outgoing clock
signal is forced to carry DU, this signal cannot be used for synchronization by
another E. Possible values are: Yes, o, or o Request.
• Squelch method – determines what is done with the signal if the station clockoutput timing source falls below the value in the Acceptance QL field. This field is
displayed if the signal type is 2Mbit/s Framed. Possible values are:
– DU: do not use this signal
– AIS: replace the signal with AIS
• Select Sa bit – allows to specify the Sa bit carrying the SSM words for the 2 Mbpsframed clock output signal. Possible values are 4 to 8
• Source selection – the source selection for the station clock output timing. Possiblevalues are:
– System Timing: the station clock output timing is derived from one of the system
clock processes.
– Independent: the station clock output timing is derived from the independent
station clock output timing link switch
• Acceptance QL – allows to specify the acceptance quality level. If the station clockoutput timing source falls below that value, the E reacts as specified with the setting
of the Squelch method field. Possible values are:
– PRC: primary reference clock
– SSU_L: synchronization supply unit-local
– SSU_T: synchronization supply unit-transit
– SEC: SDH equipment clock
Timing provisioning tasks To modify NE station clock output timing status
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
10-15
• Regenerator loop – can be set in order to avoid timing loops in the office betweenthe timing output ports and one or both of the timing inputs through a stand alone
synchronization equipment (SASE). Timing loops might happen, if the E forwards
timing to the SASE via one or both of the external timing output ports, and at the
same time receives a timing signal from the SASE via one or both of the external
timing input ports. Possible values are:
– one: the regenerator loop functionality is disabled. Timing loops are not
considered.
– MTP1.1: if the quality level of the incoming framed 2-Mbps timing signal at the
external timing input 1 is equal to the quality level of the timing signal that is
transmitted to the external timing output ports, Do not use for synchronization
(DU) is inserted for the outgoing timing signal as a timing loop might be
present.
– MTP1.2: if the quality level of the incoming framed 2-Mbps timing signal at the
external timing input 2 is equal to the quality level of the timing signal that is
transmitted to the external timing output ports, Do not use for synchronization
(DU) is inserted for the outgoing timing signal as a timing loop might be
present.
– Both: the regenerator loop functionality is applied to both external timing inputs.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the NE station clock output timing status details page, and the SCO
timing status is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Timing provisioning tasks To modify NE station clock output timing status
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
10-16 365-312-877R7.2Issue 4 November 2009
11 11Traffic provisioning
concepts
Overview
Purpose
This chapter presents concept information related to traffic provisioning on 1643 Access
Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using OMS.
Contents
SDH traffic provisioning concepts 11-2
Transmission plan 11-2
Cross-connections 11-4
VC-n concatenation 11-7
Subnetwork connection protection (SCP) 11-8
Multiplex section protection (MSP) 11-10
Ethernet traffic provisioning concepts 11-13
TransLA® Ethernet over SDH implementation 11-13
Virtual concatenation 11-18
Ethernet port provisioning 11-21
Auto negotiation and flow control 11-26
Quality of service (QoS) overview 11-29
Ethernet performance monitoring 11-32
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-1
SDH traffic provisioning concepts
Transmission plan
Design transmission plan
Transmission provisioning is based on a transmission plan, which must be available when
network connections are to be configured. The transmission plan shows:
• Which ports are terminating ports
• The parameters needed for manual routing
An example for a transmission plan is shown in the following figure:
The following hints can be used to set up a transmission plan:
• Make a drawing of the current network configuration (for example a ring) in which to
provision a transmission path. It is important to make clear in this drawing how the
Es are connected to each other.
Example: LB side of EA connected to LA side of E B.
LA LB
A
LA LB
B
LA LB
C
LB LA
E
LB LA
F
LB LA
D
Terminal
TP2.1 TP2.1
TP1.2
LP1.1
Tributary Ports
#1.111 #1.111 #1.121
#1.153 #1.111#1.122
#1.122 : AU-4/VC number
LB: Line Port B
LA: Line Port A
Traffic provisioning concepts SDH traffic provisioning conceptsTransmission plan
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-2 365-312-877R7.2Issue 4 November 2009
• Identify path channels within the line connections between Es: first check which
channels are available.
Example: Between Es A and B: #1.153, between Es B and C: #1.111 etc. (#1 is
AU-4 number 1). A ring with 1643 Access Multiplexer AM / 1643 Access Multiplexer
Small AMS Es is possible on STM-1 level and on STM-4, therefore only #1 is
available
• Identify Es in which add-drop cross-connections should be established. These are
the terminating Es of the transmission path.
• Identify terminating ports. First check which ports are available.
Example: TP2.1 in EA and TP1.2 in E D.
• Identify the Es in which through connections should be established (in between
terminating Es).
Example: E C.
LA LB
A
LA LB
B
LA LB
C
LB LA
E
LB LA
F
LB LA
D
LB: Line Port B
LA: Line Port A
Physical Network
Fibers
Traffic provisioning concepts SDH traffic provisioning conceptsTransmission plan
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-3
Cross-connections
Introduction
A cross-connection is made to create a path from one point to another point in the
network. A transmission plan is made to provision paths in a network and according to
this plan cross-connections can be made in each E involved in the path. OMS
establishes the necessary cross-connections automatically when a network connection is
created.
Cross-connection shapes
The supported cross-connection shapes (as shown in the graphical display of a
cross-connection) are listed in the following table:
Cross-connectionshape
Diagram Management systemsymbol
Simple (uni), a
unidirectional
point-to-point connectionfrom port ID 1 to port ID 1
source destination
Simple (bi), a
bidirectional
point-to-point connectionfrom port ID 1 to port ID 1
source destination
Add-drop (bi), part of a
bidirectional path
protection scheme
Pathprotectiongroup 2
Pathprotectiongroup 1
to port ID 1
PPG 1 output
from port ID 1
PPG 2 output
to port ID 2
adjunct PPG 1 output
from port ID 2
adjunct PPG 2 output
Ring 1
Ring 2
W P
W P
Traffic provisioning concepts SDH traffic provisioning conceptsCross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-4 365-312-877R7.2Issue 4 November 2009
SDH cross-connection levels
The supported SDH cards provide administrative units (AUs), which are sub-structured
for lower connectivity levels.
• STM-1 – 1 AU-4 is substructured into a combination of the lower TU-3, TU-2, or
TU-12 connectivity levels which are compliant with ITU-T recommendation G.707.
• STM-4 – 4 AU-4s are substructured into a combination of the lower TU-3, TU-2, or
TU-12 connectivity levels which are compliant with ITU-T recommendation G.707.
PDH cross-connection levels
The PDH cards that are supported provide fixed VCs as follows:
• 1.5 Mbps – 63 × VC-11 mapped into a substructured VC-4
• 2 Mbps – 63 × VC-12 mapped into a substructured VC-4
• 34 Mbps – 3 ×VC3s mapped into a substructured VC-4
• 45 Mbps – 3 × VC-3 mapped into a substructured VC-4.
Note: VC11 – DS11 signals (VC-11) are mapped to TU-12 and are treated as VC-12 for
cross-connections.
Connection points
A cross-connection is made between termination points (TP). On the tributary units, a
VC-12 termination point is selected. On the line units, the TU number inside the VC-4
must be selected. The TU number consists of 3 numbers:
• k: the number of the TUG-3 inside the VC-4
• l: the number of the TUG-2 inside the TUG-3
• m: the TU-12 number inside the TUG-2.
Traffic provisioning concepts SDH traffic provisioning conceptsCross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-5
Example
TP1.1,1.112
112
TUG-3TUG-2TU-12
VC-12:
100
TUG-3
VC-3:
SlotPort
AU-4 numberVC-12 (or VC-3) number
Traffic provisioning concepts SDH traffic provisioning conceptsCross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-6 365-312-877R7.2Issue 4 November 2009
VC-n concatenation
Introduction
The concatenation of two VC-ns provides a mechanism to transport payloads greater than
the capacity of a single VC-n, for example to transport ethernet data in SDH networks.
This feature is for the LA tributary only.
VC-3 concatenation
A concatenated VC-3 group is indicated as VC-3-Xv, “v” means virtual concatenation. X
can be 1 … 9.
VC-4 concatenation
A concatenated VC-4 group is indicated as VC-4-Xv, “v” means virtual concatenation. X
can be 1 … 7.
VC-12 concatenation
A concatenated VC-12 group is indicated as VC-12-Xv, “v” means virtual concatenation.
X can be 1 … 5 for X4IP, 1 … 63 for the other interface cards. .
Virtual concatenation
Virtual concatenation allows the transport of a single VC-n-Xv structure in X individual
TU-n without the use of any concatenation indication in the pointer bytes (which is the
case for contiguous concatenation). It only requires the path termination function to
provide concatenation functionality, hence guaranteeing interworking with other standard
low order connection functions.
Termination
VC-n concatenation is only supported without termination. This means that only VC-n
level cross-connections can be made.
AVC-n-Xv signal is handled like X individual VC-n3 signals. The same alarms and
performance values are supported as for VC-n. The result of the VC-n-Xv supervision is
copied into the X VC-ns.
• An alarm in an VC-n-Xv group is displayed as one alarm for the entire group.
• X VC-ns can have different path and path trace.
Traffic provisioning concepts SDH traffic provisioning conceptsVC-n concatenation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-7
Subnetwork connection protection (SNCP)
Introduction
Subnetwork connection protection (SCP) is used to protect the traffic for a pre-selected
path (path protection). This type of path protection can be used for VC-4, VC-3, and
VC-12 level.
Definition
Subnetwork connection protection is characterized by sending the signal in both
directions. When a fault condition occurs the receive E switches to the protecting line.
The capacity for protection cannot be used for any other traffic.
Objective
To be able to protect every provisioned path on an individual basis within a subnetwork.
Outcome
A provisioned subnetwork containing individually paths that are 1+1 protected against
service failures.
Principle
Subnetwork connection protection (SCP) protection switching deals with protection
against transmission failures in and between ring add/drop Es. One leg is selected as a
designated worker and the other leg as a designated protecting. This means that the
capacity is used for protection even if the normal route is available. A trail continues to
use the working route until a fault condition occurs or an external switch request is issued
to switch to the protecting route. This type of protection is non revertive. This means that
when a traffic failure in the working route has been cleared, traffic will remain on the
protection route until a manual or forced switch is applied, or when a failure occurs on the
protection line. This behavior is irrespective of any service restoration in the working
route.
An example for an SCP protected path is shown in the following figure:
Traffic provisioning concepts SDH traffic provisioning conceptsSubnetwork connection protection (SNCP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-8 365-312-877R7.2Issue 4 November 2009
Subnetwork connection non-intrusive (SNC/N) protection
The switching criteria for SC/ are based on both signal failures and signal degrade.
Signal failures that cause SC/ protection switch are the same as for SC/I: AIS
(Alarm Indication Signal), UEQ (unequipped VC), TIM (Trace Identifier Mismatch),
TU-AIS and TU-LOP (Loss of Pointer). Signal degrades that cause SC/ protection
switching are based on the number of errored blocks detected during a certain period. The
threshold that defines when a signal is declared degraded can be set by the user.
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS only uses
SC/ protection.
Subnetwork connection inherent protection (SNC/I) protection
The switching criteria for SC/I are based on signal failures. Signal failures that cause
SC/I protection switch are: AIS (Alarm Indication Signal), UEQ (unequipped VC),
TIM (Trace Identifier Mismatch), TU-AIS and TU-LOP (Loss of Pointer).
NE A NE C
NE B
NE D
workingroute
protectingroute
Traffic provisioning concepts SDH traffic provisioning conceptsSubnetwork connection protection (SNCP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-9
Multiplex section protection (MSP)
Introduction
Multiplex section protection (MSP) is used to protect the traffic in a point-to-point
connection against transmission failures (MS-AIS, LOF, LOS, MS-DEG) and port
equipment failures. A requirement for this kind of protection is that the transmission lines
are doubled (one working line, one protection line).
Multiplex section protection is applicable for 1643 Access Multiplexer AM / 1643 Access
Multiplexer Small AMS interfaces.
Principle
In a point-to-point connection between Es protected by MSP, the lines must be doubled.
One pair is selected as a designated worker and the other pair is designated protection.
The capacity in the protection or standby section must be reserved but is not available for
traffic.
Simply put, the protection or standby section is reserved for the same amount of traffic as
the working section and it cannot be used for carrying any other kind of traffic.
A trail continues to use the working route until a fault condition occurs or an external
switch request is issued to switch to the protection route.
An example for a MSP protected section is shown in the following figure:
Revertive mode
In the case of failure when in the revertive mode, the traffic switches to the protection line
and switches back when the failure is solved.
Non-revertive mode
In the non-revertive mode the traffic switches to the protection line in case of a failure. It
remains on the protection line even when the failure is solved.
Unidirectional mode
In the case of failure in the unidirectional mode, only the receive side switches.
Protection line
Working line
Multiplex section
Traffic provisioning concepts SDH traffic provisioning conceptsMultiplex section protection (MSP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-10 365-312-877R7.2Issue 4 November 2009
Bidirectional mode
In the case of failure in the bidirectional mode, both sides, the transmit and receive side,
are switched.
SONET interworking
The SOET interworking option can be enabled or disabled for interworking with
SOET equipment which provides MSP. A SOET network element using MSP can be
connected to the far end of the selected MSP pair.
Timer provisioning
The following are timers that the user can provision:
• Wait-to restore timer
• Hold-off timer
Wait to restore timer
The wait to restore timer applies to ITU / ETSI Mode (Annex A). If, in case of revertive
switching, the VCs are selected from the protection MS due to a fail or degrade condition
on the working MS, and the condition clears, then the wait to restore timer is started.
When the timer expires, the selector is switched back to the preferred working state. Each
protection group is provided with its own wait to restore timer, which is provisionable
from the management system in steps of one minute between 0 and 60 minutes. A newly
provisioned value of the wait to restore timer does not take effect until any current timer
has expired.
Hold-off timer
A hold-off timer provides a delay between the moment that the signal fail or degrade
condition is set, and the start of the execution of the switchover. Each protection group
contains one hold-off timer, which is triggered by the four SF/SD condition inputs. The
hold-off timer is started by the activation of the first SF or SD condition. If all conditions
are cleared before the hold-off timer terminates, the execution of the switchover is not be
started and is not forgotten.
Each protection group is provided with its own hold-off timer, which can be provisioned
from the management system. A newly provisioned value of a hold-off timer does not
take effect until the hold-off timer has expired.
Fail condition
Whenever a fault condition is present in an MS, and after some integration time has
elapsed, the management system indicates the detected fault. This is shown as the fail
condition.
Traffic provisioning concepts SDH traffic provisioning conceptsMultiplex section protection (MSP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-11
MSP protection switch states and protection switch requests
Protection switch requests can be initialized from the management system.
The following switch requests are possible:
• Clear
• Lockout
• Forced switch (to Working or Protection)
• Manual Switch (to Working or Protection)
It is also possible to retrieve the protection switch state of the MSP group. In bidirectional
mode, this will be possible for both the near- and far-end sites.
ote that a clear command clears a WTR timer that has not yet expired.
MSP protection switch states
The protection switch states are defined by the slot which is standby (working or
protection) and the group fail condition (Free, Unit Failed, or o Request). The following
protection switch states are supported by the management system:
• P,Free (Protection, Free): The protection slot is the standby slot and the group
condition is Free.
• W,Free (Working, Free): The working slot is the standby slot and the group condition
is Free.
• P,UF (Protection, Unit Failed): The protection slot is the standby slot and the group
condition is Unit Failed.
• W,UF (Working, Unit Failed): The working slot is the standby slot and the group
condition is Unit Failed.
• P,R (Protection, o Request): The protection slot is standby slot and the group
condition is o Request.
• W,R (Working, o Request): The working slot is standby slot and the group
condition is o Request.
Traffic provisioning concepts SDH traffic provisioning conceptsMultiplex section protection (MSP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-12 365-312-877R7.2Issue 4 November 2009
Ethernet traffic provisioning concepts
TransLAN® Ethernet over SDH implementation
TransLAN® overview
TransLA® is the collective term for the Ethernet SDH Transport Solution which includes
the transport of Ethernet (up to 10 Mbps), Fast Ethernet (100 Mbps), and Gigabit Ethernet
(1 Gbps) payload data over an SDH network.
The TransLA® Ethernet cards allow direct interconnection of data equipment over an
SDH transport network. The external data equipment could be an Ethernet switch, an IP
router, or a host system such as a user PC or a web server.
The TransLA® implementations all use standardized protocols to transport Ethernet
frames over the SDH network. First, the generic framing procedure (GFP) or the
proprietary Ethernet over SDH (EoS) method, a pre-standard GFP on several first
generation TransLA® card types, is used to encapsulate the Ethernet frames into the
SDH transmission payload. Secondly, virtual concatenation and LCAS are used to
allocate a flexible amount of WA bandwidth for the transport of Ethernet frames.
TransLA® supports IEEE 802.3 Ethernet frames as well as “Ethernet II” frames (“DIX
frames”).
Although optimized for IP, TransLA® is an Ethernet transport technology. It is
transparent to all layer 3 protocols (IP, IPX, DECnet, etc.).
TransLAN® cards
The following figure illustrates the basic design of a TransLA® card:
Traffic provisioning concepts Ethernet traffic provisioning conceptsOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-13
Legend:
A The external interfaces, to which the end-customer's Ethernet LAs are physically
connected.
B The interface between the Ethernet physical interface port and the Ethernet switch. The
internal interfaces of the Ethernet switch toward the Ethernet physical interface port are
referred to as “LA ports”. ote that two types of LA ports can be differentiated
according to their port role: “customer LA ports” and “network LA ports”.
C The internal interface between the Ethernet switch and the encapsulation and mapping
function. The internal interfaces of the Ethernet switch toward the encapsulation and
mapping function are referred to as “WA ports”. ote that two types of WA ports
can be differentiated according to their port role: “network WA ports” and “customer
WA ports”.
Cross-connection unit
PHY PHY PHY PHY
LAN ports
WAN ports
Virtual concatenation
Encapsulation and mapping
Ethernet switchL2
A
B
C
D
Physical interface
Traffic provisioning concepts Ethernet traffic provisioning conceptsTransLAN® Ethernet over SDH implementation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-14 365-312-877R7.2Issue 4 November 2009
D The interface between the encapsulation and mapping function and the cross-connect
function of the network element. This is were the virtually concatenated payload is
cross-connected to be transported over the SDH network.
The number of LA ports and WA ports differs for the different TransLA® cards, refer
to the 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS Application and
Planning Guide for detailed information.
The TransLA® implementations use standardized protocols to transport Ethernet frames
over the SDH network. The Ethernet over SDH (EoS) method and the generic framing
procedure (GFP) are used to encapsulate the Ethernet frames into the SDH transmission
payload. Virtual concatenation and LCAS are used to allocate a flexible amount of WA
bandwidth for the transport of Ethernet frames as needed for the end-user's application.
Physical interfaces
The physical interface function provides the connection to the Ethernet network of the
end-customer. It performs auto negotiation, and carries out flow control.
The following physical interfaces are enabled on Alcatel-Lucent TransLA® cards:
• 10BASE-T
• 100BASE-TX
• 1000BASE-T
• 1000BASE-SX
• 1000BASE-LX
• 1000BASE-ZX
The supported LA interfaces for Ethernet and Fast Ethernet applications are 10BASE-T
and 100BASE-TX. The numbers “10” and “100” indicate the bit rate of the LA, 10
Mbps (Ethernet) and 100 Mbps (Fast Ethernet) respectively. The “T” or “TX” indicates
the wiring and the connector type: Twisted pair wiring with RJ-45 connectors.
The supported LA interfaces for Gigabit Ethernet applications are 1000BASE-T,
1000BASE-SX, 1000BASE-LX and 1000BASE-ZX. Again, the number indicates the bit
rate of the LA, 1 Gbps (Gigabit Ethernet). “SX” indicates a short-haul interface, “LX”
and “ZX” indicate a long-haul interface (ZX interfaces have an extended reach in
comparison to LX interfaces).
Ethernet switch
The Ethernet switch connects the LA ports with the WA ports. It performs learning,
filtering and forwarding according to the IEEE 802.1D standard.
Traffic provisioning concepts Ethernet traffic provisioning conceptsTransLAN® Ethernet over SDH implementation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-15
The physical Ethernet switch can be logically split in multiple, independent switches or
port groups, called “virtual switch”. In the transparent tagging modes (LA interconnect,
LA-VP or LA-VP with QoS), also the name “LA group” is used instead of
“virtual switch”.
The following applies to port groups or virtual switches, respectively:
• A virtual switch defines a spanning tree domain, and can be assigned a mode of
operation (LA interconnect, LA-VP or LA-VP with QoS).
• A virtual switch includes any number (at least 2) of external Ethernet LA ports
and/or internal WA ports associated with a VC-n-Xv payload.
• Traffic between virtual switches is not possible.
• Each port can be a member of only one virtual switch at a time.
• AVLA must have all its port members inside a single virtual switch.
In the following example, a virtual switch is provisioned that connects 2 LA ports with
1 WA port:
Supported frame sizes
The 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS supports
Ethernet frames of up to 1650 bytes. The X8PL card of the 1643 Access Multiplexer AM /
1643 Access Multiplexer Small AMS supports Ethernet frames of up to 1600 bytes.
Ethernet encapsulation with GFP
The generic framing procedure (GFP) is used to adapt the asynchronous Ethernet payload
to the synchronous SDH server layer.
LAN
LAN
SDH transportnetwork
Virtual switch
LANports
WANports
TransLAN physicalEthernet switch
Traffic provisioning concepts Ethernet traffic provisioning conceptsTransLAN® Ethernet over SDH implementation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-16 365-312-877R7.2Issue 4 November 2009
AGFP-header (8 octets) is prepended to each Ethernet frame to indicate frame length and
payload type. Gaps between Ethernet frames are filled with “IDLE” frames (4 octets
each).
GFP, standardized by the ITU-T in the recommendations G.7041 and Y.1303, is a very
efficient encapsulation protocol because it has a fixed and small overhead per packet.
IDLEGFP
HEADEREthernet frame IDLE IDLE
GFPHEADER
GFPHEADER
Ethernet frame IDLE IDLEEthernet frame
Traffic provisioning concepts Ethernet traffic provisioning conceptsTransLAN® Ethernet over SDH implementation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-17
Virtual concatenation
The SDH granularity problem
The virtual containers of the SDH have fixed sizes. These virtual containers are important
for the transport of Ethernet frames over the SDH network:
• VC-12: 2 Mbps
• VC-3: 50 Mbps
• VC-4: 150 Mbps
It is difficult to fit the Ethernet traffic into one of these virtual containers. For many
applications the containers, or contiguously concatenated virtual containers, such as
VC-4-4C (600 Mbps) for example, are either too small or too big. This is known as the
granularity problem.
Virtual concatenation is a mechanism by which a number of independent VCs can be used
to carry a single payload. This way, the granularity problem is solved.
Possible payload sizes and the virtual containers that are used for the transport are shown
in the following table:
Payload Virtual containers Concatenation
2 Mbps 1 × VC-12 VC-12
4 Mbps 2 × VC-12 VC-12-2v
6 Mbps 3 × VC-12 VC-12-3v
8 Mbps 4 × VC-12 VC-12-4v
10 Mbps 5 × VC-12 VC-12-5v
50 Mbps 1 × VC-3 VC-3
100 Mbps 2 × VC-3 VC-3-2v
150 Mbps 1 × VC-4 VC-4
300 Mbps 2 × VC-4 VC-4-2v
450 Mbps 3 × VC-4 VC-4-3v
600 Mbps 4 × VC-4 VC-4-4v
750 Mbps 5 × VC-4 VC-4-5v
900 Mbps 6 × VC-4 VC-4-6v
1 Gbps 7 × VC-4 VC-4-7v
Virtual concatenation
Virtual concatenation can be used for the transport of payloads that do not fit efficiently
into the standard set of virtual containers (VCs).
Traffic provisioning concepts Ethernet traffic provisioning conceptsVirtual concatenation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-18 365-312-877R7.2Issue 4 November 2009
Virtual concatenation splits the contiguous bandwidth into individual VCs, transports
these VCs separately over the SDH network, and recombines them to a contiguous signal
at the path termination. An important aspect of virtual concatenation is that it only needs
to be supported at the end nodes (for example at the TransLA® cards that interface with
the end-customer's LA). The rest of the network simply transports the separate channels.
Example 1
As an example, the following figure shows the virtual concatenation of 5 × VC-12:
The 10 Mbps payload is put into a VC-12-5v, that means into a virtual concatenation
group (VCG) consisting of 5 virtually concatenated VC-12s. These VC-12s can travel the
network independently, and do not have to follow the same route. At the endpoint, the
VC-12-5v is reassembled, and the payload is extracted.
Example 2
The second example shows the principle of virtual concatenation in a Gigabit Ethernet
(GbE) network application. Protection of the virtually concatenated payload is possible
via standard SDH transmission protection schemes.
VC-12-5v
10 MbpsEthernet payload
VC-12 VC-12 VC-12VC-12VC-12
VC-12 VC-12 VC-12VC-12VC-12
VC-12-5v
0 1 2 3 4
0 1 2 3 4
10 MbpsEthernet payload
Traffic provisioning concepts Ethernet traffic provisioning conceptsVirtual concatenation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-19
Differential delay
Due to the different propagation delay of the VCs a differential delay occurs between the
individual VCs. This differential delay has to be compensated and the individual VCs
have to be re-aligned for access to the contiguous payload area.
The TransLA® re-alignment process covers a differential delay of at least 32 ms.
Link capacity adjustment scheme (LCAS)
The link capacity adjustment scheme (LCAS) is an extension of virtual concatenation that
allows dynamic changes in the number of channels in a connection. In case channels are
added or removed by management actions this will happen without losing any customer
traffic.
LCAS allows a bandwidth service with scalable throughput in normal operation mode. In
case of failure the connection will not be dropped completely but only the affected
channel(s). The remaining channels will continue carrying traffic. LCAS provides
automatic decrease of bandwidth in case of link failure and re-establishment after link
recovery.
In case only one end supports (or has turned on) the LCAS protocol, the side that does
support LCAS adapts automatically to the restrictions that are dictated by the
non-supporting end, that means the entire link behaves as a link that does not support
in-service bandwidth adaptations.
LAN LANWAN WAN
Network element Network element
Ethernetframe
EthernetframeVC-4-7v VC-4-7v
Traffic provisioning concepts Ethernet traffic provisioning conceptsVirtual concatenation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-20 365-312-877R7.2Issue 4 November 2009
Ethernet port provisioning
Customer-role and network-role ports
The user can assign a so-called “port role” to WA ports as well as to LA ports. In this
way it is possible to forward VLA tags , especially in double-tagging mode, also via
LA ports. Additionally it is possible to run the STP and GVRP protocols on physical
LA ports, too.
Each LA port or WA port can have one of the following port roles:
Role Description
Customer Customer-role ports are usually located at the edge of the switched TransLA® network
boundary, providing the Ethernet interface to the end-customer. Ethernet frames may be but
need not necessarily to be tagged.
In the majority of cases, LA ports are customer-role ports. However, two LA ports
connected via an Ethernet LA link would be an example of network-role LA ports. Another
example would be a trunking LA port connected via an Ethernet LA link to an ISP router
(where VLA tags are needed for further processing).
etwork etwork-role ports usually interconnect the nodes that make up the TransLA® network.
Ethernet frames need to be tagged.
In the majority of cases, WA ports are network-role ports. However, a WA port which is
connected to an Ethernet private line unit (EPL unit), thus extending the switched TransLA®
network boundary, would be an example of a customer-role WA port.
The following figure serves to visualize the concept of customer-role and network-role
ports.
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet port provisioning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-21
Flexible port role assignment
In most cases physical LA ports have the customer role and physical WA ports have
the network role, but there may be exceptions in some applications. In the following
figure the WA port connects an EPL link and is therefore at the edge of the TransLA®
network. Thus it has the customer role in this case.
In the example in the following figure the VLA tags have to be forwarded to a router.
The router uses the tagging information for its switch decisions. Additionally the LA
port must fulfil a network role. In this case it behaves like a node of the TransLA®
network. It could also participate in the STP in order to avoid loops, if there was another
link from a Router LA interface to a second node within the TransLA® network.
EPL unit
Customer LAN port
Network LAN port
Customer WAN port
Network WAN port
“neutral” LAN port
“neutral” WAN port
Ethernet LAN link
SDH link (virtually concatenated VCs)
Switched TransLANnetwork boundary
LAN unit “Ethernet over SDH”
EPL link
LAN
WAN port (“customer role”)
TransLANTM networkLAN unit
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet port provisioning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-22 365-312-877R7.2Issue 4 November 2009
ALA port which operates in the “network role” behaves like a WA port in terms of
VLA tagging, STP and GVRP.
The default settings are shown in the following table:
Physical ports
Port role LAN port WAN port
Customer role default
etwork role default
In the IEEE 802.1Q STP virtual switch mode and in the provider bridge mode, the port
role of each LA and WA port can be flexibly assigned. Each LA or WA port can be
configured to be either a customer-role or network-role port.
These are the characteristics of customer-role and network-role ports:
Customer-role port Network-role port
In the IEEE 802.1Q STP virtual switch mode:
In the ingress direction, untagged Ethernet
frames are tagged with a default identifier, the
port VLA identifier (PVID). The PVID is
removed from each frame at each network
egress port.
In the provider bridge mode:
A provider bridge tag carrying a customer
identifier (CID) is inserted into each Ethernet
frame in the ingress direction, and removed
from the frame in the reverse direction.
Frames that are already tagged become double
tagged.
o tagging or untagging operations are
performed.
LAN unitLAN unit “Ethernet over SDH”
LAN TransLANTM network
LAN port (“network role”)
Router
LAN unitLAN unit
Forbidden acc. to STP
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet port provisioning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-23
Customer-role port Network-role port
The spanning tree protocol (STP) is not
supported.
The spanning tree protocol (STP) can be
enabled (default setting) or disabled.
GVRP is not supported.
VLA IDs or CIDs need to be configured
manually.
GVRP can be enabled (default setting) or
disabled.
Dynamic VLA IDs or CIDs of intermediate
and access nodes are automatically configured
if GVRP is enabled.
Ingress rate control exists at “UI” and
“E-I” ports only.
There is no rate control on “I-I” ports.
The traffic class encoded in the p1 and p2 bits
of the incoming frames is evaluated and
transparently passed through.
Fix port-role assignment in the VPN tagging modes
In all the operational modes relying on the VP tagging mode the port role is fixed:
• LA ports are always customer role ports.
• WA ports are always network role ports.
This port-role assignment in the VP tagging modes cannot be changed. Corresponding
provisioning options that might be available on the graphical user interfaces of the
management systems do not apply to the VP tagging modes and are blocked.
Repeater mode
In the repeater mode, there is no necessity to distinguish between customer-role and
network-role ports, because the repeater mode can only be used in point-to-point
configurations, and there is:
• no tagging mechanism,
• no spanning tree, and
• no GVRP or STVRP.
In the repeater mode, there is simply a LA port and a WA port. The LA port
provides the connection to the end-customer LA, and the WA port provides the
connection to the SDH transport network.
Example
As an example, the following figure shows a possible network application:
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet port provisioning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-24 365-312-877R7.2Issue 4 November 2009
Legend:
UI port User-etwork-Interface (always a customer-role port)
I-I port Internal etwork-etwork Interface (always a network-role port)
E-I port External etwork-etwork Interface (here a trunking network-role port)
TransLAN
EPL
Trunk routerTrunk router
Tagging Area
Protocol Area
DiffServ Area
UNI
UNI
UNI
E-NNII-NNI I-NNI
I-NNI I-NNI
I-NNI
Customer-role port
Network-role port
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet port provisioning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-25
Auto negotiation and flow control
What is auto negotiation?
Auto negotiation enables IEEE 802.3 compliant devices with different technologies to
communicate their enhanced mode of operation to interoperate and to take maximum
advantage of their abilities.
Once each peer is aware of its link partners abilities, auto negotiation enables the
determination of the following capabilities:
• Transmission speed.
Two nodes with auto negotiation will use the highest transmission speed available to
both nodes.
• Full duplex or half duplex.
Two nodes with auto negotiation will use full duplex communication if there are only
two stations in the collision domain. Otherwise, they will use half duplex
communication.
The Gigabit Ethernet interfaces always operate in full duplex mode.
• Flow control on or off
If the autonegotiation has established a full duplex connection, it is possible to use
flow control, if both stations have that capability.
Auto negotiation rules
For auto negotiation, the following rules apply:
• The highest speed available to both nodes is chosen.
• Full duplex will be used, if possible.
• E/FE nodes will fall back to 10 Mbps and half duplex, if a node does not understand
auto negotiation.
Auto negotiation illustrations
In the following network configuration, the hub, the router, PC 1 and PC 2 can handle
100 Mbps. All the nodes (PCs, hub and router) are part of the same collision domain, so
all the connections have to be half duplex.
Traffic provisioning concepts Ethernet traffic provisioning conceptsAuto negotiation and flow control
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-26 365-312-877R7.2Issue 4 November 2009
The following network configuration has a switch instead of a hub. This separates the
collision domains, and enables full duplex communication.
What is flow control?
The purpose of flow control is to prevent loss of frames. Flow control on a LA port is
the ability of this port to request its peer to temporarily stop sending traffic (pause
operation). Pause operation is only meaningful for strict point-to-point connections (one
LA port, one WA port), operating in full duplex mode.
The Ethernet MAC sublayer is required to perform two main functions: Data
Encapsulation and Media Access Management. To perform these functions, First-in,
First-out (FIFO) queues are used to store frame data. In an ideal world, there would be no
data loss due to limitations in network performance or FIFO sizing. In the real world, data
is lost without a mechanism to limit frame transmission. Data is lost when packet data is
received faster than it is transmitted, resulting in filling of the FIFOs. MAC devices either
overwrite data in the FIFOs (loss of oldest data) or stop writing to the FIFOs (loss of
newest data).
RouterHub
PC 1
PC 2
Auto negotiation
100 Mbps
half duplex
Auto negotiation
100 Mbps
half duplex
Auto negotiation
100 Mbps
half duplex
Switch Router
Auto negotiation
100 Mbps
full duplex
PC 1
PC 2
Auto negotiation
100 Mbps
full duplex
Auto negotiation
100 Mbps
full duplex
Traffic provisioning concepts Ethernet traffic provisioning conceptsAuto negotiation and flow control
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-27
To avoid this data loss, MAC devices must slow down the receive-data stream until the
transmit stream has caught up. Flow control is the methodology used to throttle the
receive data stream to keep from completely filling the FIFOs. This has created an
industry challenge to balance the amount of throughput loss due to flow control versus the
amount of data loss without flow control.
Flow control mechanism
IEEE 802.3 specifies that flow control must only be implemented for full duplex
operation.
The IEEE 802.3 flow control mechanism is accomplished within the MAC control
sublayer. The FIFO begins to fill as frames are received. Once the FIFO has reached a
pre-programmed threshold, the MAC Control sublayer signals an internal state machine
to transmit a “PAUSE” frame. This signal informs the link partner to halt transmission for
a specified length of time, referred to as “X off”. The MAC continues to transmit
“PAUSE” frames with the programmed idle time as long as the threshold has been
exceeded. If the FIFO level falls below the threshold prior to the expiration of this time,
another “PAUSE” frame is sent with a zero time specified to re-enable transmission,
referred to as “X on”.
Traffic provisioning concepts Ethernet traffic provisioning conceptsAuto negotiation and flow control
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-28 365-312-877R7.2Issue 4 November 2009
Quality of service (QoS) overview
Introduction
Quality of service (QoS) control allows to differentiate between Ethernet frames with
different priorities. If traffic with a high priority and traffic with a low priority compete
for SDH capacity, the traffic with the high priority should be served first. This can be
realized through quality of service control.
QoS control is supported on the E/FE and Gigabit Ethernet cards, in the IEEE 802.1Q
VLA tagging mode and the IEEE 802.1ad VLA tagging mode (provider bridge mode).
QoS control is implemented as a DiffServ architecture applied to layer 2 (in accordance
with IETF recommendations on differentiated services, cf. www.ietf.org).
Quality of service configuration options
Information on the TransLA® QoS provisioning options depending on the configured
mode of operation is provided in the following table:
Mode of operation Ethertype QoS CQS Oversubscription
mode
Ingress rate control HoL blocking
prevention
Repeater mode – [disabled] [disabled] [none] [disabled]
VP
mode
LA
interconnect
[0xFFFF] [disabled] [disabled] [none] [disabled]
LA-VP 1 [0xFFFF] [disabled] [enabled] strict policing [enabled]
oversubscription
LA-VP with
QoS
2
[0xFFFF] [enabled] [enabled] none [enabled]
strict policing
oversubscription
STP virtual switch mode
compliant with
IEEE 802.1Q
(IEEE 802.1Q single
tagging mode)
0x8100 [enabled] [disabled] none [enabled]
strict policing
STP virtual switch mode
compliant with
IEEE 802.1ad (Provider
bridge mode)
0x0601 …
0xFFFF
(≠ 0x8100)
disabled
1
[enabled] strict policing [enabled]
oversubscription
enabled
2
[enabled] none [enabled]
strict policing
oversubscription
Traffic provisioning concepts Ethernet traffic provisioning conceptsQuality of service (QoS) overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-29
Notes:
1. Entries in square brackets indicate an implicit selection. If in the “QoS CQS” column for example the entry
is “[disabled]”, then the preceding selection of tagging and operation mode implies that quality of service –
priority classification, queueing and scheduling (QoS CQS) is not available. It is implicitly disabled, and
cannot be enabled.
2. The numbers in curly braces indicate equivalent modes of operation.
3. The Ethertype can be set per virtual switch. However, as all virtual switches of a TransLA® card are
switched in common, it is effectively set per TransLA® card.
4. The distinction between the STP virtual switch mode compliant with IEEE 802.1Q and the STP virtual
switch mode compliant with IEEE 802.1ad (provider bridge mode) can be realized by provisioning the
Ethertype. When the provider bridge mode has been selected (Ethertype provisioned in the range 0x0600 …
0xFFFF, but unequal to 0x8100), then a further distinction can be made by enabling or disabling quality of
service – priority classification, queueing and scheduling (QoS CQS).
5. If “HoL blocking prevention” is enabled then frames that are destined for an uncongested port will not be
discarded as a result of head-of-line blocking.
Ingress rate control provisioning method
Ingress rate control can only be provisioned per port.
Service level agreements
On the 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS the
responsibility for admission control is left to the operator. This means there is no check
that the Service Level Agreements on already existing connections can be fulfilled, when
a new user starts sending data from node A to B.
In this respect the notion of over-subscription factor is important. This is the factor by
which the calculated bandwidth, based on (for example) the traffic matrices of the
operators sharing a link, exceeds the physically available bandwidth. Although
theoretically the bandwidth can only be guaranteed for an over-subscription factor ≤ 1, in
practice an over-subscription factor of 5-10 can be used without giving problems. Due to
the effects of statistical multiplexing it is safe to “sell the bandwidth more than once”. The
burstiness of the traffic from individual customers that share a common link makes this
possible. The service level agreements give a quantification for the “statistics” of the
multiplexing.
Provisioning LAN and WAN ports details
The provisioning of the classifier and rate controller per flow is done only on the ingress
customer-role port (LA port). On the network ports (WA port), only the scheduler for
the egress queues is provisionable.
Traffic provisioning concepts Ethernet traffic provisioning conceptsQuality of service (QoS) overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-30 365-312-877R7.2Issue 4 November 2009
It is important that some of the QoS settings are provisioned consistently on all ports
throughout the whole customer's VP domain. In the LA-VP (M-LA) operation
mode, the rate controller mode (none, strict policing, oversubscription) must be
provisioned consistently (per virtual switch). The latter applies to the only. For the
scheduler, for each egress queue the mode = strict_priority/weighted_bandwidth and
corresponding weights (per virtual switch) must be provisioned consistently. This is
ensured by a background aging function of the system. The parameter will be enforced to
be set equally.
Traffic provisioning concepts Ethernet traffic provisioning conceptsQuality of service (QoS) overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
11-31
Ethernet performance monitoring
Performance counters
On the VC-12, VC-3, or VC-4 termination points connected to a WA port, standard
SDH performance monitoring can be activated. The same counters that apply for VC-12,
VC-3, or VC-4 termination points on any other port also apply to the VC-12, VC-3, or
VC-4 termination points on a WA port.
Apart from this standard SDH performance monitoring, a limited amount of counters that
are dedicated to LA/WA ports are defined. Activation of these counters can be
established by setting:
• the LA/WA port mode to monitored
• selecting a LA port or WA port as active PM point
• setting the PM point type to LA or WA.
The supported counters are:
• CbS (total number of bytes sent)
• CbR (total number of bytes received)
• pDe (total number of errored packets dropped)
ote that CbS and CbR are rather traffic monitoring counters than performance
monitoring counters, as they give insight in the traffic load in all places in the network.
pDe is a real performance monitoring counter as it gives an indication about the
performance of the network. Only unidirectional PM is supported for these parameters.
See the following figure for the location of the measurements. ote that because of the
difference in units, bytes versus packets, the counters cannot be correlated with each
other. Also the counter for dropped packets considers only packets dropped due to errors,
and does not include packets dropped due to congestion.
CBS
CBR
PDE
PDE
CBS
CBR
Layer-2switchingfunction
EthernetSDH/SONET
WANLANportport
Traffic provisioning concepts Ethernet traffic provisioning conceptsEthernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
11-32 365-312-877R7.2Issue 4 November 2009
12 12Traffic provisioning tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to traffic
provisioning.
Contents
Provisioning of cross-connections 12-2
To view cross-connections 12-2
To add an uncorrelated cross-connection 12-5
To convert a cross-connection 12-7
To delete a cross-connection 12-8
Provisioning of MSP protection groups 12-9
To view a list of MSP protection groups 12-9
To add an MSP protection group 12-11
To modify an MSP protection group 12-13
To delete an MSP protection group 12-14
To operate an MSP protection switch 12-15
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-1
Provisioning of cross-connections
To view cross-connections
When to use
Use this task to view a list of cross-connections on the selected E.
There are two methods for this task.
Related information
See also:
• “Cross-connections” (p. 11-4)
Task, method 1: from the Network Elements page
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Cross-connections.
4. In the Function field, select Retrieve/Set Cross-connections.
5. Click Go.
Result:The Search for Cross Connections page is displayed.
...................................................................................................................................................................................................
3 Select the filter criteria, then click Search.
Result:The Cross Connections page is displayed. It includes a list of
cross-connections.
Traffic provisioning tasks Provisioning of cross-connectionsTo view cross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-2 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Task, method 2: using the Protection Groups function
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Connections→ Cross Connections.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Network Element→ CrossConnections.
Result:The Cross Connections page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search. The
following sections describe the fields on this page when a Cross Connection type of
All or Correlated is selected.
1. In the Cross Connection type field, select All or Correlated.
2. In the NE type field, select a type of E (if not already present).
3. In the NE name field, select the name of an E (if not already present).
4. In the Cross Connection rate field, select the appropriate cross-connection rates forthe E type from drop-down menu
5. In the Slot field, select from a list of all slots on that shelf that have ports which canbe cross-connected at the selected rate from the drop-down menu (optional).
6. In the Port field, select from a list of all ports on that slot that can be cross-connectedat the selected rate or that contain ports that can be cross-connected at the selected
rate from the drop-down menu (optional).
7. In the Contained port field, when a port has been selected, select from the list ofcontained ports that have cross-connections at the selected rate from the drop-down
menu (optional).
8. In the Cross Connection shape field, select the shape of the cross-connection.Values depend on the selected E type (optional).
9. In the Cross Connection label field, select the name applied to thecross-connection. This name is the name of the connection of which the is a part if the
cross-connection is correlated (optional).
10. In the Fixed Cross Connections field, select Include or Exclude.The fielddetermines if fixed cross-connections are included or excluded from the search
results. A fixed cross-connection is a cross-connection created by default for an E,
by either the E or OMS, which cannot be created or deleted by a user.
Traffic provisioning tasks Provisioning of cross-connectionsTo view cross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-3
Complete the following steps to begin to specify the criteria for your search. The
following sections describe the fields on this page when a Cross Connection type of
Uncorrelated is selected.
1. In the Cross Connection type field, select Uncorrelated.
2. In the NE type field, select a type of E (optional).
3. In the NE name field, select the name of an E (optional).
4. In the Cross Connection rate field, select the appropriate cross-connection rates forthe E type from drop-down menu
5. In the Event date and time field, enter the start and end date and time of the searchrange, or use the calendar hyperlink to make selections (optional).
6. In the Cross Connection shape field, select the shape of the cross-connection.Values depend on the selected E type (optional).
7. In the Cross Connection label field, select the name applied to thecross-connection. This name is the name of the connection of which the
cross-connection is a part if the cross connection is correlated (optional).
8. In the Fixed Cross Connections field, select Include or Exclude.The fielddetermines if fixed cross-connections are included or excluded from the search
results. A fixed cross-connection is a cross connection created by default for an E,
by either the E or OMS, which cannot be created or deleted by a user.
Click Search
Result:The Protection Groups page is populated with a list of protection groups in
the E that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of cross-connectionsTo view cross-connections
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-4 365-312-877R7.2Issue 4 November 2009
To add an uncorrelated cross-connection
When to use
Use this task to add an uncorrelated cross-connection for an E.
Important! In the standard way of operation, it is not necessary and not
recommended to add cross-connections separately in the network elements. OMS
creates the necessary cross-connections automatically with the implementation of
network connections.
Related information
See also:
• “Cross-connections” (p. 11-4)
Task
...................................................................................................................................................................................................
1 View a list of cross-connections using the task “To view cross-connections” (p. 12-2), “To
view cross-connections” (p. 12-2).
Result:The Cross-connections page is displayed. It includes a list of
cross-connections for the selected E.
...................................................................................................................................................................................................
2 Click the New tool in the Search for Cross Connections area.
Result:The Create Cross Connection page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• NE type – select the E type for which you want to create a cross-connection fromthe list. This field is mandatory.
• NE Name/Find Button – select the name of the E from the list or enter a searchstring in the field. The first item in the list that matches the search string is
highlighted. If the item that matches the search string is not displayed in the list, click
Find to try and locate a match. If no match is found, either enter or select another Ename. This field is mandatory.
• Cross-connection rate – Mandatory: This field is populated after you select the Ename. If you want to change the default value, select the new cross-connection rate
from the list menu. Possible values are: VC-4, LO-VC-3, and VC-12.
Traffic provisioning tasks Provisioning of cross-connectionsTo add an uncorrelated cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-5
• Cross-connection shape – Mandatory: This field is populated after you select theE name. A default value is populated after you select an E name. A diagram of the
default cross-connection shape is displayed below this field. If you want to change the
default value, select the desired shape of the cross-connection. Values depend on the
selected E type.
• Cross connection label – Optional: Enter the cross-connection label.
• From port ID1 – Either use the hyperlink to access the Cross Connection PortSelection List window, select all desired port IDs, and click OK, or use the Fromport ID1 field. This updates the Port ID fields.
• From port ID2 – This field appears based on cross-connection shape. Either use thehyperlink to access the Cross Connection Port Selection List window, select alldesired port IDs, and click OK, or use the To port ID2 field. This updates the Port IDfields.
• From port ID1 BLSR node – Either use the hyperlink to access Search for NEs toSelect window, select a network element, and click OK, or use the From port ID1BLSR node field. This updates the From port ID1 BLSR node field.
• From port ID2 BLSR node – This field appears based on cross-connection shape.Either use the hyperlink to access Search for NEs to Select window, select anetwork element, and click OK, or use the From port ID2 BLSR node field. Thisupdates the From port ID2 BLSR node field.
• To port ID1 – Either use the hyperlink to access the Cross Connection PortSelection List window, select all desired port IDs, and click OK, or use the To portID1 field. This updates the Port ID fields.
• To port ID2 – This field appears based on cross-connection shape. Either use thehyperlink to access the Cross Connection Port Selection List window, select alldesired port IDs and click OK, or use the To port ID2 field. This updates the Port IDfields.
• To port ID1 BLSR node – Either use the hyperlink to access the Search for NEs toSelect window, select a network element, and click OK, or use the To port ID1BLSR node field. This updates the To port ID1 BLSR node field.
• To port ID2 BLSR node – This field appears based on cross-connection shape.Either use the hyperlink to access the Search for NEs to Select window, select anetwork element, and click OK, or use the To port ID2 BLSR node field. Thisupdates the To port ID2 BLSR node field.
...................................................................................................................................................................................................
4 Click Submit.
Result:The cross-connection is added.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of cross-connectionsTo add an uncorrelated cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-6 365-312-877R7.2Issue 4 November 2009
To convert a cross-connection
When to use
Use this task to convert a protected cross-cconnection to be unprotected, or to convert an
unprotected cross-connection to be protected.
Related information
See also:
• “Cross-connections” (p. 11-4)
Task
...................................................................................................................................................................................................
1 View a list of cross-connections using the task “To view cross-connections” (p. 12-2), “To
view cross-connections” (p. 12-2).
Result:The Cross-connections page is displayed. It includes a list of
cross-connections for the selected E.
...................................................................................................................................................................................................
2 Click the radio button next to the cross-connection you wish to delete. From the Go
menu, select Convert Cross Connection and click Go.
Result:The Convert Cross Connection page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Cross Connection Port to Remove – select the port ID you wish to delete the leg.
• From port ID2 – Use the hyperlink to access the Cross Connection PortSelection List pop-up screen and select all desired port IDs and click OK, or enterthe To port ID2 field. This updates the Port ID fields.
• From port ID2 BLSR node – Use the hyperlink to access Search for Es to Selectpop-up screen and select a network element and click OK, or enter the From portID2 BLSR node field. This updates the From port ID2 BLSR node field.
• Cross Connection label – change the name applied to the cross-connection(optional)
...................................................................................................................................................................................................
4 Click Submit.
Result:The cross-connection is converted
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of cross-connectionsTo convert a cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-7
To delete a cross-connection
When to use
Use this task to delete a cross-connection for an E.
Important! In the standard way of operation it is not necessary and not recommended
to delete cross-connections separately in the network elements. OMS deletes the
cross-connections automatically with the deletion of network connections.
Related information
See also:
• “Cross-connections” (p. 11-4)
NOTICE
Service-disruption hazard
Deletion of a cross-connection may be traffic affecting.
Before starting to delete a cross-connection, ensure that it is not in use. The traffic
provided on the respective path must have previously been removed (for example rerouted
to another path) before deleting any of the cross-connections included in that path.
Task
...................................................................................................................................................................................................
1 View a list of cross-connections, using the task “To view cross-connections” (p. 12-2),
“To view cross-connections” (p. 12-2).
Result:The list at the bottom of the Cross-connections page is populated with a list
of cross-connections that meet your search criteria.
...................................................................................................................................................................................................
2 Click the radio button next to the cross-connection you wish to delete. From the Go
menu, select Delete and click Go.
Result:The cross-connection is deleted.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of cross-connectionsTo delete a cross-connection
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-8 365-312-877R7.2Issue 4 November 2009
Provisioning of MSP protection groups
To view a list of MSP protection groups
When to use
Use this task to view a list of multiplex section protection (MSP) groups.
There are two methods for this task. ote that the options available on the opened MSP
Protection Groups page following method 1 are slightly different from the options
available on the Protection Groups page opened using method 2.
Related information
See also:
• “Multiplex section protection (MSP)” (p. 11-10)
Task, method 1: using the NE Management Functions option
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ NE ManagementFunctions.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Session→ NE ManagementFunctions.
Result:The NE Management Functions page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of the target E (if not already present).
3. In the Category field, select Protection Groups.
4. In the Function field, select Retrieve/Set MSP Protection.
5. Click Go.
Result:The MSP Protection Groups page is displayed. It includes a list of MSP
protection groups on the E.
Traffic provisioning tasks Provisioning of MSP protection groupsOverview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-9
E N D O F S T E P S...................................................................................................................................................................................................
Task, method 2: using the Protection Groups function
...................................................................................................................................................................................................
1 Do one of the following:
• Use the object links to follow this path: Network Elements→ ProtectionGroups.
• On the etwork Map, right-click the E upon which you wish to execute a
management function. From the Node menu, select Network Element→ Protection Groups.
Result:The Protection Groups page is displayed.
...................................................................................................................................................................................................
2 Complete the following steps to begin to specify the criteria for your search.
1. In the NE type field, select a type of E (if not already present).
2. In the NE name field, select the name of an E (if not already present).
3. In the Protection group name field, type the protection group name (optional).
4. In the Protection group type field, select 1+1 MSP.
5. In the Rate field, select the port rate (optional).
Click Search
Result:The Protection Groups page is populated with a list of protection groups in
the E that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of MSP protection groupsTo view a list of MSP protection groups
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-10 365-312-877R7.2Issue 4 November 2009
To add an MSP protection group
When to use
Use this task to add a multiplex section protection (MSP) protection group in an E. To
prepare a fully functional protected multiplex section, a matching MSP protection group
has to be established in the E on the opposite end of the multiplex section as well. After
the MSP protection groups have been set up on both sides, the protected multiplex section
can be added as a network connection.
Related information
See also:
• “Multiplex section protection (MSP)” (p. 11-10)
Task
...................................................................................................................................................................................................
1 View a list of MSP protection groups on an E using the task “To view a list of MSP
protection groups” (p. 12-9), “Task, method 1: using the E Management Functions
option” (p. 12-9).
Result:The MSP Protection Groups page is displayed. It includes a list of MSP
protection groups on the E.
...................................................................................................................................................................................................
2 In the toolbar, click the New tool.
Result:The MSP Protection Group Details page is displayed.
...................................................................................................................................................................................................
3 Change the entries or selections for any modifiable fields that you wish to update.
• Working Section – from the list of ports, select the port designated for the workersection of the 1+1 MSP.
• Protection Section – from the list of ports, select the port designated for theprotection section of the 1+1 MSP.
• MSP mode – select the mode of operation. Possible values are ETSI (complies withETSI standard ETS 300 746, and ITU-T recommendation. G.841, G.783) or 1+1
Optimised (complies with TT specification, and G.841, G.783).
For 1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS , select
ETSI.
• Communication mode – select the method of message communication forprotection switching. Possible values are unidirectional or bidirectional, where
bidirectional is the usual selection.
This field is only displayed ifMSP mode is set to ETSI.
Traffic provisioning tasks Provisioning of MSP protection groupsTo add an MSP protection group
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-11
• Switch mode – select the mode of protection switching associated with theprotection group. Possible values are:
– on Revertive: when a protection switch occurs, the traffic will not revert back to
the failed resource on recovery.
– Revertive: when a protection switch occurs and the failed resource recovers, the
traffic will switch back, but only after the wait to restore period has expired.
This field is only displayed ifMSP mode is set to ETSI.
• Wait to restore time (minutes) – select an amount of time, in minutes, for thewait-to-restore timer to run. Possible values are 0 min. to 60 min. A newly
provisioned value of the wait-to-restore time does not take effect until any current
time has expired. This field is only displayed ifMSP mode is ETSI and switch mode is
revertive.
The wait to restore time applies in cases of revertive switching. When the VCs are
selected from the protection MS due to a fail or degrade condition on the working
MS, and the condition clears, the wait-to-restore timer is started. When the timer
expires, the selector is switched back to the preferred working state.
• Wait to rename time (minutes) – select an amount of time, in minutes, for thewait-to-rename timer to run. Possible values are 0 min. to 60 min. A newly
provisioned value of the wait-to-rename time does not take effect until any current
time has expired. This field is only displayed ifMSP mode is 1+1 Optimised.
The wait-to-rename time applies in cases when the APS channel is transmitted on
both working and primary sections, and at the receive side selected from the working
or protection section. The section from which the APS is selected is referred to as
secondary.“secondary” The other section is referred to as “primary”. If the VCs are
selected from the secondary MS, and the fail or degrade condition on the primary MS
clears, then the wait-to-rename timer is started. When the timer expires, the secondary
MS is renamed to “primary” and the primary MS is renamed to “secondary”.
• SONET interworking – select the option to provision interworking with SOETequipment which provides MSP. Possible values are:
– Enabled : a SOET network element using MSP can be connected to the far end
of the selected MSP pair.
– Disabled: a SOET network element using MSP cannot be connected to the far
end of the selected MSP pair.
This field is only displayed if the MSP mode is set to ETSI, communication mode is
Unidirectional, and switch mode is on-revertive.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MSP Protection Group Details page, and the MSP protection group
is added.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of MSP protection groupsTo add an MSP protection group
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-12 365-312-877R7.2Issue 4 November 2009
To modify an MSP protection group
When to use
Use this task to modify a multiplex section protection (MSP) protection group.
Related information
See also:
• “Multiplex section protection (MSP)” (p. 11-10)
Task
...................................................................................................................................................................................................
1 View a list of MSP protection groups using the task “To view a list of MSP protection
groups” (p. 12-9).
Result:The MSP Protection Groups page is displayed. It includes a list of MSP
protection groups on the E.
...................................................................................................................................................................................................
2 Click the radio button next to the MSP protection group you wish to modify. From the Go
menu, select Modify and click Go.
Result:The Modify an MSP Protection Group page is displayed.
...................................................................................................................................................................................................
3 If the MSP protection group has a switch mode of revertive, theWait to restore time
(minutes) or theWait to rename time (minutes) field is present, and you may
modify the setting of this field.
...................................................................................................................................................................................................
4 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MSP Protection Group Details page, and the MSP protection group
is modified.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of MSP protection groupsTo modify an MSP protection group
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-13
To delete an MSP protection group
When to use
Use this task to delete a multiplex section protection (MSP) protection group.
Related information
See also:
• “Multiplex section protection (MSP)” (p. 11-10)
Task
...................................................................................................................................................................................................
1 View a list of MSP protection groups using the task “To view a list of MSP protection
groups” (p. 12-9).
Result:The MSP Protection Groups page is displayed. It includes a list of MSP
protection groups on the E.
...................................................................................................................................................................................................
2 NOTICE
Service-disruption hazard
Deletion of a protection could cause a traffic interruption.
Click the radio button next to the MSP protection group you wish to delete. From the Go
menu, select Delete and click Go.
Result:A confirmation window is displayed asking you to confirm the deletion.
...................................................................................................................................................................................................
3 Click Yes.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MSP Protection Groups page, and the MSP protection group is
deleted.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of MSP protection groupsTo delete an MSP protection group
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
12-14 365-312-877R7.2Issue 4 November 2009
To operate an MSP protection switch
When to use
Use this task to execute a protection switch (manual to working).
Related information
See also:
• “Multiplex section protection (MSP)” (p. 11-10)
Task
...................................................................................................................................................................................................
1 View a list of MSP protection groups using the task “To view a list of MSP protection
groups” (p. 12-9).
Result:The MSP Protection Groups page is displayed. It includes a list of MSP
protection groups on the E.
...................................................................................................................................................................................................
2 NOTICE
Service-disruption hazard
A forced switch to a faulty section or lockout of protection could cause a traffic
interruption.
Perform a forced switch only to a section which is working fault-free.
Click the radio button next to the MSP protection group for which you wish to execute a
protection switch. From the Go menu, select the appropriate action and click Go. For
more information see “MSP protection switch states and protection switch requests”
(p. 11-12).
Result:A confirmation window is displayed asking you to confirm the protection
switch.
...................................................................................................................................................................................................
3 Click Yes.
Result:A progress indication followed by a confirmation is issued in the Message
section of the MSP Protection Groups page, and the protection switch is executed.
E N D O F S T E P S...................................................................................................................................................................................................
Traffic provisioning tasks Provisioning of MSP protection groupsTo operate an MSP protection switch
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
12-15
13 13Traffic maintenance
concepts
Overview
Purpose
This chapter presents concept information related to traffic maintenance on 1643 Access
Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using OMS.
Contents
Port types 13-2
Trail termination points (TTP) 13-5
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
13-1
Port types
Definition of port
A port is a connectable point that can terminate a physical or logical network connection.
There are two types of ports:
• A physical port is a physical connection point. Transmission lines attach to physical
ports.
• A logical port is a logical connection point within a physical connection point. At the
logical port the overhead bytes are terminated: in the transmit direction overhead
bytes are added, in the receive direction overhead bytes are extracted. Therefore
logical ports are also called termination points. Logical ports are contained within
physical ports. Logical ports can contain other logical ports.
An example for the principle definition of physical and logical ports is shown in the
following figure:
Add and delete ports
Ports are automatically created in the management system when an E is added to the
management system or when a circuit pack is installed. Upon addition to the management
system the port parameters are available for provisioning.
For logical ports, only the ones that exist on the E and also have associated port
parameters are supported in the management system. For the majority Es, logical ports
are supported only when they are involved in cross-connections.
Ports are automatically deleted from the management system when an E is deleted from
the management system or when a circuit pack is removed.
Supported ports
All ports that carry port parameters are supported by the management system. These ports
include physical ports or logical ports. For logical ports, typically the ports only carry
parameters after being involved in a cross-connection. However, there are cases in which
logical ports have parameters even when they are not used in a cross-connection.
Termination ofOverhead Bytes
TU-122 Mbps
physical logical
Traffic maintenance concepts Port types
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
13-2 365-312-877R7.2Issue 4 November 2009
Port names
The name of the physical ports consists of two parts separated by a dot. The first part is
related to the slot name, the second part is the port number within that slot.
Example: LP2.1, TP1.3
The name of the logical ports consists of the physical port name followed by the AU-4
number and for low order signals, the VC number (VC-12 or VC-3). The VC number
consists of:
• The number of the TUG-3 inside the VC-4
• The number of the TUG-2 inside the TUG-3
• The TU-12 number inside the TUG-2
Port ID formats
The management system supports two port ID formats and the ability to control which
format is used:
• ative ame: This format is the default setting.
• ITU-T G.707 Format: This format applies to certain logical ports.
The management system allows the user to select which format is used for port names
throughout the management system. This is controlled on the Preferences page.
The management system also allows the user to select which format is used for port
names on specific pages. This is controlled by a toggle button on the Add Connection,
Graphical Layout, and Ports pages.
TP1.1,1.112
112
TUG-3TUG-2TU-12
VC-12:
100
TUG-3
VC-3:
SlotPort
AU-4 numberVC-12 (or VC-3) number
Traffic maintenance concepts Port types
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
13-3
The two states of the Port ID Format button are shown in the following table:
Button state Port ID format
ative name
ITU-T G.707
Test loops
An incoming test loop (inloop) can be set on the 1.5 Mbps, 2 Mbps, 34 Mbps, and 45
Mbps ports. The input signal is directly routed back to its corresponding output without
altering the signal format. This loop can be used to test the connectors. Only one inloop
can be set at the same time.
An outgoing test loop (outloop) can be set on the 1.5 Mbps, 2 Mbps, 34 Mbps, and 45
Mbps ports. The output signal is directly routed back to its corresponding input without
altering the signal format. This loop can be used to test how the signal passes through the
system.
If a test loop is enabled, the abnormal state is activated. After disabling the test loop the
cross-connections that existed before setting the test loop are restored.
Test loops for physical ports of tributary port units are shown in the following figure:
Cross-Connect Physical Port
Inloop
Cross-Connect Physical Port
Outloop
Traffic maintenance concepts Port types
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
13-4 365-312-877R7.2Issue 4 November 2009
Trail termination points (TTP)
Introduction
In trail termination points (TTP), the path overhead bytes of a VC-4, VC-3, or VC-12
signal are terminated (added or removed). In the AU-4, TU-3, and TU-12 termination
points, the path overhead is not terminated, but can be monitored.
The following information can be retrieved from the path overhead:
• Trail trace identifier (TTI), used for path trace
• Signal label, indicating what type of signal is carried
• Error checking information, a threshold can be set to determine in case of how many
errors a signal is declared degraded
Alarms
When a termination point is set to monitored alarms related to this termination point are
reported.
A termination point is set to not monitored (alarms are not reported) when it is not used.
Path trace
To check whether a path is correctly provisioned a path trace can be set. A label (for
example a word) is sent along the path from one termination point to the other. This label
is called trail trace identifier (TTI). If the TTI is a specific string, this string is called
access point identifier (API). If the expected API equals the accepted API, the
transmission path is well provisioned.
In the path overhead of a VC-4/VC-3 signal, byte J1 in the regenerator section is used to
the TTI. For a VC-12 signal, byte J2 is used. A 16 byte frame is formed of which one byte
is used for error detection. Therefore the string that can be inserted in these bytes has a
maximum length of 15 characters (or 30 hexadecimal digits).
The principle of path trace on termination points is shown in the following figure:
Traffic maintenance concepts Trail termination points (TTP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
13-5
TIM detection
If the trace identifier mismatch (TIM) detection is enabled, traffic will be lost when a
mistake in the trace string is detected. Upon mismatch, an alarm indication signal (AIS) is
inserted in the downstream signal and a remote defect indicator (RDI) is inserted in the
upstream signal (RDI is only inserted when the directionality is set to bidirectional).
Signal label
The signal label contains information about the signal that is part of the VC. The signal
label indicates whether the VC is unequipped, whether it is a structured signal, which type
of mapping is used or whether it is an alarm indication signal (AIS).
Signal degrade thresholds
The signal degrade threshold can be set for the multiplex section (MS), , VC-12, VC-3,
and VC-4 levels. The signal degrade threshold determines when a signal is considered
degraded. Two parameters can be set:
• umber of errored blocks per second
• umber of adjacent bad seconds
The signal is considered degraded, when during the defined number of bad seconds the
signal contains more than the defined errored blocks per second. This causes an alarm
STM-n moderate block error rate (n is 1, or 4) or VC-n moderate block error rate (n is 12,
3, or 4).
NE D NE B
NE A
NE C
Termination Pointin NE B
Access PointIdentifierAccepted
Access PointIdentifierTransmit
Termination Pointin NE D
Access Point Identifier Accepted = Access Point Identifier Transmit Path is correct
Traffic maintenance concepts Trail termination points (TTP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
13-6 365-312-877R7.2Issue 4 November 2009
On VC-12, VC-3, and VC-4 level the signal degrade threshold is also used as a switching
criterion for SC/ protection switching. If the signal is determined degraded an SC/
protection switch is performed. SC/ protection is described in “Subnetwork
connection protection (SCP)” (p. 11-8).
Traffic maintenance concepts Trail termination points (TTP)
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
13-7
14 14Performance monitoring
(PM) concepts
Overview
Purpose
This chapter presents concept information related to performance monitoring on 1643
Access Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using
OMS.
Contents
The performance monitoring process 14-2
Performance measurements 14-3
Available PM data 14-11
Thresholding 14-19
Ethernet performance monitoring 14-26
Configuration of the OMS 14-35
Data storage and recovery 14-36
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-1
The performance monitoring process
Process description
The performance monitoring process is a three-stage process:
Primary processing
Fundamental parameters are derived from errors detected in the transport signal,
classified into bit errors and defects, and accumulated over one-second periods.
Parameter processing
ear-end and far-end performance parameters are calculated based on the evaluation and
correlation of the fundamental parameters obtained during the primary processing.
Binning and reporting
In the binning and reporting phase, the performance parameters obtained during the
parameter processing are stored in accumulation registers (or “bins”) over 15-minutes and
24-hours observation periods.
For each performance monitoring point, 16 recent (or history) bins for 15-minutes
measurements and one recent bin for 24-hours measurements are stored in the E.
Performance monitoring (PM) concepts The performance monitoring process
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-2 365-312-877R7.2Issue 4 November 2009
Performance measurements
Introduction
In performance monitoring, the integrity of a signal is continuously verified as it is
carried along the fiber. The results of this measurement are analyzed, compared against
predefined acceptable maximum values of errors, stored and displayed on the OMS as
performance monitoring data. The acceptable maximum, or thresholds, must be defined
according to your maintenance policy and then configured on the OMS.
Performance measurements on the OMS can be done on several STM-n (n=1 to 64)
optical signal levels, various incoming SDH signal levels terminating in the unit, as well
as LA interconnections.
Performance monitoring points
The quality of the transmission in the network is measured at each termination points.
Within the SDH network, it is where signals are terminated.
AVC-12 is for example terminated at the PDH 2 Mbit/s physical interface. An STM-4
signal is terminated at its STM-4 line port unit. At the process of termination the
appropriate overhead bytes are terminated to provide information about the signal being
terminated. Selecting the appropriate TPs to be monitored during the configuration step
requires preparation and planning.
Prerequisite to be able to Monitor a TP
In order to monitor the performance of the network at a given termination point, two
prerequisites must be met:
1. The Counters must be enabled;
2. For more information please refer to the Traffic Maintenance chapter of this book, and
specifically to the Port Provisioning section.
Important! If a circuit pack, on which the port mode was set to Monitor is
plugged-out and then again plugged-in, the normal pluggable module recognition
process will start again. Then, when the module state comes to allowed, the port mode
is set to auto.
How to measure PM
The measurements use Even Bit Interleaved Parity (BIP) check which allows the system
to continuously monitor performance. This method looks at the content of the signal.
When a signal is being transmitted a BIP check is performed on each STM frame.
In this check, the amounts of “1” and “0” of the payload is calculated. If the result is an
even number, then a “0” is put in the B-Byte of the overhead of the next frame; if the
result is “1”, then a “1” is put in the B-Byte of the overhead of the next frame. At the
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-3
termination point, the BIP check is performed again on the payload of the received signal
and the outcome of this BIP check on the payload received is compared to the value at
transmission. If there is a discrepancy between the two readings, an error is concluded,
analyzed against the error threshold values, and reported for Performance Monitoring
provided that the counter was enabled.
The B-byte is situated in the overhead section (MSOH) of the STM signal. This is not to
be confused with the J0 byte of the overhead section(RSOH) used to verify the validity of
a transmission path.
Signal Integrity
The signal transmission integrity is indicated by bit errors in the interface signal. At each
layer, it is measured using a parity scheme built into the STM-n section overhead and VC
path overhead . Proactive maintenance events are called Threshold Crossing Alerts and
are typically raised when too many errored seconds are being detected. Parity violations
are counted to derive performance data in 15 minutes, and 24 hours measuring intervals,
called bins. It can be based on Cyclic Redundancy Check (CRC) errors , errors in the
Frame Alignment signal (frameword) or on line code violations.
Available PM Data: Measurement Parameters
When a termination points is set to monitored, the system tracks the transmission quality
using the BIP check. The even BIP check provides the means to check for errors that have
occurred in a frame, that is within a given 125 microseconds period. Instead of the total
absolute number of errors per second, the OMS uses the following standard digital
parameters.
• umber of Errored Second (ES),
• umber of Severely Errored Second (SES),
• umber of Background Block Errors (BBE),
• Duration of unavailable second/time (UAS/UAT).
Each of these measurement parameters are described in details in the upcoming topics.
The PM data is stored in one current and sixteen recent 15 minute registers, and one
current, one recent 24 hour registers. These registers are called bins .
Important! In case a STM-16 or STM-4 interface is set to AU4-4c mode, and the
optical signal is not synchronized to the system, BBE and ES Performance
Monitoring counters are incrementing even in case no errors are actually present in
the transmission path.
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-4 365-312-877R7.2Issue 4 November 2009
Near End / Far End Monitoring
The ear End is the local end to the user. The ear End performance parameter is the
data received by the network element at the incoming direction and forwarded to the
managing system. The Far End is the remote end to the user.
In certain applications, it may be desirable to provide performance monitoring data
related to both directions of transmission (transmitted/received) from a single end. The
received data can be relayed back from the Far End to the ear End if there is a
bidirectionnal connection between the nodes. End-to-end bidirectional monitoring
processes consist of two termination points (TPs): one at the local side and one at the
remote side.
The table below identifies where the BIP check is performed during monitoring.
TTP Description
ear End The BIP is calculated on the received signal and compared with the B or
V5 byte (VC-12).
B is illustrated in the figure of section “Example of ear End/Far End
Forward/Backward Monitoring”
Far End The BIP is calculated on the sent signal, but at the remote end of the
transmission, and compared with the B or V5 byte (VC12).
B is illustrated in the figure of section “Example of ear End/Far End
Forward/Backward Monitoring”
In ear-End monitoring, the BIP check indicates the quality of the signal transmitted
from the remote side to the local side.
In Far-End monitoring, the B (illustrated in the figure of section “Example of ear
End/Far End Forward/Backward Monitoring”) values is compared with the BIP
calculation if an error is detected on the remote side. An REI is then transmitted upstream.
The received REI at the local side indicates the quality of the signal transmitted from the
local side to the remote side.
The following table provides an overview of the performance monitoring counter types
that can be configured for certain termination points:
Counter type MS RS SDHhigherorderpath
SDH lower order path PDH path
VC-4 VC-11 VC-12 VC-3 P12s
ear end
_ES X X X X X X X
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-5
Counter type MS RS SDHhigherorderpath
SDH lower order path PDH path
VC-4 VC-11 VC-12 VC-3 P12s
_SES X X X X X X X
_UAS X X X X X X X
_BBE X X X X X X X
Far end
F_ES – – X X X X –
F_SES – – X X X X –
F_UAS – – X X X X –
F_BBE – – X X X X –
Forward and Backward Monitoring
On Connection Termination Points (CTPs) the signal is non-intrusively monitored. This
kind of monitoring does not terminate the signal but only reads its REI value.
For CTP with a bidirectional path two types of measurements parameters are available:
Forward and Backward.
MeasurementParameters
Description
Forward The REI is read from the incoming signal. This will indicate the
quality of the end to end (TP to TP) path in the opposite direction.
Backward The REI is read from the incoming signal on the other side of the
E. This will indicate the quality of the end to end (TP to TP) path
in forward direction.
Example of Near End/Far End Forward/Backward Monitoring
The following graphic describes ear End/Far end Forward/Backward monitoring. The
termination point (TP) at network element-A is monitored on the receiving end, or ear
End where the B-bytes are verified for parity. If there is an error, an REI is sent upstream.
The TP at network element-B is monitored on its receiving end, and since it is distal from
E-A, it is referred to Far End.
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-6 365-312-877R7.2Issue 4 November 2009
Because the path is terminated in E-A and E-B these monitoring points are
termination points (TPs). In a TP the BIP value is recalculated and compared to the value
stored in the received B byte. If an error is detected an REI is sent to its originating source
and the error is declared as ear End PM data. The REI received will be declared as Far
End PM data.
In E-I the REI value is read and is declared as Backward or Forward PM data of the
Connection Termination Points. For example in CTP#A the Forward PM data consists of
the REI transmitted fromA to B (and so indicating the quality of the path in the direction
from B to A). The Backward PM data in CTP#A consists of REI transmitted from B to A
(and so indicating the quality of the path in the direction fromA to B).
Performance parameters
Performance parameters are identified and measured on a continuous basis. These
parameters are listed in this section. Thresholds are maximum tolerable values for those
parameters. The operator can set those thresholds above which the system generates
alarms. Thresholds can be turned on or off, per termination point, per binning period, and
performance parameters. These measurement parameters have a resolution of one second.
If the system is provisioned this way, then in the event that a measurement parameter
exceeds a user-set threshold, a Threshold Report (TR) is generated and the user will be
notified by an alarm. When in a following bin the performance parameter is equal to or
stays below the user-set threshold, a Reset Threshold Report (RTR) is generated and the
alarm is cleared. The latter is called the ’clear’ threshold.
Errored Block (EB)
A block is regarded as Errored Block (EB) if that block does have one or more errors.
This is determined by the comparing the outcome of the BIP check done before and after
transmission. The number of blocks per second depends on the signal itself. AVC-12
does have 2000 blocks/s while an STM- does have 8000 blocks/s.
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-7
Errored Second (ES)
A second is regarded as Errored Second (ES) if this second has one or more blocks in
error.
Severely Errored Second (SES)
A second is regarded as Severely Errored Second (SES) if a second does have more than
x% of its blocks in error. The value of x is called the SES Declaration Threshold. An SES
is also counted as an ES.
SES declaration threshold
This is an ITU-standard and is defaulted as the maximum number of admissible EB over
one second. The SES Declaration Threshold is the cutoff for SES. If the total number of
EB over one second exceed this value, it is considered to be an SES. For all network
elements, this number of blocks defaults to 30% of the maximum number of blocks (e.g.
2,400 for a VC-4; 600 for VC-12).
Unavailable Second (UAS)
An Unavailable Second (UAS) is part of an Unavailable Period (UAP). The UAP starts at
the beginning of a 10 consecutive seconds stretch of SES. It stops at the first second of a
10 seconds of more duration in which there is no longer any SES occurring. An UAS is
not counted as ES or SES.
Background Block Error (BBE)
ABackground Block Error (BBE) is an errored block not occurring as part of an Severely
Errored Second (SES).
Pointer Justification Event count (pPJE+ and pPJE-)
Pointers are used to compensate frequency and phase variations. Pointer justification
counts indicate timing differences on SDH networks.
A frame offset discontinuity is a change of the value of the pointer which defines the
flexible start position of the Virtual Container within an SDH frame. Pointer justifications
(i.e. increment and decrement operations) change the value of the pointer but they are no
frame offset discontinuities in this sense.
Pointer justifications are measured at the adaptation to High Order Path.
The summation register for pointer increments are incremented by one at each pointer
increment event. The result of this summation is the positive pointer justification event
count value (pPJE+).
The summation register for pointer decrements is incremented by one at each pointer
decrement event. The result of this summation is the negative pointer justification event
count value (pPJE-).
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-8 365-312-877R7.2Issue 4 November 2009
Per STM- port (with = 1, 4, 16, 64) every AU can be selected for a monitoring point
for generated pointer justification events (and PJE values are also derived form this AU).
Per port the maximum number of configurable PJE counters is limited to one.
Prerequisite to get an Alarm
Although several errors were to occur for several hours, no alarm will be launched unless
you previously have set the threshold values (TR and RTR) in the Edit Performance
Monitoring Point screen. A TR raises the associated alarm and an RTR clears the
associated alarm.
ote. The Trace Identifier Mismatch (TIM) option has nothing to do with performance
monitoring. TIM is used to check the validity of the path, using the J0 byte. Therefore you
do not need to enable TIM in order to get a Performance Alarm
Measurement Parameters Threshold Values
Each measurement parameter has a range, as well as a maximum threshold value (TR),
such as defined in the below table:
Threshold Termination 15 Minutes 24 Hours
Severely Errored
Seconds
VC-n
n = 11,12, 4, 3
810 77,760
RS-n
n = 1, 4, 16 or 64
810 77,760
MS-n
n=0, 1, 4, 16, 64
810 77,760
P-12 810 77,760
Errored Seconds VC-n
n = 11, 12, 4
900 86,400
RS-1, 4, 16 or 64 900 86,400
MS-n
n=0, 1, 4, 16, 64
900 86,400
P-12 900 86,400
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-9
Threshold Termination 15 Minutes 24 Hours
Background Block
Errors
VC-12, VC-11 1,799,100 172,713,600
VC-4 7,199,100 691,113,600
RS-1, 4, 16 or 64 7,199,100 691,113,600
MS-0 57,599,100 5,529,513,600
MS-1 172,799,100 16,588,713,600
MS-4 691,199,100 265,420,731,600
MS-16 2,764,799,100 265,420,713,600
MS-64 11,059,199,100 1,061,683,113,600
P-12 899100 899100
Unavailable Seconds VC-n
n = 11, 12, 4
900 86,400
RS-1, 4, 16 or 64 900 86,400
MS-n
n=0, 1, 4, 16, 64
900 86,400
P-12 900 86,400
RTR threshold values
The range of the RTR threshold for the BBE, ES, SES and UAS parameters are [0 -
maxcount]. Maxcount is to be taken from the table before. The rationale behind is that the
operator is not forced to provision the RTR value below the actual TR value. So, the
upper limit will be maxcount, and not something like TR minus 1. With this freedom the
operator is able to simulate TR-only behavior: when the RTR threshold is provisioned to
the highest value, in each interval a TR (followed by an RTR) can be sent.
Performance monitoring (PM) concepts Performance measurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-10 365-312-877R7.2Issue 4 November 2009
Available PM data
Generalities
Performance parameters are measured on a continuous basis at the termination point(s).
The performance parameters are:
• ES — umber of Errored Second
• SES — umber of Severely Errored Second
• BBE — umber of Background Block Errors
• UAS — Unavailable Second
• BiDirUAS — Bidirectional Unavailable Second
• BiDirUAPcount — Bidirectional Unavailable Period Count
Each of these parameters has a threshold. The threshold can be set according to your
maintenance philosophy. If no thresholds are manually input, the network element will
apply the default threshold values for each parameters. In the event that a measurement
parameter exceeds this user-set threshold, the system generates an alarm.
Prerequisite to get an Alarm
Although unacceptable amount of errors were to occur at a termination point during
several hours, no alarm would be raised unless you previously have:
• Enabled the Thresholding functionality;
• Enabled the performance parameters counters;
• Set the threshold values (TR and RTR) for the counters;
• Set the termination point to monitored, as mentioned in Prerequisite to be able to
Monitor a TP. .
SDH measurement parameters
Each of the measurement parameters has an associated counter. Performance monitoring
results are displayed on screen by means of these counters .
The table below describes each performance monitoring measurement parameters:
Measurement Parameters Description
ES A period of 1 second having one or more
blocks in error.
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-11
SES A period of one second having more than x %
of its blocks in error. The value of x is called
the SES Declaration Threshold. This threshold
is default 30 (%). An SES is also counted as an
ES
BBE An errored block, that does not occur as a part
of a Severely Errored Second (SES).
UAS One second which is contained within
aUnavailable Period (UAP). An UAS is not
counted as ES or SES.
BiDirUAS Represents the number of seconds for which
the link was unavailable in a period (24hr) for
directional monitoring. biDirUAS is counted
separately from UAS as it relates to both near
and far end data.
BiDirUAPcount Represents the number of times the link was
unavailable in a period (24hrs) for
bidirectional monitoring.
Ethernet measurement parameters
Since SDH uses STM-n signals and that LA uses packets, we cannot use the same
parameters to monitor performance in both cases. Therefore, LA monitoring uses the
following parameters:
The parameters and associated link are the following:
LAN Measurement Parameters Link
CbR Kilobytes Received from Ethernet to LA port or from
SDH to WA port
CbS Kilobytes Sent from LA port to Ethernet or from WA
port to SDH
pDe Packets dropped. These packets are received from
Ethernet to LA port and dropped by LA port or
recieved from SDH to WA port and dropped by WA
port.
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-12 365-312-877R7.2Issue 4 November 2009
Other related parameters
There are other related performance parameters which, although not directly measured
nor displayed on the ITM-CIT, are taken into consideration during processing of
performance data.
The below table lists other parameters
Parameters Description
Errored Block (EB) A block having one or more errors. This is
determined by the comparing the outcome of
the BIP check done before and after
transmission. (see note below this table)
SES declaration threshold This is the maximum of ES, beyond which it is
declared a SES. This is an ITU-standard and is
defaulted as the maximum number of
admissible EB over one second. For all
network elements, EB defaults to 30% of the
maximum number of blocks.
Unavailable Period (UAP) Interval of at least 10 seconds where the error
rate is above the SES threshold. The UAP
starts at the first second of a 10 seconds (or
more) stretch SES. It stops at the first second
of a 10 seconds (or more) duration in which
there is no longer any SES occurring.
Important! The number of blocks per second depends on the signal itself. AVC-12
has 2000 blocks/s while an STM- does have 8000 blocks/s. The SES threshold
(30%) is calculated from these figures.
SDH parameters thresholds
Thresholds can be described as maximum acceptable number of errors, as provisioned by
the user and in accordance with maintenance philosophy. The values allocated for those
various thresholds are kept on the ITM-CIT.
The thresholding functionality is applicable for unidirectional monitoring only. A
prerequisite for the system to apply those thresholds and alert maintenance personal that
they have been crossed, is to enable the thresholding functionality. Once the thresholding
functionality is enabled, the specific values for the thresholds can be input on the
ITM-CIT. If no specific values are entered, the system reverts to using default values.
The ITM-CIT defaults to disabled and can be turned on or off. The thresholding method is
an explicit reset method, that is the threshold values must be input in the system.
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-13
Threshold types
There are two types of thresholds:
• Threshold Report (TR): This value causes a threshold crossing event. When this
maximum is reached, the system raises the associated alarm if the prerequisite have
been applied (see Prerequisite to get an Alarm). The minimum value for TR is 1 (one).
• Reset Treshold Report (RTR): This value causes a resetting of the event. When this
threshold is reached, RTR clears the associated alarm. The RTR value is usually lower
than the RT value. The minimum value for RTR is 0 (zero).
Both thresholds are independently provisionnable per termination point and accumulation
period for a given performance monitoring parameter.
Where X = TR and Y = RTR
If Then
b BBE > or equal to X System launches the associated alarm
X > or equal to b BBE > or equal to Y System stops the associated alarm
Threshold Range and Maximum
Each measurement parameter has a range for the acceptable values for TR. The lower
limit for this threshold can never be zero to avoid an alarm storm from the E to the
ITM-CIT.
The maximum allowable TR is dependant on:
• the parameter being measured;
• where performance is measured (meaning the TP);
• and the binning period.
The maximum threshold values for each parameters is listed in below::
Threshold Termination 15 Minutes 24 Hours
SES VC-4 810 77760
VC-12 810 77760
MS-1 810 77760
P12 810 77760
ES VC-4 900 86400
VC-12 900 86400
MS-1 900 900
P12 900 900
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-14 365-312-877R7.2Issue 4 November 2009
Threshold Termination 15 Minutes 24 Hours
BBE VC-12, VC-11 1,799,100 172713600
VC-4 7,199,100 691113600
MS-1 172,799,100 16588713600
P12 899100 86313600
UAS VC-12 900 86400
VC-4 900 86400
MS-1 900 86400
P12 900 86400
SHDSL performance monitoring
The following definitions are applicable for SHDSL performance monitoring parameters:
• Background Block Error (BBE), Code Violation (CV):
Each SHDSL frame with an errored CRC-6 word is counted as a Background Block
Error (Code Violation), provided the second in which the error occurs is not an SES or
UAS. Hence, the maximum possible number of BBEs per second is 49 (see the
definitions of SES and UAS).
• Errored Second (ES):
Each second in which one or more CRC-6 word is errored or in which a LOSW defect
is active is counted as an Errored Second, provided the second is not a UAS.
• Severely Errored Second (SES):
Each second in which 50 or more CRC-6 words are in error or in which a LOSW
defect is active is counted as a Severely Errored Second, provided the second is not a
UAS. An SES detection threshold of 30% is equivalent to 50 errored blocks.
• Unavailable Second (UAS):
Each second that is part of unavailable time is counted as a UAS. Unavailable time
starts after 10 consecutive SESs. These 10 seconds are part of unavailable time.
Unavailable time stops after 10 consecutive non-SESs. These 10 seconds are not part
of unavailable time.
Ranges and default thresholds
These are the ranges and default thresholds for SHDSL performance monitoring:
Parameter 15-minutes bin 24-hours bin
Range Raise
threshold
Clear
threshold
Range Raise
threshold
Clear
threshold
BBE 0 - 45000 3000 15 0 - 4320000 4000 400
ES 0 - 900 120 5 0 - 86400 350 35
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-15
Parameter 15-minutes bin 24-hours bin
Range Raise
threshold
Clear
threshold
Range Raise
threshold
Clear
threshold
SES 0 - 810 15 0 0 - 77760 20 0
UAS 0 - 900 15 0 0 - 86400 20 0
The default thresholds are fix preset and cannot be changed.
Plotted performance diagram
In the figure below an example is given how ES, SES, UAS and BBE are computed. The
number of errored blocks are plotted against time.
In the following figure, three different regions are noticeable. The grey shaded indicate
the BBE.
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-16 365-312-877R7.2Issue 4 November 2009
The SES Declaration Threshold is set to 30%, which result in 600 errored blocks, as the
maximum tolerable level of BBE for that type of signal. Since a VC–4 signal has 8000
frames per second and a VC-12 has 2000 frames per second, the 30% threshold for a
VC-12 signal is lower than for a VC-4 and corresponds to 30%X2000 or 600 BBE.
In the following figure, three different regions are noticeable.
• REGIO I: In the first (I) region the SES Declaration Threshold is not reached and
therefore only ESs are detected. Since there is no SES in this region, there is no AUS
either.
• REGIO II: In the second (II) region the SES Declaration Threshold is exceeded and
several SESs are detected. An SES is also counted as an ES so the total period is also
counted as ES. The SES is declared at the beginning of the stretch where the threshold
is passed for longer than 10 seconds in a row.
• In the third (III) region the amount of SES lasts for more than 10 consecutive seconds,
so UAS is detected. However an UAS is not detected as ES or SES.
Measurement periods
Measurement Parameters data is accumulated over a period of time which is referred to as
the measurement period. There are two possible measurement periods:
• 15 minutes
• 24 hours
Directionality
For a given measurement period, the SDH measurement parameters can be tracked in one
direction (uni-directional) or both (bi-directional). It is possible to monitor
simultaneously:
• uni—directional 15 minutes,
• uni—directional 24 hours
• bi—directional 24 hours.
The table below explains the relationship between termination points, directionality,
measurement periods and the applicable measurement parameters:
TP→
Parameter ↓
MS1 VC-n VC-n LAWA P12 (ISD)
Direction and
period
UI 15'/24
hr
UI 15'/24
hr
BI 24 hr UI 15'/24
hr
UI15'/24hr
ES x x x x
SES x x x x
UAS x x x x
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-17
BBE x x x x
BiDirUAS x
BiDirUAP
count
x
CbR (Kbytes) x
CbS(Kbytes) x
pDe x
Important!VC-n, where n=3, 4, 11, 12.
Performance monitoring (PM) concepts Available PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-18 365-312-877R7.2Issue 4 November 2009
Thresholding
Threshold crossing alerts (TCAs)
“1643 AM / 1643 AM” systems support threshold crossing alerts (TCAs) on a per
performance parameter basis by using TCA profiles. The TCA profiles are used to store
the threshold values of the performance parameters related to a specific parameter group
(for example parameters related to the SOET Section or Line, or parameters related to
Ethernet ports).
When thresholding is activated for a performance parameter, the value of the parameter is
compared against the threshold value on a second by second basis. When the current
counter value equals or exceeds the threshold value, then a threshold crossing alert will be
reported as an event notification with a resolution of one second.
Types of TCA profiles
TCA profiles exist for these groups of performance parameters:
• Parameters related to the SDH Regenerator Section and Multiplex Section
• Parameters related to SDH tributaries
• Parameters related to Ethernet
A default profile is predefined for each of these TCA profile types. Furthermore, you can
create, modify or delete TCA profiles of these types.
TCA mode
Two different TCAmodes (or thresholding methods) can be distinguished:
1. Implicit TCAmode (“TR only mode”, also known as transient condition method)
2. Explicit TCAmode (“TR/RTR mode”, also known as standing condition method)
Implicit TCA mode
Only one threshold, the so-called threshold report (TR) threshold, is defined.
When the counter value of a performance parameter equals or exceeds this threshold, then
a threshold report (TR, synonymous to threshold crossing alert) is generated and stored in
the network element alarm log.
o more than one threshold crossing alert will be generated per performance parameter
during a measurement interval unless the threshold value has been changed, or the
performance parameter has been reset (to zero). When the counter value again reaches or
exceeds the threshold, another threshold crossing alert will be reported.
The following figure illustrates the implicit TCAmode:
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-19
Legend:
1 Threshold for generating a threshold report (TR).
Explicit TCA mode
Two thresholds are defined, a threshold report (TR) threshold and a reset threshold report
(RTR) threshold.
Important! The explicit TCAmode is only supported for SDH ports.
When the counter value of a performance parameter equals or exceeds the TR threshold,
then a threshold report (TR, synonymous to threshold crossing alert) is generated.
Only the first threshold crossing in a sequence of measurement intervals is reported. At
the end of the first interval in which the counter value did not exceed the RTR threshold, a
reset threshold report (RTR) is generated.
The following figure illustrates the explicit TCAmode:
Legend:
1 Threshold for generating a threshold report (TR).
t
À
TR TR TR
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-20 365-312-877R7.2Issue 4 November 2009
2 Threshold for generating a reset threshold report (RTR).
Enabling/disabling thresholding
Thresholding can be enabled or disabled for each performance parameter individually.
Thresholding is enabled for a specific performance parameter, when the following
applies:
• The associated port or tributary has a corresponding TCA profile assigned.
• The threshold value of the performance parameter is unequal to zero.
Thresholding can be disabled for each performance parameter individually via ITM-CIT.
Assigning a TCA profile with all parameter thresholds set to zero can be used to disable
thresholding for all performance parameters associated to a particular port or tributary.
Default values of the performance parameter thresholds
In the following tables, the default threshold values for 15-minutes and 24-hours
measurement intervals are listed for performance parameters.
The threshold values for the 15-minutes measurement intervals indicate an unacceptable
performance level.
The threshold values for the 24-hours measurement intervals indicate a degraded
performance level.
SDH Regenerator Section
These are the default parameter thresholds related to the SDH Regenerator Section:
Performance parameter Default threshold value for STM-N (N=1, 4, 16,
64)1Default threshold value for STM-N (N=1, 4, 16,
64)1
15-minutes measurements 24-hours measurements
TR threshold RTR threshold2 TR threshold RTR threshold2
BBE 9000 200 48000 4800
ES 180 20 1500 150
SES 15 0 20 0
UAS 15 0 20 0
Notes:
1. The RTR threshold is only relevant in the explicit TCAmode.
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-21
SDH Multiplex Section
These are the default parameter thresholds related to the SDH Multiplex Section:
Performance parameter Default threshold value1
15-minutes measurements 24-hours measurements
TR threshold RTR threshold2 TR threshold RTR threshold2
BBE STM-1 228000 2400 432000 43200
STM-4 1152000 9600 1728000 172800
STM-16 4608000 38400 6912000 691200
STM-64 18432000 153600 27648000 2764800
ES STM-1 50 5 150 15
STM-4 50 5 150 15
STM-16 50 5 150 15
STM-64 50 5 150 15
SES STM-1 10 0 15 0
STM-4 10 0 15 0
STM-16 10 0 15 0
STM-64 10 0 15 0
UAS STM-1 15 0 20 0
STM-4 15 0 20 0
STM-16 15 0 20 0
STM-64 15 0 20 0
Notes:
1. The RTR threshold is only relevant in the explicit TCAmode.
SDH path
These are the default parameter thresholds related to the SDH path:
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-22 365-312-877R7.2Issue 4 November 2009
Performance parameter Default threshold value1
15-minutes measurements 24-hours measurements
TR threshold RTR threshold2 TR threshold RTR threshold2
BBE VC-3 36000 200 48000 4800
VC-4 36000 200 48000 4800
VC-4-XC
(X=4, 16, 64)
36000 200 48000 4800
VC-11, VC-12 9000 50 12000 1200
P-12 4500 25 6000 600
ES VC-3 150 10 600 60
VC-4 180 20 1500 150
VC-4-XC
(X=4, 16)
180 20 1500 150
VC-11, VC-12 120 5 400 40
P-12 120 4 350 35
SES VC-3 15 0 20 0
VC-4 15 0 20 0
VC-4-XC
(X=4, 16)
15 0 20 0
VC-11, VC-12 15 0 20 0
P-12 15 0 20 0
UAS VC-3 15 0 20 0
VC-4 15 0 20 0
VC-4-XC
(X=4, 16)
15 0 20 0
VC-11, VC-12 15 0 20 0
P-12 15 0 20 0
Notes:
1. The RTR threshold is only relevant in the explicit TCAmode.
Example of ES, SES, UAS and BBE
In the next figure an example is given how ES, SES, UAS and BBE are computed. The
number of errored blocks are plotted against time.
In the following figure, three different regions are noticeable. The grey shaded indicates
the BBE.
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-23
The SES Declaration Threshold is set to 30%, which results in 600 errored blocks, as the
maximum tolerable level of BBE for that type of signal. Since a VC–4 signal has 8000
frames per second and a VC-12 has 2000 frames per second, the 30% threshold for a
VC-12 signal is lower than for a VC-4 and corresponds to 30% x 2000 = 600 BBE.
In the previous figure, three different regions are noticeable.
• REGIO I: In the first (I) region the SES Declaration Threshold is not reached and
therefore only ESs are detected. Since there is no SES in this region, there is no UAS
either.
• REGIO II: In the second (II) region the SES Declaration Threshold is exceeded and
several SESs are detected. An SES is also counted as an ES so the total period is also
counted as ES. The SES is declared at the beginning of the stretch where the threshold
is passed for not longer than 10 seconds in a row.
• In the third (III) region the amount of SES lasts for more than 10 consecutive seconds,
so UAS is detected. However an UAS is not detected as ES or SES.
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-24 365-312-877R7.2Issue 4 November 2009
The table below indicates the amount of ES, SES, BBE and UAS for each region.
Measurement Parameter Region I Region II Region III
ES 20 21 7 + 7
SES - 8 -
BBE 2116 1200 + 1280 1276 + 1270
UAS - - 29
Performance monitoring (PM) concepts Thresholding
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-25
Ethernet performance monitoring
Purpose
The Ethernet performance monitoring counters can be categorized according to the
different purposes they are serving.
Types of Ethernet performance monitoring counters
The following types of counters can be distinguished as:
• Counters for basic Ethernet performance monitoring
• Service monitoring:
– Counters for Ethernet service flow performance monitoring
• Traffic management:
– High quality traffic counters for Ethernet network load performance monitoring
– Low quality traffic counters for Ethernet network load performance monitoring
– Counters for Ethernet congestion monitoring
• Counters for Ethernet service route round trip delay measurements
Basic Ethernet performance monitoring counters
The basic Ethernet Peformance Monitoring counters that are supported are as follows:
BasicEthernetPM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
Ethernet
Incoming
umber of
Good Bytes
pCbR /port byte - x x x x x x
Ethernet
Outgoing
umber of
Bytes
pCbS /port byte - x x x x x x
Ethernet
Incoming
Good
Frames
eIF /port packet - x x x x x x
Ethernet
Outgoing
Frames
eOF /port packet - x x x x x x
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-26 365-312-877R7.2Issue 4 November 2009
BasicEthernetPM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
Ethernet
Incoming
Bytes
trapped by
CPU
eICP /port byte - x x x x - -
Ethernet
Outgoing
Bytes
trapped by
CPU
eOCP /port byte - x x x x - -
Ethernet
Dropped
Frames due
to Error
ppDe /port packet x x x x x x x
Ethernet
Incoming
umber of
Good
Unicast
Frames
eUPR /port packet - x x x x x -
Ethernet
Outgoing
umber of
Unicast
Frames
eUPS /port packet - x x x x x -
Ethernet
Incoming
umber of
Good
Multicast
Frames
eMPR /port packet - x x x x x -
Ethernet
Outgoing
umber of
Multicast
Frames
eMPS /port packet - x x x x x -
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-27
BasicEthernetPM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
Ethernet
Incoming
umber of
Good
Broadcast
Frames
eBPR /port packet - x x x x x -
Ethernet
Outgoing
umber of
Broadcast
Frames
eBPS /port packet - x x x x x -
Ethernet
Incoming
umber of
Frame with
CRC Error
ePPR /port packet - x x - - x -
Ethernet
Outgoing
umber of
Pause
Frames
transmitted
ePPS /port packet - x x - - x -
Ethernet
Incoming
umber of
Frame with
CRC Error
ePCR /port packet - x x x x x -
Ethernet service flow performance monitoring counters
Ethernet services are monitored at DiffServEdge ingress ports (UI ports). Service flows
can be identified by a flow descriptor (FD), based on C-tag (C-VID, C-UP), destination
MAC address (DA), or IP-TOS byte also by a virtual port descriptor (VPD), based on an
S-tag (S-VID, S-UP). Please note that, if enumerations or value ranges are used, a VPD
describes multiple virtual ports.
The following counters are supported:
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-28 365-312-877R7.2Issue 4 November 2009
EthernetServiceFlow
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
all incoming
bytes for one
service flow
aQIB /port
/Service
or
/virtual
port
/Service
byte - x x x x - -
incoming
bytes of all
green
marked
frames for
one service
flow
gQIB /port
/Service
or
/virtual
port
/Service
byte - x x - - - -
incoming
bytes of all
yellow
marked
frames for
one service
flow
yQIB /port
/Service
or
/virtual
port
/Service
byte - - - - - - -
incoming
bytes of all
red marked
frames for
one service
flow
rQIB /port
/Service
or
/virtual
port
/Service
byte - - - - - - -
Note: gQIB is supported in X5IP but not in X4IP.
Ethernet high quality traffic counters
The Ethernet high quality traffic counters provide link load monitoring per traffic class
and color (dropping precedence) for high-priority Ethernet traffic (traffic class 2 or 3,
mapped into the egress queues 2 or 3 respectively).
The following counters are supported for Ethernet high quality traffic:
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-29
Highqualitytrafficethernetload PM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
incoming
bytes of
green
frames with
traffic class
2
g2EIB /R ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
yellow
frames with
traffic class
2
y2EIB /R ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
green
frames with
traffic class
3
g3EIB /R ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
yellow
frames with
traffic class
3
y3EIB /R ingr
/TC
/color
byte - - - x x - -
Ethernet
Outgoing
Bytes
trapped by
CPU
g2EIF /R ingr
/TC
/color
packet - x x x x - -
number of
incoming
yellow
frames with
traffic class
2
y2EIF /R ingr
/TC
/color
packet - x x x x - -
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-30 365-312-877R7.2Issue 4 November 2009
Highqualitytrafficethernetload PM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
number of
incoming
green
frames with
traffic class
3
g3EIF /R ingr
/TC
/color
packet - x x x x - -
number of
incoming
yellow
frames with
traffic class
3
y3EIF /R ingr
/TC
/color
packet - x x x x - -
incoming
layer 1
payload
bytes of
green
frames with
traffic class
3 or internal
(trapped)
frames
c3EI /R ingr
/TC
/color
byte - x x x x - -
incoming
layer 1
payload
bytes of
green
frames with
traffic class
3 or traffic
class 2 or
internal
(trapped)
frames
c2EI /R ingr
/TC
/color
byte - x x x x - -
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-31
Highqualitytrafficethernetload PM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
Loaded
Second for
incoming
traffic with
class 3 or
internal
traffic
i3gEILS /R ingr
/TC
/color
sec x x x x x - -
Loaded
Second for
incoming
traffic with
class 3 or
class 2 or
internal
traffic
i32gEILS /R ingr
/TC
/color
sec x x x x x - -
Severly
Loaded
Second for
incoming
traffic with
class 3 or
internal
traffic
i3gEISLS /R ingr
/TC
/color
sec x x x x x - -
Severly
Loaded
Second for
incoming
traffic with
class 3 or
class 2 or
internal
traffic
i32gEISLS/R ingr
/TC
/color
sec x x x x x - -
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-32 365-312-877R7.2Issue 4 November 2009
Ethernet low quality traffic counters
The Ethernet low quality traffic counters provide link load monitoring per traffic class
and color (dropping precedence) for low-priority Ethernet traffic (traffic class 0 and 1,
mapped into the egress queue 1).
The following counters are supported for Ethernet low quality traffic:
LowqualitytrafficethernetPM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
incoming
bytes of
green
frames with
traffic class
0
g0EIB /R
ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
yellow
frames with
traffic class
0
y0EIB /R
ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
green
frames with
traffic class
1
g1EIB /R
ingr
/TC
/color
byte - - - x x - -
incoming
bytes of
yellow
frames with
traffic class
1
y1EIB /R
ingr
/TC
/color
byte - - - x x - -
number of
incoming
green
frames with
traffic class
0
g0EIF /R
ingr
/TC
/color
packet - x x x x - -
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-33
LowqualitytrafficethernetPM
Counter Location Unit ThresholdX5IP X4IP X8PL
LAN WAN LAN WAN LAN WAN
number of
incoming
yellow
frames with
traffic class
0
y0EIF /R
ingr
/TC
/color
packet - x x x x - -
number of
incoming
green
frames with
traffic class
1
g1EIF /R
ingr
/TC
/color
packet - x x x x - -
number of
incoming
yellow
frames with
traffic class
1
y1EIF /R
ingr
/TC
/color
packet - x x x x - -
There is no thresholding for Ethernet low quality traffic.
Performance monitoring (PM) concepts Ethernet performance monitoring
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-34 365-312-877R7.2Issue 4 November 2009
Configuration of the OMS
High-level view
The following diagram represents three activities that are available on the OMS regarding
performance monitoring:
• Configuration of the OMS, binning period, termination points and thresholds
• Parameters Measurements and Data Display
• Archiving and Data Recovery.
Configuration of termination pointsand measurement period
OMS Configuration
PERFORMANCE MONITORING
Configuration of threshold values
Parameter measurements
Data display
Data archiving
Viewing data andprovisioned parameters
Reports(created, displayed, printed)
Log
Data recovery and storage(network element bins)
Performance monitoring (PM) concepts Configuration of the OMS
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-35
Data storage and recovery
Measurement periods
Measurement parameters data is accumulated over a so called measurement period. Three
measurement periods are available:
• 15 minutes unidirectional
• 24 hours unidirectional
• 24 hours bidirectional
Bins
The PM data for each TP is stored in a bin, located in the network element itself. Two
types of bins are available:
• 15 minutes unidirectional, with a total of 16 bins
• 24 hours unidirectional and 24 hours bidirectional, both have 1 bin.
A bin contains performance data information for each termination point such as:
• Timestamp;
• Elapsed time;
• Suspect indication which is a data flag to indicate that the data stored in the bin is
incomplete or invalid.
For every TP, there is a limited set of bins. The number of bins depends on the network
element. The number of bins per network element is detailed in the table below.
Network Element Number of 15 minutesunidirectional bins
Number of 24 hoursunidirectional bins
Number of 24hours bidirectional
bins
ADM 16/1 family 16a 1b 1
1643 Access Multiplexer
AM / 1643 Access
Multiplexer Small AMS
16a 1 1
AM 1 Plus 16a 1 1
a. The OMS has 16 bins.
b. The ADM 16/1 family has 1 uni-directional bin and 1 bi-directional bin.
Performance monitoring (PM) concepts Data storage and recovery
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
14-36 365-312-877R7.2Issue 4 November 2009
Data Recovery Following Loss of Association
If the association between OMS and the E fails, the OMS regains information about the
lost time by reading the E bins for the relevant interval. If the association fails for a
longer period of time the E may not be able to store sufficient information for a full
recovery.
Example of Loss of Association
In the example below the association with the management system has been lost for 6
hours. Because this E does have sixteen 15 minutes unidirectional bins only 4 hours of
data can be recovered.
On connection
While performance monitoring is active the network element will store its most recent
data in its bins. On connection the management system will retrieve all data present in the
bins.
Performance monitoring (PM) concepts Data storage and recovery
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
14-37
15 15Performance monitoring
(PM) tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to
performance monitoring (PM).
Contents
To enable/disable performance monitoring and history binning 15-2
To set PM counter thresholds 15-4
To view PM data 15-9
To define filter criteria for the presentation of PM information 15-11
To define an Ethernet service route for round trip delay measurements 15-13
To modify traffic classes 15-17
To perform a one-time round trip delay measurement for test purposes 15-19
To start a cyclic round trip delay measurement 15-21
To delete an Ethernet service route 15-23
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-1
To enable/disable performance monitoring and history binning
When to Use
Use the following task to:
• Enable or disable performance monitoring on a termination point
• Enable or disable the storage of performance monitoring history data
Task
Follow this to task to enable or disable the performance monitoring and storage of history
data:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Performance Measurements
→ Performance Measurement Points.
Result:The Performance Measurements Points page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Filter method field, click on the radio button Port/NE resources based.
2. In the NE type field, select the type of E (if not already present).
3. In the NE name field, select the name of the target E (if not already present).
4. In the Monitoring rate field, select a certain rate or All.
5. In the Granularity field, click on one radio button to which limit the data typeinterval (optional).
6. In the Port field, type the port name (optional).
7. In the VLAN Id field, type the VLA id name (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
8. In the Destination address field, type the destination address (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
9. In the Show only active ports field, click the radio button Yes (default) to searchonly for physical ports and logical ports in a connection or No for non.
10. In the Only ports with data collected field, click the radio button Yes to searchfor PM-capable ports that have PM data collection enabled or No to search for allPM-capable ports.
ote: This field is only visible if bulk mode applies.
Performance monitoring (PM) tasks To enable/disable performance monitoring and historybinning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-2 365-312-877R7.2Issue 4 November 2009
11. In the Data collection fields, click the calender button right
• to the from field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the start time is set.
• to the to field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the end time is set.
ote: This field omits, if the field “Only ports with data collected” is selected toNo.
12. Click Search.
Result:The Performance Measurements Points panel is populated at the bottom
containing a list of records that meet your search criteria.
ote: If no records are displayed change your search criteria of task 2 and try again.
...................................................................................................................................................................................................
3 Mark one or more of the performance measurements points left to the NE name column
you wish to switch the performance monitoring and select from the Go menu:
• either Enable monitoring without collection, if not already set as monitored
• or Enable monitoring and collection, if not already set as monitored for historybinning,
• or Disable monitoring and collection, if already set as a monitored performancemeasurements point displayed in the “PM TP Status” column of the above record list,
• or Disable collection, if a monitoring and collection performance measurementspoint shall continuously be monitored but only the collection shall be deleted,
• Click Go.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Performance Measurements Points page. Click on the Refresh
button in the performance measurements points panel and in the column PM TP
Status the new PM status is displayed. For completely disabled the status is None.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To enable/disable performance monitoring and historybinning
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-3
To set PM counter thresholds
When to Use
Use this task to set the performance monitoring threshold values.
Task
Follow this task in order to modify the values of the counter thresholds:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Performance Measurements
→ Performance Measurement Points.
Result:The Performance Measurements Points page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Filter method field, click on the radio button Port/NE resources based.
2. In the NE type field, select the type of E (if not already present).
3. In the NE name field, select the name of the target E (if not already present).
4. In the Monitoring rate field, select a certain rate or All.
5. In the Granularity field, click on one radio button to which limit the data typeinterval (optional).
6. In the Port field, type the port name (optional).
7. In the VLAN Id field, type the VLA id name (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
8. In the Destination address field, type the destination address (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
9. In the Show only active ports field, click the radio button Yes (default) to searchonly for physical ports and logical ports in a connection or No for non.
10. In the Only ports with data collected field, click the radio button Yes to searchfor PM-capable ports that have PM data collection enabled or No to search for allPM-capable ports.
ote: This field is only visible if bulk mode applies.
11. In the Data collection fields, click the calender button right
• to the from field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the start time is set.
• to the to field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the end time is set.
Performance monitoring (PM) tasks To set PM counter thresholds
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-4 365-312-877R7.2Issue 4 November 2009
ote: This field omits, if the field “Only ports with data collected” is selected toNo.
12. Click Search.
Result:The Performance Measurements Points panel is populated at the bottom
containing a list of records that meet your search criteria.
ote: If no records are displayed change your search criteria of task 2 and try again.
...................................................................................................................................................................................................
3 Mark the performance measurements points left to the NE name column you wish to
modify, select Assign threshold from the Go menu, and click Go.
Result:The PM threshold details page is displayed.
...................................................................................................................................................................................................
4 Use one of the following steps depending on the selection of the “Monitoring rate” field
of task 2:
• For VC- thresholds skip to Step 5
• For Ethernet thresholds skip to Step 6
• For Ethernet service route thresholds skip to Step 7
• For LA Ethernet HQ traffic thresholds skip to Step 8
• For LA Ethernet congestions thresholds skip to Step 9
• For SHDSL thresholds skip to Step 10
• For Remote Ethernet traffic thresholds skip to Step 11
...................................................................................................................................................................................................
5 Change the thresholds that are modifiable for VirtualContainer (VC-):
• Under the Near end ES panel, change the values to raise or clear the threshold forthe number of near end error seconds.
• Under the Near end SES panel, change the values raise or clear the threshold for thenumber of near end several error seconds.
• Under the Near end UAS panel, change the values to raise or clear the threshold forthe duration of near end unavailable second / time.
• Under the Near end BBE panel, change the values to raise or clear the threshold forthe number of near end background block errors.
• Under the Near end FSC panel, change the values to raise or clear the threshold forthe number of near end exceeded information.
ote: This field is only visible if the “Monitoring rate” is selected to E1.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Performance monitoring (PM) tasks To set PM counter thresholds
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-5
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
6 Change the thresholds that are modifiable for Ethernet:
• Under the Near end BSYE panel, change the values to raise or clear the threshold forthe number of near end error symbols.
• Under the Near end ES panel, change the values to raise or clear the threshold forthe number of near end error seconds.
• Under the Near end SES panel, change the values raise or clear the threshold for thenumber of near end several error seconds.
• Under the Near end UAS panel, change the values to raise or clear the threshold forthe duration of near end unavailable second / time.
• Under the Far end BSYE panel, change the values to raise or clear the threshold forthe number of far end error symbols.
• Under the Far end ES panel, change the values to raise or clear the threshold for thenumber of far end error seconds.
• Under the Far end SES panel, change the values raise or clear the threshold for thenumber of far end several error seconds.
• Under the Far end UAS panel, change the values to raise or clear the threshold forthe duration of far end unavailable second / time.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
7 Change the thresholds that are modifiable for Ethernet service route:
• Change the values to raise or clear the threshold in the Average round trip delay(usecs) panel.
• Change the values to raise or clear the threshold in the Maximum round trip delay(usecs) panel.
• Change the values to raise or clear the threshold in the Unsuccessful round tripdelay measurements panel.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Performance monitoring (PM) tasks To set PM counter thresholds
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-6 365-312-877R7.2Issue 4 November 2009
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
8 Change the thresholds that are modifiable for LA Ethernet HQ traffic:
• Change the values to raise or clear the threshold in the Loaded Seconds forincoming traffic with traffic class 3 or internal traffic panel.
• Change the values to raise or clear the threshold in the Loaded Seconds forincoming traffic with traffic class 3 or traffic class 2 or internal trafficpanel.
• Change the values to raise or clear the threshold in the Severely Loaded Secondsfor incoming traffic with traffic class 3 or internal traffic panel.
• Change the values to raise or clear the threshold in the Severely Loaded Secondsfor incoming traffic with traffic class 3 or traffic class 2 or internal trafficpanel.
• Change the value to raise or clear the threshold in the Nominal data rate (kb/sec)panel.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
9 Change the thresholds that are modifiable for LA Ethernet congestions:
• Change the values to raise or clear the threshold in the Green traffic class 2Ethernet Output Congested Seconds panel.
• Change the values to raise or clear the threshold in the Yellow traffic class 2Ethernet Output Congested Seconds panel.
• Change the values to raise or clear the threshold in the Green traffic class 3Ethernet Output Congested Seconds panel.
• Change the values to raise or clear the threshold in the Yellow traffic class 3Ethernet Output Congested Seconds panel.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Performance monitoring (PM) tasks To set PM counter thresholds
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-7
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
10 Change the thresholds that are modifiable for SHDSL:
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
...................................................................................................................................................................................................
11 Change the thresholds that are modifiable for Remote Ethernet traffic:
• Change the values to raise or clear the threshold in the Packet dropped panel.
• At least set the Threshold crossing alert status by clicking the radio buttonEnabled or Disabled.
• Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the PM threshold details page and a new PM counter threshold is set.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To set PM counter thresholds
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-8 365-312-877R7.2Issue 4 November 2009
To view PM data
When to use
Use this task to display details of any termination point settings.
Task
Complete the following steps to view details of any termination points:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Performance Measurements
→ Performance Measurement Points.
Result:The Performance Measurements Points page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Filter method field, click on the radio button Port/NE resources based.
2. In the NE type field, select the type of E (if not already present).
3. In the NE name field, select the name of the target E (if not already present).
4. In the Monitoring rate field, select a certain rate or All.
5. In the Granularity field, click on one radio button to which limit the data typeinterval (optional).
6. In the Port field, type the port name (optional).
7. In the VLAN Id field, type the VLA id name (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
8. In the Destination address field, type the destination address (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
9. In the Show only active ports field, click the radio button Yes (default) to searchonly for physical ports and logical ports in a connection or No for non.
10. In the Only ports with data collected field, click the radio button Yes to searchfor PM-capable ports that have PM data collection enabled or No to search for allPM-capable ports.
ote: This field is only visible if bulk mode applies.
11. In the Data collection fields, click the calender button right
• to the from field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the start time is set.
• to the to field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the end time is set.
Performance monitoring (PM) tasks To view PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-9
ote: This field omits, if the field “Only ports with data collected” is selected toNo.
12. Click Search.
Result:The Performance Measurements Points panel is populated at the bottom
containing a list of records that meet your search criteria.
ote: If no records are displayed change your search criteria of task 2 and try again.
...................................................................................................................................................................................................
3 Left to the NE name column click on the display details button to show the details of the
each record displaying in a separate frame at the bottom.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To view PM data
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-10 365-312-877R7.2Issue 4 November 2009
To define filter criteria for the presentation of PM information
When to Use
In order to limit the amount of displayed performance monitoring information, you can
define two filter criteria for the presentation of performance monitoring information:
• Monitor the current performance measurements, currently available and compliant
with the filter settings.
• Monitor the history performance measurements, available and stored and compliant
with the filter settings.
Task
Complete the following steps to define the two filter criteria:
...................................................................................................................................................................................................
1 Use the object links to follow this path: Performance Measurements
→ Performance Measurement Points.
Result:The Performance Measurements Points page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. For the Filter method field, click on the radio button Port/NE resources based.
2. In the NE type field, select the type of E (if not already present).
3. In the NE name field, select the name of the target E (if not already present).
4. In the Monitoring rate field, select a certain rate or All.
5. In the Granularity field, click on one radio button to which limit the data typeinterval (optional).
6. In the Port field, type the port name (optional).
7. In the VLAN Id field, type the VLA id name (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
8. In the Destination address field, type the destination address (optional).ote: This field omits depending on the selection of the “Monitoring rate” field.
9. In the Show only active ports field, click the radio button Yes (default) to searchonly for physical ports and logical ports in a connection or No for non.
10. In the Only ports with data collected field, click the radio button Yes to searchfor PM-capable ports that have PM data collection enabled or No to search for allPM-capable ports.
ote: This field is only visible if bulk mode applies.
Performance monitoring (PM) tasks To define filter criteria for the presentation of PMinformation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-11
11. In the Data collection fields, click the calender button right
• to the from field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the start time is set.
• to the to field and the calender page is populated. Select the date and time fromthe drop-down menus and click OK, the end time is set.
ote: This field omits, if the field “Only ports with data collected” is selected toNo.
12. Click Search.
Result:The Performance Measurements Points panel is populated at the bottom
containing a list of records that meet your search criteria.
ote: If no records are displayed change your search criteria of task 2 and try again.
...................................................................................................................................................................................................
3 This step can only be achieved, if a performance measurements point is set to minimum
monitored, displayed in the PM TP status column of the record list in the in the search
panel. Refer to the task “To enable/disable performance monitoring and history binning”
Mark the performance measurements points left to the NE name column you wish to
monitor and select from the Go menu:
• either NE History Measurements for history monitoring,
• or NE Current Measurements for current monitoring,
• Click Go.
Result:Analogue to the above selections:
• For the history measurements the NE History Measurements page is displayedwith a list of the historical measurements of the previously selected performance
measurements point.
• For the current measurements the NE Current Measurements page is displayedwith a list of the current measurements of the previously selected performance
measurements point.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To define filter criteria for the presentation of PMinformation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-12 365-312-877R7.2Issue 4 November 2009
To define an Ethernet service route for round trip delaymeasurements
When to use
Use this task to:
• create an Ethernet service route for round trip delay (RTD) measurements,
• provision the related parameters of the test frame that is required for RTD
measurements,
Before you begin
Please observe the following before beginning the procedure:
• Proper LA card is installed in order to be able to make performance LA
measurements.
• Cross-connection should be enabled and VCG should be set to monitored.
• Provison VCG between source E and target E where RTD measurements is
performed. The WA ports (source/target E) used while creating VCG should match
with WA ports (source/target E) used while creating virtual switch and virtual
LA.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Connections→ Vitual Switches.
Result:The Vitual Switches page is displayed.
...................................................................................................................................................................................................
2 In the search for virtual switches panel click the New button right to the drop down
menu.
Result:The Add Virtual Switches page is displayed.
...................................................................................................................................................................................................
3 Do the following:
1. In the NE type field, select the type of the target E.
2. In the NE name field, enter the name of the source or target E.
3. In the Slot field, select the slot type. – ote: Changes of the “Virtual Switch mode”(item 4) can limit the value choices of this field.
4. For the Virtual Switch mode, click the radio button IEEE 802.1ad or IEEE802.1Q for the VLA bridge, then a preselection of the slot values used with therespective “Virtual Switch mode” value occurs.
Performance monitoring (PM) tasks To define an Ethernet service route for round trip delaymeasurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-13
ote: When selecting:
• IEEE 802.1ad, then QoS oversubscription option will get disappear from virtualswitch creation form. In this case QoS oversubscription is enabled by default.
• IEEE 802.1Q, then the option for QoS oversubscription in virtual switch creationform is displayed and it should be Enabled. If the QoS oversubscription option isDisabled, then RTD controller address cannot be retrieved from OMS which ismandatory for RTD measurement.
5. In the Label field, type the label name (optional).
6. For the Automatic VLAN ID registration mode, click the radio button Enabled.
7. For the QOS oversubscription, click the radio button Enabled, if the “VirtualSwitch mode” is IEEE 802.1Q (item 4).
8. For the Static MAC address table mode, click the radio button Enabled orDisabled (default) and for RTD measurement.
9. For the Dynamic MAC address table mode, click the radio button No specificlimit.
10. For LAN ports, move a LA port from the available field to the selected field byusing the > button between.
11. ForWAN ports, move a WA port from the available field to the selected field byusing the > button between.
12. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Add Virtual Switches page and the new Virtual Switch is added.
...................................................................................................................................................................................................
4 Do the following:
1. From the left navigation zone, click > left to Connections and then select VitualSwitches to open the Vitual Switches page or click directly on Vitual Switches inthe page title zone.
2. In the Virtual Switch mode field, select IEEE 802.1Q for the VLA bridge.
3. Click Search.
Result:The Virtual Switches panel is populated at the bottom containing a list of
records that meet your search criteria.
...................................................................................................................................................................................................
5 Mark the previously added Virtual Switch of task 3, select Virtual LAN list from the Go
menu and click Go.
Result:The Virtual LANs page is displayed.
...................................................................................................................................................................................................
6 In the search for virtual LAs panel click rightmost the New button.
Performance monitoring (PM) tasks To define an Ethernet service route for round trip delaymeasurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-14 365-312-877R7.2Issue 4 November 2009
Result:The Create Virtual LAN page is displayed.
...................................................................................................................................................................................................
7 Do the following:
1. In the VLAN ID field, select a VLA ID.
2. For LAN ports, move a LA port from the available field to the selected field byusing the > button between.
3. ForWAN ports, move a WA port from the available field to the selected field byusing the > button between.
4. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Create Virtual LAN page and the new Virtual LA is created.
...................................................................................................................................................................................................
8 Do the following:
1. From the left navigation zone, click > left to Connections and then select VitualSwitches to open the Vitual Switches page or click directly on Vitual Switches inthe page title zone.
2. In the Virtual Switch mode field, select IEEE 802.1Q for the VLA bridge.
3. Click Search.
Result:The Virtual Switches panel is populated at the bottom containing a list of
records that meet your search criteria.
...................................................................................................................................................................................................
9 Mark the previously added Virtual Switch of task 3, select Get round-trip-delay
controller address from the Go menu and click Go.
Result:A progress indication followed by a confirmation with (e.g. The
round-trip-delay controller address is 000f25112a83) is issued in the Message
section of the Virtual Switches page.
Use the Details button left to the NE name column to get more information of therespective virtual switch settings.
...................................................................................................................................................................................................
10 Mark the previously added Virtual Switch of task 3, select Service routes from the Go
menu and click Go.
Result:The Service Routes page is displayed.
...................................................................................................................................................................................................
11 In the search for service routes panel click rightmost the New button.
Performance monitoring (PM) tasks To define an Ethernet service route for round trip delaymeasurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-15
Result:The Create Service Route page is displayed.
...................................................................................................................................................................................................
12 Do the following:
1. In the Label field, type a up to 20 character long string.
2. In the Destination MAC Address field, type the RTD controller address (task 9) ofthe target E or fetch it from the Job updates page. Use the Details button left tothe Response status column to receive/copy the respective data.
3. In the VLAN Id field, type the VLA id (task 7) or fetch it from the Job updatespage. Use the Details button left to the Response status column to receive/copy therespective data.
4. For the Frame color, select Green, if not previously selected.
5. For the Traffic class, select 0, if not previously selected.
6. In the Frame length field, type minimum 64.
7. Select Perform one-shot measurement, this affects that after submission aone-shot measurement will be automatically performed. If this field is “not selected”
the one-shot measurement can be perform later, refer to task
Performing a one-time round trip delay measurement for test
purposes.
8. Click Submit.
Result:A progress indication followed by a confirmation (e.g. one-shot measurement
time was 5309 microseconds) is issued in the Message section of the Create
Service Route page.
...................................................................................................................................................................................................
13 Retry task 2 to 12 to create the virtual settings of the target E and then continue with
task 14.
...................................................................................................................................................................................................
14 Do the following:
1. From the left navigation zone, click > left to Connections and then select NetworkConnections to open the Network Connections page.
2. In the Connection name field, type * for wildcard search.
3. Click Search.
Result:The Network Connections panel is populated at the bottom containing a
list of records that meet your search criteria. Use the Details button left to the
Connection name column to view the complete RTD measurement connection
settings.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To define an Ethernet service route for round trip delaymeasurements
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-16 365-312-877R7.2Issue 4 November 2009
To modify traffic classes
When to use
Use this task to modify traffic classes .
Before you begin
Be sure that proper LA card with Ethernet connections already exists, otherwise this
task cannot be performed.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Connections→ Vitual Switches.
Result:The Vitual Switches page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE name field, enter the name of target E (optional).
2. In the Virtual Switch mode, select IEEE 802.1Q for the VLA bridge.
3. Click Search.
Result:The Virtual Switches panel is populated at the bottom containing a list of
records that meet your search criteria.
...................................................................................................................................................................................................
3 Mark the Virtual Switch E on which you wish to modify the traffic classes, select
Modify from the Go menu and click Go.
Result:The Modify Virtual Switches page is displayed.
...................................................................................................................................................................................................
4 For LAN ports, move a LA port from the available field to the selected field by using
the > button between, click right to the selected field on Port details.
Result:The Port details page appear.
...................................................................................................................................................................................................
5 Change the selection that are modifiable in the Quality of Service (QoS) panel and
click Submit.
Result:The Port details page close.
...................................................................................................................................................................................................
6 On the Modify Virtual Switches page click again Submit.
Performance monitoring (PM) tasks To modify traffic classes
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-17
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify Virtual Switches page and the traffic classes has been
modified.
ote: Use the Job updates to display the complete response status.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To modify traffic classes
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-18 365-312-877R7.2Issue 4 November 2009
To perform a one-time round trip delay measurement for testpurposes
When to use
Use this task to perform a one-time round trip delay measurement to a remote E in the
TransLA network.
Before you begin
Please observe the following before beginning the procedure:
• Proper LA card is installed in order to be able to make performance LA
measurements.
• Cross-connection should be enabled and VCG should be set to monitored.
• The task
To define an Ethernet service route for round trip delay
measurements is already done.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Connections→ Vitual Switches.
Result:The Vitual Switches page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE name field, enter the name of target E (optional).
2. In the Virtual Switch mode, select IEEE 802.1Q for the VLA bridge.
3. Click Search.
Result:The Virtual Switches panel is populated at the bottom containing a list of
records that meet your search criteria.
ote: If no records are displayed virtual settings have to be created, refer to taskTo define an Ethernet service route for round trip delay
measurements.
Performance monitoring (PM) tasks To perform a one-time round trip delay measurement fortest purposes
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-19
...................................................................................................................................................................................................
3 Do the following:
1. Use the Details button left to the NE name column to receive the informations if therespective virtual switch (settings) you wish to perform an one-time round-trip-delay
measurement is completely prepared.
ote: If the respective virtual switch (settings) are not completely prepared, refer to
task
To define an Ethernet service route for round trip delay
measurements to solve the missing entries.
2. Mark the Virtual Switch E on which you wish to perform an one-time
round-trip-delay measurement and select Service routes from the Go menu.
3. Click Go.
Result:The Service Routes page is displayed containing a list of records in the
bottom panel.
...................................................................................................................................................................................................
4 Mark the service route, if previously not marked, select Perform one-shot
measurement from the Go menu and click Go.
Result:A progress indication followed by a confirmation (e.g. one-shot measurement
time was 5309 microseconds) is issued in the Message section of the Service
Routes page.
Click the Refreshing button above the records list and in the column Lastmeasurement the last performed time measurement is displayed.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To perform a one-time round trip delay measurement fortest purposes
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-20 365-312-877R7.2Issue 4 November 2009
To start a cyclic round trip delay measurement
When to use
Use this task to start a cyclic round trip delay (RTD) measurement.
Before you begin
Please observe the following before beginning the procedure:
• Proper LA card is installed in order to be able to make performance LA
measurements.
• Cross-connection should be enabled and VCG should be set to monitored.
• The task
To define an Ethernet service route for round trip delay
measurements is already done.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Connections→ Network Connections.
Result:The Network Connections page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the Connection name field, type * for wildcard search.
2. Click Search.
Result:The Network Connections panel is populated at the bottom containing a
list of records that meet your search criteria. Use the Details button left to the
Connection name column to view informations about the complete RTD
measurement connection settings.
...................................................................................................................................................................................................
3 Do the following:
1. Mark the etwork Connection on which you wish to set a cyclic round trip delay
measurement and select Modify parameters from the Go menu.
2. Click Go.
Performance monitoring (PM) tasks To start a cyclic round trip delay measurement
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-21
Result:The Modify Connection Parameters page is displayed.
...................................................................................................................................................................................................
4 Do the following:
1. Click the+ to open the Assurance parameters panel and select Update assuranceparameters to set/change the cyclic round trip delay measurements.ote: Change the BI Directional … entries only for RTD measurements
2. For the BI Directional 24-hour collection type field, select Collect forcollecting, or Monitor for bi-directional monitoring the current RTD measurement.
3. In the BI Directional 24-hour monitoring field, select either None for nonbi-directional monitoring, or End ports for monitoring only the bi-directional endports, or All for monitoring all RTD measurements.
4. In the BI Directional 24-hour intervals (days) field, select either Infinite, or avalue between 0…7 days per week for the cyclic RTD measurement intervals.
5. Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Modify Connection Parameters page and the new cyclic of round
trip delay measurements is started (or changed).
To view performance monitoring information use the taskTo define filter criteria for the presentation of PM
information.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To start a cyclic round trip delay measurement
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-22 365-312-877R7.2Issue 4 November 2009
To delete an Ethernet service route
When to use
Use this task to delete an Ethernet service route for round trip delay (RTD)
measurements.
Before you begin
Be sure that proper LA card with Ethernet connections already exists, otherwise this
task cannot be performed.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path: Connections→ Vitual Switches.
Result:The Vitual Switches page is displayed.
...................................................................................................................................................................................................
2 Do the following:
1. In the NE name field, enter the name of target E (optional).
2. In the Virtual Switch mode, select IEEE 802.1Q for the VLA bridge.
3. Click Search.
Result:The Virtual Switches panel is populated at the bottom containing a list of
records that meet your search criteria.
...................................................................................................................................................................................................
3 Mark the Virtual Switch E on which you wish to delete a service route, select Service
routes from the Go menu and click Go.
Result:The Service Routes page is displayed containing a list of records in the
bottom panel.
...................................................................................................................................................................................................
4 Mark the service route, if previously not marked, select Delete from the Go menu and
click Go.
Result:A confirmation window appears asking you to confirm the deletion.
...................................................................................................................................................................................................
5 Click Yes.
Performance monitoring (PM) tasks To delete an Ethernet service route
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
15-23
Result:A progress indication followed by a confirmation is issued in the Message
section of the Service Routes page and the service route is deleted.
E N D O F S T E P S...................................................................................................................................................................................................
Performance monitoring (PM) tasks To delete an Ethernet service route
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
15-24 365-312-877R7.2Issue 4 November 2009
16 16Software and NE database
management concepts
Overview
Purpose
This chapter presents concept information related to software update on 1643 Access
Multiplexer AM / 1643 Access Multiplexer Small AMS network elements using OMS.
Contents
Functionality description 16-2
Software storage 16-5
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
16-1
Functionality description
Types of NE software
The management system is able to manage the software of Es in the network.
There are two types of E software:
• Applications, such as E generics or remote device generics
• Data files, such as E database versions. These contain the configuration data of the
E. It is commonly known as management information base (MIB) or as a backup.
To manage NE software
The management system allows you to manage software in the following ways:
• Manage E generics and remote device generics on the management system
• Manage E generics and remote device generics on the E
• Manage E database on the management system
• Manage E database on the E
In addition, the management system is able to perform tasks associated with software
management on a scheduled basis. The tasks can be scheduled to run as a one-time
activity to be started on a specific day and time or as a periodic activity to be started on a
recurring day and time.
Manage NE generics and remote device generics on the management system
Software management for software generics on the management system includes the
ability to add a software generic to the management system from a local removable
media, delete a software generic from the management system, transfer a software generic
from the management system to an E or to a remote device generic, support file
management capabilities for the software generic files from the management system,
view in-progress software generic transfers, and abort in-progress software generic
transfers.
Manage NE generics and remote device generics on NEs
The management system displays the software generics and the attributes that are present
on the Es. Additionally, the user can transfer a software generic from the management
system to an E or to a remote device generic, transfer a software generic from E to
E, activate a software generic on an E or on a remote device generic, abort an
in-progress software transfer, commit a software generic and revert to the inactive E
generic.
Software and NE database management concepts Functionality description
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
16-2 365-312-877R7.2Issue 4 November 2009
An upgrade of an E generic occurs in three steps:
1. “To add an E generic to the management system” (p. 17-4)
2. “To transfer an E generic from the management system to an E” (p. 17-6)
3. “To activate an E generic on an E” (p. 17-16)
A software E generic can be added to the management system file system from
CD-ROM. For file transfer from CD-ROM, the user simply physically loads the
CD-ROM because the management system can automatically mount the CD-ROM file
system. It is also possible to use other commonly available tools and applications to get
software files into the management system file system (for example, use file transfer
software, such as FTP, to transfer software to the management system over a network).
Activate NE generics and remote device generics
This feature allows the user to retrieve the release number of the software generic that is
active on the E or the remote device, retrieve the release number of the software generic
that is the standby (that is, the software generic that resides in the inactive partition of the
E), and activate the standby software generic.
Available functions are:
• Activate: MIB Clear – a new MIB is downloaded from the management system tothe E as a part of the activate process.
• Activate: No MIB Clear – a new MIB is not downloaded from the managementsystem to the E as part of the activate process.
Manage NE database on the management system
An E database file is a binary image of the complete memory of the E. Copies of the
E database file can be backed up onto the management system and used to perform E
restoration.
E database backup can be performed on-demand or per a schedule. The Scheduled
Tasks page is used to schedule backups. A default of up to three backup files can be saved
on the management system per E. When this limit is reached, the oldest file is
overwritten. For smaller networks, it is possible to have more than three backup files. See
your Lucent representative for more information.
The management system displays the view of E database stored on the management
system. The user can view the software memory files and their attributes. The user can
also perform other software management tasks such as create an E database backup on
the management system, and restore E database from a management system backup.
Software and NE database management concepts Functionality description
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
16-3
Manage NE database on the NE
The management system displays the view of E database stored on an E. It allows the
user to view the E software memory files and their attributes. It also allows the user to
perform other software management tasks, such as create an E database backup on the
management system, abort in progress E database transfer, activate E database and
restore E database from a management system backup.
Scheduling software management tasks
The management system allows searching for and scheduling the following software
management tasks:
• E database backup
• Transfer software generic from management system to E or to a remote device
• Transfer software generic from E to E
• Activate software generic
• Activate E database
• Activate E generic and memory
Software and NE database management concepts Functionality description
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
16-4 365-312-877R7.2Issue 4 November 2009
Software storage
Introduction
1643 Access Multiplexer AM / 1643 Access Multiplexer Small AMS supporting SHDSL
have a dual instance non-volatile store on the main controller unit.
System controller software
The main instance of the dual instance non-volatile store on the main controller unit
contains the software to control and support the E. It contains an active and a backup
version. The manufacturers executable code (MEC) file contains the complete software
package for one E. The software in the main controller unit is also used to provide a
basic configuration to the units connected to the main controller unit. These other
assigned units obtain the appropriate part of the software package from the main
controller unit during the system start-up or when a unit is inserted.
Switch stores
With a switch command from the management system, the software (MEC) in the backup
store can be made active. The switch command switches between the two stores, thus the
active store becomes the backup store and vice versa.
NTU software
The TU instanceof the dual instance non-volatile store on the main controller unit
contains the TU software image. If the E in question does not support SHDSL, the
TU instance is not used.
Switch stores
With a switch command from the management system, the TU software in the backup
store can be made active. The switch command switches between the two stores, thus the
active store becomes the backup store and vice versa.
Diagram
The use of software stores is shown in the following figure:
Software and NE database management concepts Software storage
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
16-5
Commit the software
After confirmation of a switch command between the active and backup store, the
management system loses its association with the E for approximately 10 minutes. If the
management system can renew the association with the E the active store is committed.
If the active store is not committed within two hours after the switch, the E will switch
back to the old software load.
Non-volatilestore 1
Non-volatilestore 2
Processor
Controller unit
Programstore (RAM)
Processor
Other units
Network elementManagement system
Non-volatilestore 1
Non-volatilestore 2
Main
NTU
activebackup
backupactive
SW switch
activebackup
backupactive
SW switch
Software and NE database management concepts Software storage
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
16-6 365-312-877R7.2Issue 4 November 2009
17 17Software and NE database
management tasks
Overview
Purpose
This chapter informs about how to perform the most common tasks related to software
management.
Contents
Tasks related to E generics 17-3
To view a list of E generics stored on the management system 17-3
To add an E generic to the management system 17-4
To delete an E generic from the management system 17-5
To transfer an E generic from the management system to an E 17-6
To schedule the transfer of an E generic from the management system to an
E
17-8
To view a list of in-progress transfers of E generics 17-10
To abort an in-progress E generic transfer 17-11
To view a list of E generics stored on an E 17-14
To activate an E generic on an E 17-16
To schedule E generic activation 17-19
Tasks related to generics on remote devices 17-22
To transfer a remote device generic from the management system to an E 17-22
To activate a remote device generic on an E 17-24
To transfer a remote device generic from an E to a remote device 17-27
To activate a remote device generic 17-30
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-1
To schedule the transfer of a remote device generic from an E to a remote
device
17-32
To schedule the activation of a remote device generic 17-35
Tasks related to E databases 17-38
To view a list of E database versions stored on the management system 17-38
To view a list of E database versions stored on an E 17-41
To back up E database versions onto the management system 17-42
To schedule the backup of an E database version onto the management system 17-47
To restore an E database version from the management system to an E 17-49
Software and NE database management tasks Overview
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-2 365-312-877R7.2Issue 4 November 2009
Tasks related to NE generics
To view a list of NE generics stored on the managementsystem
When to use
Use this task to view a list of E generics stored on the management system.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
5 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo view a list of NE generics stored on the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-3
To add an NE generic to the management system
When to use
Use this task to add an E generic to the management system.
Task
...................................................................................................................................................................................................
1 Insert the CD-ROM that contains the E generic into the CD-ROM drive of the server.
...................................................................................................................................................................................................
2
Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software operation field, select Add E generic to management system and
click Go.
Result:The Add NE Generic to Management System page is displayed.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E.
...................................................................................................................................................................................................
5
In the Software load file field, select the software load file on the storage device which
is to be added to the management system. This field is displayed for the E types that
support multiple software load files per external media.
...................................................................................................................................................................................................
6 Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Add NE Generic to Management System page, and the E generic
is added to the management system. The management system logs this activity in the
User Activity Log. The CD-ROM is unmounted automatically, and the user can push
the “Eject” button to retrieve the CD-ROM from the drive.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo add an NE generic to the management system
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-4 365-312-877R7.2Issue 4 November 2009
To delete an NE generic from the management system
When to use
Use this task to delete an E generic from the management system.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
5 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
6 Click the radio button next to the E generic that you wish to delete. From the Go menu,
select Delete NE generic from management system and click Go.
Result:A confirmation window is displayed.
...................................................................................................................................................................................................
7 Confirm that you want to proceed with the deletion.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Software page, and the software is deleted from the management
system. The management system logs this activity in the User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo delete an NE generic from the management system
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-5
To transfer an NE generic from the management system to anNE
When to use
Use this task to transfer an E generic from the management system to an E.
Important! The transfer of an E generic from the management system to an E is a
lengthy process that may take up to a few hours to complete.
Before you begin
Because each type of E has individual requirements (hardware and software) and the
order in which certain steps must be performed is particular to the E, the documentation
for the Es should be consulted for software installation and upgrade procedures.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. The Background Task Status section
of this page allows you to monitor the status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
6 Click Search.
Software and NE database management tasks Tasks related to NE genericsTo transfer an NE generic from the management system
to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-6 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the E generic that you wish to transfer. From the Go
menu, select Download from management system to NE and click Go.
Result:The Download from management system to NE page is displayed.
...................................................................................................................................................................................................
8 Select the E to which the E generic will be transferred.
...................................................................................................................................................................................................
9 Click Submit.
Result:A confirmation window is displayed asking you to confirm the transfer of the
E generic.
...................................................................................................................................................................................................
10 Click Yes.
Result:The system initiates the software transfer from the management system to the
E. The management system notes the progress of the operation in the Background
Task Status section of the Job Updates page, and logs this activity in the User
Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo transfer an NE generic from the management system
to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-7
To schedule the transfer of an NE generic from themanagement system to an NE
When to use
Use this task to schedule the transfer of an E generic from the management system to an
E.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
5 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
6 Click the radio button next to the E generic to which you want to schedule the software
transfer. From the Go menu, select Schedule download from management system
to NE and click Go.
Result:The Schedule download from management system to NE page is
displayed. It is prepopulated with read-only information about the selected E generic
and, depending on the E type. Additional fields may be displayed to provide further
selections.
...................................................................................................................................................................................................
7 To schedule the frequency, click the calendar icon after the Scheduled Date field.
Software and NE database management tasks Tasks related to NE genericsTo schedule the transfer of an NE generic from the
management system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-8 365-312-877R7.2Issue 4 November 2009
Result:A Date/Time Chooser window is displayed. Select the scheduled start date.
...................................................................................................................................................................................................
8 In the Schedule options panel change the entries or selections for any modifiable fields
that you wish to update:
• In the Scheduled time field, enter the time in the format “hh:mm:ss”. The timeentered applies for both the start and end date
• In the Scheduled task name field, enter a user defined name for the scheduled taskor allow the system to generate a default value. ote: The scheduled task name
cannot be modified once the task is created.
• In the Number of retries field, select the number of times (1 to 4) the scheduledtask will be retried in case of error or no retries.
• In the Execution Interval field, select the number of hours this task should beperformed from the drop down list. Possible values are from 1 hour to 12 hours and
Continuous.
• In the Retry interval field, select the interval of time that will pass between retries.Possible values are 1 min. to 60 min.
...................................................................................................................................................................................................
9 Click Submit.
Result:The scheduled task is added.
Reference
For detailed information about how to view a list of scheduled tasks, how to modify
scheduled tasks, and how to delete scheduled tasks, refer to OMS etwork Element
Management Guide – Tools – Scheduled Tasks.
Software and NE database management tasks Tasks related to NE genericsTo schedule the transfer of an NE generic from the
management system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-9
E N D O F S T E P S...................................................................................................................................................................................................
To view a list of in-progress transfers of NE generics
When to use
Use this task to view a list of in-progress transfers of E generics.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
5 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
6 Click the radio button next to any entry in the list. From the Go menu, select View in
progress NE generic transfers and click Go.
Result:The Software page is displayed, and includes a list of E generic transfers
that are in-progress and met the search criteria in the previous step.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo view a list of in-progress transfers of NE generics
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-10 365-312-877R7.2Issue 4 November 2009
To abort an in-progress NE generic transfer
When to use
Use this task to abort an in progress E generic transfer. Both management system to E
and E to E transfers can be aborted.
There are three methods for this task.
Task, method 1: from the In-Progress NE Generic Transfers page
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
6 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to any entry in the list. From the Go menu, select View in
progress NE generic transfers and click Go.
Result:The Software page is displayed, and includes a list of E generic transfers
that are in-progress and met the search criteria in the previous step.
...................................................................................................................................................................................................
8 Click the radio button next to the transfer you wish to halt. From the Go menu, select
Abort NE generic transfer and click Go.
Software and NE database management tasks Tasks related to NE genericsTo abort an in-progress NE generic transfer
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-11
Result:The Abort NE generic transfer window opens.
...................................................................................................................................................................................................
9 Click Submit.
Result:A confirmation window is displayed asking you to confirm the halt of the E
generic transfer.
...................................................................................................................................................................................................
10 Click OK.
Result:The selected E generic transfer is halted.
The management system notes the progress of two tasks in the Job Updates page.The original transfer task is marked as failed, and the abort task is marked as success.The management system logs these activities in the User Activity Log.
Task, method 2: from the list of NE generics stored on an NE
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All and populate the field NE Generic with therespective version number.
Software and NE database management tasks Tasks related to NE genericsTo abort an in-progress NE generic transfer
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-12 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific E generic, the list of entries in the search
results table include all Es that contain an active release matching the search
criteria.
Additionally, the list includes all software generics on any E that has a matching
software generic in the active release. For example, if the software generic in the
active version of the E matches the search criteria but the generic in the inactive
partition does not, both still appear in the search results table. This means that
some rows of the table may have a different release than the selected search
criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the transfer you wish to halt. From the Go menu, select
Abort NE generic transfer and click Go.
Result:The Abort NE generic transfer window opens.
...................................................................................................................................................................................................
8 Click Submit.
Result:A confirmation window is displayed asking you to confirm the halt of the E
generic transfer.
...................................................................................................................................................................................................
9 Click OK.
Result:The selected E generic transfer is halted.
The management system notes the progress of two tasks in the Job Updates page.The original transfer task is marked as failed, and the abort task is marked as success.The management system logs these activities in the User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo abort an in-progress NE generic transfer
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-13
To view a list of NE generics stored on an NE
When to use
Use this task to view a list of E generics stored on an E.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select NE.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E.
...................................................................................................................................................................................................
5 Do one of the following:
• In the NE Name field, select the name of E in question.
•
In the NE Name field, select All.
– In the field NE generic partition, select either Active or Inactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the E generic to include in the search criteria. As an alternative, type in an
E generic name in the text box.
Click Search.
Software and NE database management tasks Tasks related to NE genericsTo view a list of NE generics stored on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-14 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific E generic, the list of entries in the search
results table include all Es that contain an active release matching the search
criteria.
Additionally, the list includes all software generics on any E that has a matching
software generic in the active release. For example, if the software generic in the
active version of the E matches the search criteria but the generic in the inactive
partition does not, both still appear in the search results table. This means that
some rows of the table may have a different release than the selected search
criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo view a list of NE generics stored on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-15
To activate an NE generic on an NE
When to use
Use this task to activate an E generic on an E.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name and the NE generic partition fields, select All.
If you want to specify, select:
– In the field NE generic partition either Active or Inactive.
– In the field NE generic type the Release number (for example “5.0.1”) or theItem code (for example “SCA358”) of the E generic in question.
Populate the field NE Generic with the respective version number. The NE Genericlabel is a hyperlink to the NE Generic Selection page from which to select the Egeneric to include in the search criteria. As an alternative, type in an E generic name
in the text box.
Click Search.
Software and NE database management tasks Tasks related to NE genericsTo activate an NE generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-16 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific E generic, the list of entries in the search
results table include all Es that contain an active release matching the search
criteria.
Additionally, the list includes all software generics on any E that has a matching
software generic in the active release. For example, if the software generic in the
active version of the E matches the search criteria but the generic in the inactive
partition does not, both still appear in the search results table. This means that
some rows of the table may have a different release than the selected search
criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the E for which you wish to activate the inactive E
generic.
From the Go menu, select Activate and click Go.
Result:The Activate NE generic page is displayed. In that page, most of the fields
are pre-populated according to your previous selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Activation type – select MIB Clear if you want the management information base(MIB) to be cleared with the activation of the E generic, or o MIB Clear if not.
• Activation order – select System default to use the default rules for establishingthe order of Es within the grouping, or select User defined to place the E in thequeue using the order defined in the Selected NE list.
• Instance – select Main.
• Continue if the inactive NE generic is the same as the current active NEgeneric – specify whether or not the activation process should continue if theinactive E generic is the same as the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is the same as the
active release of the E.
• Continue if the inactive NE generic is the older than the current activeNE generic – specify whether or not the activation process should continue if theinactive E generic is the older than the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is older than the
active release of the E.
Software and NE database management tasks Tasks related to NE genericsTo activate an NE generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-17
Click Submit.
Result:The E generic in the inactive partition is installed in the active partition and
the E reboots to update the current running version of the software.
The management system notes the progress of the operation in the Job Updatespage, and logs this activity in the User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE genericsTo activate an NE generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-18 365-312-877R7.2Issue 4 November 2009
To schedule NE generic activation
When to use
Use this task to schedule an E generic activation.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software type field, select NE generic.
...................................................................................................................................................................................................
3 In the Software stored on field, select NE.
...................................................................................................................................................................................................
4 In the NE type field, select a type of E.
...................................................................................................................................................................................................
5 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All and populate the field NE Generic with therespective version number.
Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific E generic, the list of entries in the search
results table include all Es that contain an active release matching the search
criteria.
Additionally, the list includes all software generics on any E that has a matching
software generic in the active release. For example, if the software generic in the
active version of the E matches the search criteria but the generic in the inactive
partition does not, both still appear in the search results table. This means that
some rows of the table may have a different release than the selected search
criteria.
Software and NE database management tasks Tasks related to NE genericsTo schedule NE generic activation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-19
...................................................................................................................................................................................................
6 Click the radio button next to the E for which you wish to schedule activation of the
inactive E generic.
From the Go menu, select Schedule activate and click Go.
Result:The Activate NE generic page is displayed. In that page, most of the fields
are prepopulated according to your previous selections.
...................................................................................................................................................................................................
7 Change the entries or selections for any modifiable fields that you wish to update.
• Activation type – select MIB Clear if you want the management information base(MIB) to be cleared with the activation of the E generic, or o MIB Clear if not.
• Activation order – select System default to use the default rules for establishingthe order of Es within the grouping, or select User defined to place the E in thequeue using the order defined in the Selected NE list.
• Continue if the inactive NE generic is the same as the current active NEgeneric – specify whether or not the activation process should continue if theinactive E generic is the same as the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is the same as the
active release of the E.
• Continue if the inactive NE generic is the older than the current activeNE generic – specify whether or not the activation process should continue if theinactive E generic is the older than the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is older than the
active release of the E.
Click Schedule.
Result:The Schedule activate NE generic page is displayed.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Scheduled Date – select the date from which the scheduled task should begin fromthe pop-up calendar.
• Scheduled time – enter the scheduled time for the task to begin. Enter a value usingthe format hh:mm:ss ([0 to 23]:[0 to 59]:[0 to 59]).
• Scheduled task name enter an optional name for the scheduled task or allow thesystem to generate a default value. Once created, the scheduled task name cannot be
modified.
• Number of retries – select the number of times (1 to 4) the scheduled task will beretried in case of error or no retries.
Software and NE database management tasks Tasks related to NE genericsTo schedule NE generic activation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-20 365-312-877R7.2Issue 4 November 2009
• Execution interval – specify the interval at which the scheduled task should begin.Possible values are 1 hour to 12 hours in 1 hour increments and the value
“Continuous”.
• Retry interval – select the interval of time that will pass between retries. Possiblevalues are 1 min. to 60 min.
Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Schedule activate NE generic page, and the scheduled task is
added.
Reference
For detailed information about how to view a list of scheduled tasks, how to modify
scheduled tasks, and how to delete scheduled tasks, refer to OMS etwork Element
Management Guide – Tools – Scheduled Tasks.
Software and NE database management tasks Tasks related to NE genericsTo schedule NE generic activation
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-21
E N D O F S T E P S...................................................................................................................................................................................................
Tasks related to generics on remote devices
To transfer a remote device generic from the managementsystem to an NE
When to use
Use this task to transfer a remote device generic from the management system to a
network element.
Important! The transfer of an E generic from the management system to an E is a
lengthy process that may take up to a few hours to complete.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. The Background Task Status section
of this page allows you to monitor the status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E or select All.
...................................................................................................................................................................................................
6 Click Search.
Software and NE database management tasks Tasks related to generics on remote devicesTo transfer a remote device generic from the
management system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-22 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics and the E generics stored on the management system that
meet your search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the remote device generic that you wish to transfer. From
the Go menu, select Download from management system to NE and click Go.
Result:The Download from management system to NE page is displayed.
...................................................................................................................................................................................................
8 Select the E to which the remote device generic will be transferred.
...................................................................................................................................................................................................
9 Click Submit.
Result:A confirmation window is displayed asking you to confirm the transfer of the
remote device generic.
...................................................................................................................................................................................................
10 Click Yes.
Result:The system initiates the software transfer from the management system to the
E. The management system notes the progress of the operation in the Background
Task Status section of the Job Updates page, and logs this activity in the User
Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to generics on remote devicesTo transfer a remote device generic from the
management system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-23
To activate a remote device generic on an NE
When to use
Use this task to activate a remote device generic on an E.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All.
– In the field NE generic partition, select either Remote Active or RemoteInactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the remote device generic to include in the search criteria. As an alternative,
type in a remote device generic name in the text box.
Click Search.
Software and NE database management tasks Tasks related to generics on remote devicesTo activate a remote device generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-24 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific remote device generic, the list of entries in
the search results table include all Es that contain an active release matching the
search criteria.
Additionally, the list includes all generics on any E that has a matching generic
in the active release. For example, if the generic in the active version of the E
matches the search criteria but the generic in the inactive partition does not, both
still appear in the search results table. This means that some rows of the table may
have a different release than the selected search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the E for which you wish to activate the inactive remote
device generic.
From the Go menu, select Activate and click Go.
Result:The Activate NE generic page is displayed. In that page, most of the fields
are pre-populated according to your previous selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Activation type – select MIB Clear if you want the management information base(MIB) to be cleared with the activation of the E generic, or o MIB Clear if not.
• Activation order – select System default to use the default rules for establishingthe order of Es within the grouping, or select User defined to place the E in thequeue using the order defined in the Selected NE list.
• Instance – select Remote device.
• Continue if the inactive NE generic is the same as the current active NEgeneric – specify whether or not the activation process should continue if theinactive E generic is the same as the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is the same as the
active release of the E.
• Continue if the inactive NE generic is the older than the current activeNE generic – specify whether or not the activation process should continue if theinactive E generic is the older than the current active E generic. If you select no,
when the management system is executing the download request, it does not attempt
to activate software for any E where the inactive release of the E is older than the
active release of the E.
Click Submit.
Software and NE database management tasks Tasks related to generics on remote devicesTo activate a remote device generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-25
Result:The remote device generic in the inactive partition is installed in the active
partition.
The management system notes the progress of the operation in the Job Updatespage, and logs this activity in the User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to generics on remote devicesTo activate a remote device generic on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-26 365-312-877R7.2Issue 4 November 2009
To transfer a remote device generic from an NE to a remotedevice
When to use
Use this task to transfer a remote device generic from an E to a remote device.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All.
– In the field NE generic partition, select either Remote Active or RemoteInactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the remote device generic to include in the search criteria. As an alternative,
type in a remote device generic name in the text box.
Click Search.
Software and NE database management tasks Tasks related to generics on remote devicesTo transfer a remote device generic from an NE to a
remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-27
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific remote device generic, the list of entries in
the search results table include all Es that contain an active release matching the
search criteria.
Additionally, the list includes all generics on any E that has a matching generic
in the active release. For example, if the generic in the active version of the E
matches the search criteria but the generic in the inactive partition does not, both
still appear in the search results table. This means that some rows of the table may
have a different release than the selected search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the E from which you wish to transfer the remote device
generic.
From the Go menu, select Download NE generic from NE to remote device and
click Go.
Result:The Download NE generic from NE to remote device page is
displayed. In that page, most of the fields are pre-populated according to your
previous selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Remote device type – select the type of remote device from the list.
• Remote device list – is used to select the remote devices to which the generic willbe transferred. Based on the selected remote device type, the Available panel lists theIDs of available remote devices of that type. Use the arrow keys to move the remote
devices in question to the Selected panel.
• Continuously monitor percent complete – select Yes if you want themanagement system to monitor and display the transfer process.
Click Submit.
Result:The management system checks the consistency of the parameters specified
and informs about the results in the Message section of the page.
A windows opens informing about the fact that the download is a lengthy process.
...................................................................................................................................................................................................
9 Click Yes.
Software and NE database management tasks Tasks related to generics on remote devicesTo transfer a remote device generic from an NE to a
remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-28 365-312-877R7.2Issue 4 November 2009
Result:The transfer of the generic starts. The management system notes the progress
of the operation in the Job Updates page, and logs this activity in the User Activity
Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to generics on remote devicesTo transfer a remote device generic from an NE to a
remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-29
To activate a remote device generic
When to use
Use this task to activate the software (the remote device generic) on one or more remote
devices.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All.
– In the field NE generic partition, select either Remote Active or RemoteInactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the remote device generic to include in the search criteria. As an alternative,
type in a remote device generic name in the text box.
Click Search.
Software and NE database management tasks Tasks related to generics on remote devicesTo activate a remote device generic
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-30 365-312-877R7.2Issue 4 November 2009
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific remote device generic, the list of entries in
the search results table include all Es that contain an active release matching the
search criteria.
Additionally, the list includes all generics on any E that has a matching generic
in the active release. For example, if the generic in the active version of the E
matches the search criteria but the generic in the inactive partition does not, both
still appear in the search results table. This means that some rows of the table may
have a different release than the selected search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the generic that you want to activate.
From the Go menu, select Activate remote device and click Go.
Result:The Activate remote device page is displayed. In that page, most of the
fields are pre-populated according to your previous selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Remote device type – select the type of remote device from the list.
• Remote device list – is used to select the remote devices on which the generic willbe activated. Based on the selected remote device type, the Available panel lists theIDs of available remote devices of that type. Use the arrow keys to move the remote
devices in question to the Selected panel.
Click Submit.
Result:The management system checks the consistency of the parameters specified
and informs about the results in the Message section of the page.
A windows opens informing about the fact that the activation is a lengthy process.
...................................................................................................................................................................................................
9 Click Yes.
Result:The activation of the remote device generic on the selected remote devices
starts. The management system notes the progress of the operation in the Job
Updates page, and logs this activity in the User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to generics on remote devicesTo activate a remote device generic
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-31
To schedule the transfer of a remote device generic from anNE to a remote device
When to use
Use this task to schedule the transfer of a remote device generic from an E to a remote
device.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All.
– In the field NE generic partition, select either Remote Active or RemoteInactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the remote device generic to include in the search criteria. As an alternative,
type in a remote device generic name in the text box.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the transfer of a remote device generic from
an NE to a remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-32 365-312-877R7.2Issue 4 November 2009
Click Search.
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific remote device generic, the list of entries in
the search results table include all Es that contain an active release matching the
search criteria.
Additionally, the list includes all generics on any E that has a matching generic
in the active release. For example, if the generic in the active version of the E
matches the search criteria but the generic in the inactive partition does not, both
still appear in the search results table. This means that some rows of the table may
have a different release than the selected search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the generic you wish to transfer to the remote device.
From the Go menu, select Schedule download NE generic from NE to remote
device and click Go.
Result:The Schedule download from NE to remote device page is displayed.
In that page, most of the fields are pre-populated according to your previous
selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Remote device type – select the type of remote device from the list.
• Remote device list – is used to select the remote devices to which the generic willbe transferred. Based on the selected remote device type, the Available panel lists theIDs of available remote devices of that type. Use the arrow keys to move the remote
devices in question to the Selected panel.
• Continuously monitor percent complete – select Yes if you want themanagement system to monitor and display the transfer process.
Click Schedule.
Result:The management system checks the consistency of the parameters specified.
The Scheduled Task window opens.
...................................................................................................................................................................................................
9 To schedule the date, click the calendar icon in the Scheduled Date field.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the transfer of a remote device generic from
an NE to a remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-33
Result:A Date/Time Chooser window is displayed. Select the scheduled start date.
...................................................................................................................................................................................................
10 In the Scheduled time field, enter the time in the format “hh:mm:ss”. The time entered
applies for both the start and end date.
In the Scheduled task name field, enter a user defined name for the scheduled task or
allow the system to generate a default value. ote: The scheduled task name cannot be
modified once the task is created.
In the Number of retries field, select the number of times (1 to 4) the scheduled task
will be retried in case of error or no retries.
In the Execution interval field, select the number of hours this task should be
performed from the drop down list. Possible values are from 1 to 12 hours and
Continuous.
In the Retry interval field, select the interval of time that will pass between retries.
Possible values are 1 to 60 minutes.
...................................................................................................................................................................................................
11 Click Submit.
Result:The scheduled task is added.
Reference
For detailed information about how to view a list of scheduled tasks, how to modify
scheduled tasks, and how to delete scheduled tasks, refer to OMS etwork Element
Management Guide – Tools – Scheduled Tasks.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the transfer of a remote device generic from
an NE to a remote device...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-34 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
To schedule the activation of a remote device generic
When to use
Use this task to schedule the activation of the software (the remote device generic) on a
remote device.
Task
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software type field, select NE generic.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 Do one of the following:
• In the NE Name field, select the name of E in question.
• In the NE Name field, select All.
– In the field NE generic partition, select either Remote Active or RemoteInactive.
– In the field NE generic type, select Release number, if you want to specifythe release number (for example “5.0.1”) or Item code, if you want to specify theitem code (for example “SCA358”) of the E generic in question.
– Populate the field NE Generic with the respective version number. The NEgeneric label is a hyperlink to the NE Generic Selection page from which toselect the remote device generic to include in the search criteria. As an alternative,
type in a remote device generic name in the text box.
Click Search.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the activation of a remote device generic
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-35
Result:The list at the bottom of the Software page is populated with a list of the
remote device generics stored on the E.
The following applies to the search results:
• If the search criteria is for a specific E, the search results table includes matches
in both the active and inactive E partitions.
• If the search criteria is for a specific remote device generic, the list of entries in
the search results table include all Es that contain an active release matching the
search criteria.
Additionally, the list includes all generics on any E that has a matching generic
in the active release. For example, if the generic in the active version of the E
matches the search criteria but the generic in the inactive partition does not, both
still appear in the search results table. This means that some rows of the table may
have a different release than the selected search criteria.
...................................................................................................................................................................................................
7 Click the radio button next to the generic that you want to activate.
From the Go menu, select Schedule activate remote device and click Go.
Result:The Schedule activate remote device page is displayed. In that page,
most of the fields are pre-populated according to your previous selections.
...................................................................................................................................................................................................
8 Change the entries or selections for any modifiable fields that you wish to update.
• Remote device type – select the type of remote device from the list.
• Remote device list – is used to select the remote devices to which the generic willbe transferred. Based on the selected remote device type, the Available panel lists theIDs of available remote devices of that type. Use the arrow keys to move the remote
devices in question to the Selected panel.
Click Schedule.
Result:The management system checks the consistency of the parameters specified.
The Scheduled Task window opens.
...................................................................................................................................................................................................
9 To schedule the date, click the calendar icon in the Scheduled Date field.
Result:A Date/Time Chooser window is displayed. Select the scheduled start date.
...................................................................................................................................................................................................
10 In the Scheduled time field, enter the time in the format “hh:mm:ss”. The time entered
applies for both the start and end date.
In the Scheduled task name field, enter a user defined name for the scheduled task or
allow the system to generate a default value. ote: The scheduled task name cannot be
modified once the task is created.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the activation of a remote device generic
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-36 365-312-877R7.2Issue 4 November 2009
In the Number of retries field, select the number of times (1 to 4) the scheduled task
will be retried in case of error or no retries.
In the Execution interval field, select the number of hours this task should be
performed from the drop down list. Possible values are from 1 to 12 hours and
Continuous.
In the Retry interval field, select the interval of time that will pass between retries.
Possible values are 1 to 60 minutes.
...................................................................................................................................................................................................
11 Click Submit.
Result:The scheduled task is added.
Reference
For detailed information about how to view a list of scheduled tasks, how to modify
scheduled tasks, and how to delete scheduled tasks, refer to OMS etwork Element
Management Guide – Tools – Scheduled Tasks.
Software and NE database management tasks Tasks related to generics on remote devicesTo schedule the activation of a remote device generic
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-37
E N D O F S T E P S...................................................................................................................................................................................................
Tasks related to NE databases
To view a list of NE database versions stored on themanagement system
When to use
Use this task to view a list of E database versions (that means backups of the MIBs)
stored on the management system.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software operation field, select Search.
...................................................................................................................................................................................................
3 In the Software type field, select NE database.
...................................................................................................................................................................................................
4 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 In the NE name field, select the name of an E or select All.
...................................................................................................................................................................................................
7 In the NE generic partition field, select the type of partition (optional):
• Active – the software currently running on the E.
• Inactive – the software is stored in the inactive or backup partition of the E.
• All
...................................................................................................................................................................................................
8 In the NE generic type field, select either the Release number or Item code format for
the E generic (optional).
Software and NE database management tasks Tasks related to NE databasesTo view a list of NE database versions stored on the
management system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-38 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
9 In the NE generic field, the E generic label is a hyperlink to the NE Generic
Selection page from which to select the E generic to include in the search criteria, or
type in an E generic name in the text box. (optional).
...................................................................................................................................................................................................
10 Populate the NE group search field, select the radio button to perform a search by one
of the following options below (optional).
When searching for an E generic on E, the available radio buttons are: Ring and
Aggregate.
When searching for an E database on the management system, the available radio
buttons are: Ring, Aggregate, and NCG.
Meaning of the options:
• Aggregate – the aggregate label is a hyperlink to the Aggregate Selection pagefrom which to select aggregates to include in the search criteria, or type in an
aggregate name in the text box.
• Ring – the ring label is a hyperlink to the Ring Selection page from which to selectrings to include in the search criteria, or type in a ring name in the text box.
• NCG – the CG label is a hyperlink to the NCG Selection page from which to selectCGs to include in the search criteria, or type in an CG name in the text box.
...................................................................................................................................................................................................
11 In the Backup Status field, select the backup status. Valid for the backup E database
on the management system operation only (optional).
• If the selected NE type or NE name is All, the possible values in the drop down listare: Last backups, Last successful backups, Failed backups, In progressbackups, or No successful backups.
• If the selected NE name is any value except All, the possible values in the drop downlist are: All backups, Last backup, or All successful backups.
...................................................................................................................................................................................................
12 In the Date and time: from field, enter the date and time. Click on the calendar icon to
display the Date/Time Chooser from which to select the date and time (optional).
...................................................................................................................................................................................................
13 In the Date and time: to field, enter the date and time. Click on the calendar icon to
display the Date/Time Chooser from which to select the date and time (optional).
...................................................................................................................................................................................................
14 Click Search.
Software and NE database management tasks Tasks related to NE databasesTo view a list of NE database versions stored on the
management system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-39
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on the management system that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE databasesTo view a list of NE database versions stored on the
management system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-40 365-312-877R7.2Issue 4 November 2009
To view a list of NE database versions stored on an NE
When to use
Use this task to view a list of E database versions stored on an E.
Task
...................................................................................................................................................................................................
1 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
2 In the Software operation field, select Search.
...................................................................................................................................................................................................
3 In the Software type field, select NE database.
...................................................................................................................................................................................................
4 In the Software stored on field, select NE.
...................................................................................................................................................................................................
5 In the NE type field, select a type of E.
...................................................................................................................................................................................................
6 In the NE name field, select the name of an E.
...................................................................................................................................................................................................
7 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on an E that meet your search criteria.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE databasesTo view a list of NE database versions stored on an NE
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-41
To back up NE database versions onto the management system
When to use
Use this task to back up E database versions, that means to back up the MIB onto the
management system.
There are two methods for this task.
Task, method 1: from the list of NE database versions on the management system
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software operation field, select Search.
...................................................................................................................................................................................................
4 In the Software type field, select NE database.
...................................................................................................................................................................................................
5 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
6 In the NE type field, select a type of E.
...................................................................................................................................................................................................
7 In the NE name field, select the name of an E or select All.
...................................................................................................................................................................................................
8 In the NE generic partition field, select the type of partition (optional):
• Active – the software currently running on the E.
• Inactive – the software is stored in the inactive or backup partition of the E.
• All
Software and NE database management tasks Tasks related to NE databasesTo back up NE database versions onto the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-42 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
9 In the NE generic type field, select either the Release number or Item code format for
the E generic (optional).
...................................................................................................................................................................................................
10 In the NE generic field, the E generic label is a hyperlink to the NE Generic
Selection page from which to select the E generic to include in the search criteria, or
type in an E generic name in the text box. (optional).
...................................................................................................................................................................................................
11 Populate the NE group search field, select the radio button to perform a search by one
of the following options below (optional).
When searching for an E generic on E, the available radio buttons are: Ring and
Aggregate.
When searching for an E database on the management system, the available radio
buttons are: Ring, Aggregate, and NCG.
Meaning of the options:
• Aggregate – the aggregate label is a hyperlink to the Aggregate Selection pagefrom which to select aggregates to include in the search criteria, or type in an
aggregate name in the text box.
• Ring – the ring label is a hyperlink to the Ring Selection page from which to selectrings to include in the search criteria, or type in a ring name in the text box.
• NCG – the CG label is a hyperlink to the NCG Selection page from which to selectCGs to include in the search criteria, or type in an CG name in the text box.
...................................................................................................................................................................................................
12 In the Backup Status field, select the backup status. Valid for the backup E database
on the management system operation only (optional).
• If the selected NE type or NE name is All, the possible values in the drop down listare: Last backups, Last successful backups, Failed backups, In progressbackups, or No successful backups.
• If the selected NE name is any value except All, the possible values in the drop downlist are: All backups, Last backup, or All successful backups.
...................................................................................................................................................................................................
13 In the Date and time: from field, enter the date and time. Click on the calendar icon to
display the Date/Time Chooser from which to select the date and time (optional).
...................................................................................................................................................................................................
14 Click Search.
Software and NE database management tasks Tasks related to NE databasesTo back up NE database versions onto the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-43
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
15 Click the New tool in the toolbar.
Result:A confirmation window is displayed asking you to confirm the backup.
...................................................................................................................................................................................................
16 Click Backup to management system.
Result:The Backup to management system window opens.
...................................................................................................................................................................................................
17 To specify the Es from which you want to start a backup, choose on of the following in
the Selected NEs section:
• All NEs in the network
• All NEs of type – select a type of E from the list.
• All NEs in Aggregate – type the name of the aggregate in the text field, or click onthe hyperlink to display the Aggregate Selection window. Select the radio buttonnext to the ring you would like to include in your search criteria, and click OK.
• All NEs in NCG – type the name of the network communications group (CG) in thetext field, or click on the hyperlink to display the NCG Selection window. Select theradio button next to the CG you would like to include in your search criteria, and
click OK.
• NE list for NE type – select a type of E from the list, then use the arrow keys tomove Es between the Available NEs list and the Selected NEs list.
...................................................................................................................................................................................................
18 Use the Backup if status for NE has not changed since the last backup? to
specify whether or not the backup process should continue if the status for E has not
changed since the last backup.
If you specify no, the management system determines whether an E configuration has
potentially changed since the last memory backup was made to the system. The E
configuration is considered to have potentially changed if either the system has received
an autonomous message from the E reporting a database change or if the system has lost
communication with the E at any time since the last memory backup of that type. If the
E has not changed since the last backup, the E is excluded from the backup request.
...................................................................................................................................................................................................
19 Click Submit.
Software and NE database management tasks Tasks related to NE databasesTo back up NE database versions onto the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-44 365-312-877R7.2Issue 4 November 2009
Result:A confirmation window is displayed.
...................................................................................................................................................................................................
20 Click Yes.
Result:The selected E database versions are transferred to the management system.
As the files are transferring, the management system notes the percentage of the
transfer that has completed in the Job Updates page, and logs this activity in the
User Activity Log.
Task, method 2: from the list of NE database versions on the NE
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software operation field, select Search.
...................................................................................................................................................................................................
4 In the Software type field, select NE database.
...................................................................................................................................................................................................
5 In the Software stored on field, select NE.
...................................................................................................................................................................................................
6 In the NE type field, select a type of E.
...................................................................................................................................................................................................
7 In the NE name field, select the name of an E.
...................................................................................................................................................................................................
8 Click Search.
Software and NE database management tasks Tasks related to NE databasesTo back up NE database versions onto the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-45
E N D O F S T E P S...................................................................................................................................................................................................
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on an E that meet your search criteria.
...................................................................................................................................................................................................
9 Click the radio button next to the E that you wish to backup to the management system.
From the Go menu, select Backup to management system and click Go.
Result:The Backup to management system page opens populated with
appropriate values.
...................................................................................................................................................................................................
10 Verify the settings, then click Submit.
Result:The selected E database versions are transferred to the management system.
As the files are transferring, the management system notes the percentage of the
transfer that has completed in the Job Updates page, and logs this activity in the
User Activity Log.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE databasesTo back up NE database versions onto the management
system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-46 365-312-877R7.2Issue 4 November 2009
To schedule the backup of an NE database version onto themanagement system
When to use
Use this task to schedule the backup of an E database version onto the management
system.
Task
...................................................................................................................................................................................................
1 Do one of the following:
• View a list of E database versions stored on the management system, using the task
“To view a list of E database versions stored on the management system” (p. 17-38).
The list at the bottom of the Software page is populated with a list of E databaseversions that meet your search criteria. From the Go menu, select Schedule Backupto Management System and click Go.
• View a list of E database versions stored on an E, using the task “To view a list of
E database versions stored on an E” (p. 17-41). The list at the bottom of the
Software page is populated with a list of E database versions that meet your searchcriteria. Click the radio button next to any E database version. The E will always
back up the active version. From the Go menu, select Schedule backup tomanagement system and click Go.
Result:The first section of the Schedule backup to management system page is
displayed. This page contains pre-populated information about the backup.
...................................................................................................................................................................................................
2 Verify the information presented, then click Schedule.
Result:The second section of the Schedule Backup to Management System
page is displayed. It allows you to precisely schedule the backup.
...................................................................................................................................................................................................
3 To schedule the backup frequency, select one of the following:
• Daily starting on – complete this section if the task is to be scheduled daily. Selectthe date and time for which the scheduled task should begin and end from the pop-up
calendars.
• Weekly starting on – complete this section if the task is to be scheduled weekly.Select the date and time for which the scheduled task should begin and end from the
pop-up calendars.
Software and NE database management tasks Tasks related to NE databasesTo schedule the backup of an NE database version onto
the management system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-47
• Once every month starting on – complete this section if the task is to bescheduled once a month. Select the date and time for which the scheduled task should
begin and end from the pop-up calendars.
• Every N days starting on – complete this section if the task is to be scheduledevery N days where N is a variable number. Select the date and time for which the
scheduled task should begin and end from the pop-up calendars. Specify N, which
may be a period of every two to six days, in the field Every.
...................................................................................................................................................................................................
4 Provide additional details for the backup to be scheduled:
• Scheduled time – enter the scheduled time for the task to begin. Enter a value usingthe format hh:mm:ss ([0 to 23]:[0 to 59]:[0 to 59]).
• Scheduled task name enter an optional name for the scheduled task or allow thesystem to generate a default value. Once created, the scheduled task name cannot be
modified.
• Number of retries – select the number of times (1 to 4) the scheduled task will beretried in case of error or no retries.
• Execution interval – specify the interval at which the scheduled task should begin.Possible values are 1 to 12 hours in 1 hour increments and the value “Continuous”.
• Retry interval – select the interval of time that will pass between retries. Possiblevalues are 1 to 60 minutes.
Click Submit.
Result:A progress indication followed by a confirmation is issued in the Message
section of the Schedule Backup to Management System page, and the scheduled
task is added.
Reference
For detailed information about how to view a list of scheduled tasks, how to modify
scheduled tasks, and how to delete scheduled tasks, refer to OMS etwork Element
Management Guide – Tools – Scheduled Tasks.
Software and NE database management tasks Tasks related to NE databasesTo schedule the backup of an NE database version onto
the management system...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-48 365-312-877R7.2Issue 4 November 2009
E N D O F S T E P S....................................................................................................................................................................................................................................
To restore an NE database version from the managementsystem to an NE
When to use
Use this task to restore an E database (MIB) version on the management system (also
known as a backup file) to an E.
NOTICE
Service-disruption hazard
Restoring an E database (MIB) from the management system to the network element
will cause a disruption in communication and may be traffic affecting.
Ensure that the E database restoration is really necessary. It is a good idea to create a
backup of the current E database before initiating the restoration.
Task, method 1: from the list of NE database versions on the management system
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software operation field, select Search.
...................................................................................................................................................................................................
4 In the Software type field, select NE database.
...................................................................................................................................................................................................
5 In the Software stored on field, select Management system.
...................................................................................................................................................................................................
6 In the NE type field, select a type of E.
...................................................................................................................................................................................................
7 In the NE name field, select the name of an E, or select All.
Software and NE database management tasks Tasks related to NE databasesTo restore an NE database version from the management
system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-49
...................................................................................................................................................................................................
8 In the NE generic partition field, select the type of partition (optional):
• Active – the software currently running on the E.
• Inactive – the software is stored in the inactive or backup partition of the E.
• All
...................................................................................................................................................................................................
9 In the NE generic type field, select either the release number or item code format for
the E generic (optional).
...................................................................................................................................................................................................
10 In the NE generic field, the E generic label is a hyperlink to the NE Generic
Selection page from which to select the E generic to include in the search criteria.
Alternatively, type in an E generic name in the text field. (optional).
...................................................................................................................................................................................................
11 In the NE group search field, select the option to perform a search by one of the
following options below (optional).
When searching for an E generic on E the available options are: Ring and Aggregate.
When searching for an E database on the management system, the available options are:
Ring, Aggregate, and NCG.
Meaning of the options:
• Aggregate – the aggregate label is a hyperlink to the Aggregate Selection pagefrom which to select aggregates to include in the search criteria. Alternatively, type in
an aggregate name in the text field.
• Ring – the ring label is a hyperlink to the Ring Selection page from which to selectrings to include in the search criteria. Alternatively, type in a ring name in the text
field.
• NCG – the CG label is a hyperlink to the NCG Selection page from which to selectCGs to include in the search criteria. Alternatively, type in an CG name in the text
field.
...................................................................................................................................................................................................
12 In the Backup Status field, select the backup status. Valid for the backup E database
on the management system operation only (optional).
• If the selected NE type or NE name is All, possible values are: Last backups, Lastsuccessful backups, Failed backups, In progress backups, or No successfulbackups.
• If the selected NE name is any value except All, possible values are: All backups,Last backup, or All successful backups.
Software and NE database management tasks Tasks related to NE databasesTo restore an NE database version from the management
system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-50 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................
13 In the Date and time: from field, enter the date and time. Click on the calendar icon to
display the Date/Time Chooser from which to select the date and time (optional).
...................................................................................................................................................................................................
14 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on the management system that meet your search criteria.
...................................................................................................................................................................................................
15 Click the radio button next to the E database version that you wish to restore to an E.
From the Go menu, select Restore to NE and click Go.
Result:A confirmation window is displayed.
...................................................................................................................................................................................................
16 Click Yes.
Result:The restoration is initiated. The management system notes the progress of the
operation in the Job Updates page, and logs this activity in the User Activity Log.
A reboot and a service interruption will occur on the E.
Task, method 2: from the list of NE database versions on the NE
...................................................................................................................................................................................................
1 In the top navigation bar select My network→ Job updates.
Result:The Job Updates page is displayed. This page allows you to monitor the
status of the task.
...................................................................................................................................................................................................
2 Use the object links to follow this path:
• Network Elements → Software
Result:The Search section of the Software page is displayed.
...................................................................................................................................................................................................
3 In the Software operation field, select Search.
...................................................................................................................................................................................................
4 In the Software type field, select NE database.
...................................................................................................................................................................................................
5 In the Software stored on field, select NE.
Software and NE database management tasks Tasks related to NE databasesTo restore an NE database version from the management
system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
17-51
E N D O F S T E P S...................................................................................................................................................................................................
...................................................................................................................................................................................................
6 In the NE type field, select a type of E.
...................................................................................................................................................................................................
7 In the NE name field, select the name of an E.
...................................................................................................................................................................................................
8 Click Search.
Result:The list at the bottom of the Software page is populated with a list of the E
database versions stored on an E that meet your search criteria.
...................................................................................................................................................................................................
9 Click the radio button next to the E to be restored. From the Go menu, select Restore
from management system and click Go.
Result:The Restore NE database from management system page is displayed.
This page shows a list of all memory versions (backup files) stored on the
management system for the selected E.
...................................................................................................................................................................................................
10 Select the memory version (backup file) to be restored and click Submit.
Result:The restoration is initiated. The management system notes the progress of the
operation in the Job Updates page, and logs this activity in the User Activity Log.
A reboot and a service interruption will occur on the E.
E N D O F S T E P S...................................................................................................................................................................................................
Software and NE database management tasks Tasks related to NE databasesTo restore an NE database version from the management
system to an NE...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
17-52 365-312-877R7.2Issue 4 November 2009
Glossary
...................................................................................................................................................................................................................................
A access point identifier (API)
To check whether a path is correctly provisioned a path trace can be set. A label (for example a
word) is sent along the path from one termination point to the other. This label is called trail trace
identifier (TTI). If the TTI is a specific string, this string is called access point identifier (API). If
the expected API equals the accepted API, the transmission path is well provisioned.
acknowledged information transfer service (AITS)
ALAPD mode.
In the acknowledged information transfer service (AITS), PDUs are numbered and transmitted
sequentially, and acknowledgment PDUs are sent back from the receiver to the sender. If a PDU is
lost, that is, if the sender gets no acknowledgment, the PDU is retransmitted.
AFI
See “authority and format identifier” (p. GL-1).
AIS
See “alarm indication signal” (p. GL-1).
AITS
See “acknowledged information transfer service” (p. GL-1).
alarm indication signal (AIS)
A code transmitted downstream in a digital network that indicates that an upstream failure has
been detected and alarmed if the upstream alarm has not been suppressed.
API
See “access point identifier” (p. GL-1).
Area
See “area identifier” (p. GL-1).
area identifier (Area)
Part of the SAP address indicating the routing area to which a node belongs.
authority and format identifier (AFI)
Part of the SAP address specifying the SAP address format.
...................................................................................................................................................................................................................................
D data communication channel (DCC)
The data communication channels (DCC) are part of the data communication network (DC).
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-1
The channels are used to exchange management data between the management system and the
network elements. The channels are also used for communication between the different network
elements (for example remote logins).
data communication network (DCN)
A data communication network (DC) is used for the exchange of management data. It is an
overlay of the transmission network. The management system (for example OMS) and the
network elements (Es) together are the nodes of this network.
DCC
See “data communication channel” (p. GL-1).
DCN
See “data communication network” (p. GL-2).
DFI
See “DSP format identifier” (p. GL-2).
DNU
See “do not use” (p. GL-2).
do not use (DNU)
A synchronization quality level; do not use indicates that the timing signal should not be used,
since it may cause timing loops.
domain specific part (DSP)
Part of the SAP address.
DSP
See “domain specific part” (p. GL-2).
DSP format identifier (DFI)
Part of the SAP address specifying the DSP format.
DSwT
See “dual stack with tunneling” (p. GL-2).
dual stack with tunneling (DSwT)
The dual stack with tunneling (DSwT) feature provides a way to manage IP devices through the
DC network.
...................................................................................................................................................................................................................................
E electrostatic discharge (ESD)
The transfer of an electrostatic charge between bodies at different electrostatic potentials.
Electrostatic discharge (ESD), caused by touching with the hand for example, can destroy
semiconductor components. The correct operation of the complete system is then no longer
assured.
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
GL-2 365-312-877R7.2Issue 4 November 2009
electrostatic protection (ESP)
Measures taken to reduce or avert the threat of electrostatic discharge (ESD) and electrostatic
fields.
embedded operations channel (EOC)
A basic message protocol allowing minimum management functions, for example SHDSL link
discovery, remote SHDSL device inventory, and synchronize remote SHDSL device.
end system (ES)
In the ISO-OSI network protocol, nodes behaving as end systems (ES) perform no forwarding of
data packets. They communicate with each other on an end-to-end basis via intermediate systems.
engineering order wire (EOW)
An external orderwire system can be connected which uses an orderwire channel for transparent
data transmission via the SDH transmission network. For this functionality, the E1 byte is used as
orderwire channel. The RSOH byte E1 is accessible in all network element types.
EOC
See “embedded operations channel” (p. GL-3).
EoS
See “Ethernet over SDH” (p. GL-3).
EOW
See “engineering order wire” (p. GL-3).
ES
See “end system” (p. GL-3).
ESD
See “electrostatic discharge” (p. GL-2).
ESP
See “electrostatic protection” (p. GL-2).
Ethernet over SDH (EoS)
Amethod to encapsulate the Ethernet frames into the SDH transmission payload.
...................................................................................................................................................................................................................................
G gateway network element (GNE)
An E that provides gateway functionality between external interfaces to OSs (for example, LA
ports) using one protocol stack (for example TCP/IP) and internal DCC interfaces using a
different protocol stack (for example, OSI).
generic framing procedure (GFP)
Amethod used to encapsulate the Ethernet frames into the SDH transmission payload. It has been
standardized by ITU-T.
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-3
GFP
See “generic framing procedure” (p. GL-3).
GNE
See “gateway network element” (p. GL-3).
...................................................................................................................................................................................................................................
I IDI
See “initial domain identifier” (p. GL-4).
IDP
See “initial domain part” (p. GL-4).
initial domain identifier (IDI)
Part of the SAP address specifying the country code.
initial domain part (IDP)
Part of the SAP address.
intermediate system (IS)
In the ISO-OSI network protocol, intermediate systems (IS) are used for routing data between
nodes and (sub) networks. A network element can act both as an end system as well as an
intermediate system.
intermediate system to intermediate system (IS-IS)
The intermediate system to intermediate system (IS-IS) protocol is used between intermediate
systems in the DC.
IS
See “intermediate system” (p. GL-4).
IS routing information base (RIB)
The IS-IS protocol maintains the IS routing information base (RIB). The information in this
information base is used for the routing of management data packets in the DC by the
intermediate systems.
IS-IS
See “intermediate system to intermediate system” (p. GL-4).
...................................................................................................................................................................................................................................
L LCAS
See “link capacity adjustment scheme” (p. GL-5).
LCN
See “local communications network” (p. GL-5).
line termination unit (LTU)
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
GL-4 365-312-877R7.2Issue 4 November 2009
link capacity adjustment scheme (LCAS)
The link capacity adjustment scheme (LCAS) is an extension of virtual concatenation that allows
dynamic changes in the number of channels in a connection. In case channels are added or
removed by management actions this will happen without losing any customer traffic.
link state protocol data unit (LSP)
Intermediate systems exchange routing information regularly with one another as part of the IS-IS
protocol by the use of link state protocol data units (LSP).
The LSPs contain the information on the SAP addresses of nodes used in the tables of the RIBs.
local communications network (LCN)
In the case where there is no DCC connectivity between nodes, a local communications network
(LC) can be used to connect the nodes to each other.
LSP
See “link state protocol data unit” (p. GL-5).
LTU
See “line termination unit” (p. GL-4).
...................................................................................................................................................................................................................................
M management information base (MIB)
The management information base (MIB) is the provisioning information stored in the database of
the E. This includes the configuration of the units within the E, the name and type of the E,
as well as addressing information and network information necessary for management.
In OMS context, the MIB is referred to as E database.
manufacturers executable code (MEC)
The manufacturers executable code (MEC) file contains the complete software package for one
E.
MDI
See “miscellaneous discrete input” (p. GL-5).
MDO
See “miscellaneous discrete output” (p. GL-5).
MEC
See “manufacturers executable code” (p. GL-5).
MIB
See “management information base” (p. GL-5).
miscellaneous discrete input (MDI)
Amiscellaneous discrete input (MDI) is an input to a network element for external equipment.
MDIs can be monitored by the management system. An MDI can be connected to monitor a
temperature sensor or a door contact, for example.
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-5
miscellaneous discrete output (MDO)
Amiscellaneous discrete output (MDO) is an output from a network element used to drive
external equipment. MDOs can be activated or deactivated by the management system. An MDO
can be connected to control a fan or a generator, for example.
MSP
See “multiplex section protection” (p. GL-6).
multiplex section protection (MSP)
Multiplex section protection (MSP) is used to protect the traffic in a point-to-point connection
against transmission failures (MS-AIS, LOF, LOS, MS-DEG) and port equipment failures. A
requirement for this kind of protection is that the transmission lines are doubled (one working
line, one protection line).
A trail continues to use the working route until a fault condition occurs or an external switch
request is issued to switch to the protection route.
...................................................................................................................................................................................................................................
N NBMA
See “non-broadcast multiple access” (p. GL-6).
network service access point (NSAP)
A network service access point (SAP) is the address of a node (for example a network element).
Each node has exactly one SAP that is unique in the entire network (usually the SAP is even
globally unique). Routing and forwarding in each node of a network is done using the target
SAP.
network service provider (NSP)
A network service provider (SP) offers services that are delivered over a network, externally
managed, based on a one-to-many business model, and service-fee based.
network termination unit (NTU)
non-broadcast multiple access (NBMA)
on-broadcast multiple access (BMA) is a network type that support multiple access points but
does not support broadcasting or in which broadcasting is not possible.
NSAP
See “network service access point” (p. GL-6).
NSP
See “network service provider” (p. GL-6).
NTU
See “network termination unit” (p. GL-6).
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
GL-6 365-312-877R7.2Issue 4 November 2009
...................................................................................................................................................................................................................................
P PDU
See “protocol data unit” (p. GL-7).
PRC
See “primary reference clock” (p. GL-7).
primary reference clock (PRC)
A synchronization quality level; primary reference clock indicates that the timing signal is
provided by a primary reference clock.
protocol data unit (PDU)
According to ITU-T recommendation Q.921 (1997), a unit of data specified in a protocol and
consisting of protocol-control-information and possibly user-data.
...................................................................................................................................................................................................................................
Q QoS
See “quality of service” (p. GL-7).
quality of service (QoS)
According to ITU-T recommendation Q.1703 (2004), the collective effect of service performance
which determine the degree of satisfaction of a user of a service. It is characterized by the
combined aspects of performance factors applicable to all services, such as bandwidth, latency,
jitter, traffic loss, and so on
...................................................................................................................................................................................................................................
R RD
See “routing domain” (p. GL-7).
RDI
See “remote defect indicator” (p. GL-7).
remote defect indicator (RDI)
An indication returned to a transmitting terminal about the fact that the receiving terminal has
detected an incoming section failure.
RIB
See “IS routing information base” (p. GL-4).
routing domain (RD)
Part of the SAP address.
RPS
See “SHDSL remote power supply” (p. GL-8).
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-7
...................................................................................................................................................................................................................................
S SCO
See “station clock output” (p. GL-9).
SDH equipment clock (SEC)
A synchronization quality level; SDH equipment clock indicates that the timing signal is provided
by the E's own internal oscillator.
SEC
See “SDH equipment clock” (p. GL-8).
SEL
See “selector field” (p. GL-8).
selector field (SEL)
Part of the SAP address used to direct the protocol data units (PDU) to the correct destination.
SFP
See “small form-factor pluggable optic” (p. GL-8).
SHDSL
See “symmetrical single-pair high speed digital subscriber line” (p. GL-9).
SHDSL regenerator unit (SRU)
SHDSL remote power supply (RPS)
Equipment used to provide power to remote SHDSL devices via SHDSL lines.
small form-factor pluggable optic (SFP)
Small form-factor pluggable optic (SFP) is a specification for a new generation of optical modular
transceivers. The devices are designed for use with small form factor (SFF) connectors, and offer
high speed and physical compactness. They are hot-swappable.
SNCP
See “subnetwork connection protection” (p. GL-9).
SNPA
See “subnetwork point of attachment” (p. GL-9).
SRU
See “SHDSL regenerator unit” (p. GL-8).
SSM
See “synchronization status message” (p. GL-9).
SSU
See “synchronization supply unit” (p. GL-9).
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
GL-8 365-312-877R7.2Issue 4 November 2009
SSU-L
See “synchronization supply unit local” (p. GL-9).
SSU-T
See “synchronization supply unit transit” (p. GL-9).
station clock output (SCO)
subnetwork connection protection (SNCP)
Subnetwork connection protection (SCP) is a type of path protection that is used to protect the
traffic for a pre-selected path. A working path is replaced by a protection path if the working path
fails, or if its performance falls below a required level.
subnetwork point of attachment (SNPA)
According to ITU-T recommendation X.213 (2001), a point at which a real end system,
interworking unit, or real subnetwork is attached to a real subnetwork, and a conceptual point at
which a subnetwork service is offered within an end or intermediate system.
symmetrical single-pair high speed digital subscriber line (SHDSL)
Symmetrical single-pair high speed digital subscriber line is a protocol which provides high speed
data transport over copper wire connections.
synchronization status message (SSM)
A synchronization status message (SSM) is defined for SDH/SOET transport signals, for framed
2-Mbps signals, and for DS1 ESF external timing input signals. The purpose of the SSM is to
signal the reference clock quality level from E to E in order to:
• Enable the timing generator to extract the timing reference signal with the best quality.
• Make it possible to autonomously enter the holdover mode in case there is no suitable timing
reference signal.
• Prevent timing loops.
synchronization supply unit (SSU)
According to ITU-T recommendation G.810 (1996), a logical function for frequency reference
selection, processing and distribution, having specific frequency characteristics.
synchronization supply unit local (SSU-L)
A synchronization quality level; synchronization supply unit local indicates that the timing signal
was derived from a local SSU.
synchronization supply unit transit (SSU-T)
A synchronization quality level; synchronization supply unit transit indicates that the timing
signal is derived from a transit SSU.
System
See “system identifier” (p. GL-9).
system identifier (System)
Part of the SAP address representing the node. The IEEE 802.3 MAC address is reserved and
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-9
physically stored on every E.
...................................................................................................................................................................................................................................
T TAP
See “tunnel auto provisioning” (p. GL-10).
target identifier (TID)
A parameter that is used to identify a particular network element within a network. It is a
character string of up 20 characters where the characters are letters, digits, or hyphens (-).
TID
See “target identifier” (p. GL-10).
TIM
See “trace identifier mismatch” (p. GL-10).
trace identifier mismatch (TIM)
If the trace identifier mismatch (TIM) detection is enabled, traffic will be lost when a mistake in
the trace string is detected.
trail termination point (TTP)
In a trail termination point (TTP) the path overhead bytes of a signal are terminated.
trail trace identifier (TTI)
To check whether a path is correctly provisioned a path trace can be set. A label (for example a
word) is sent along the path from one termination point to the other. This label is called trail trace
identifier (TTI). If the TTI is a specific string, this string is called access point identifier (API). If
the expected API equals the accepted API, the transmission path is well provisioned.
TTI
See “trail trace identifier” (p. GL-10).
TTP
See “trail termination point” (p. GL-10).
tunnel auto provisioning (TAP)
Amethod developed by Lucent Technologies to simplify the provisioning of nodes in a routing
table. The principle behind TAP is that IP routes known by dual stack with tunneling nodes
(DSwT nodes) at the edge of the OSI network are advertised across the OSI network to the other
DSwT nodes which can then insert these routes into their own routing tables.
...................................................................................................................................................................................................................................
U UITS
See “unacknowledged information transfer service” (p. GL-10).
unacknowledged information transfer service (UITS)
ALAPD mode.
In the unacknowledged information transfer service (UITS), corrupted PDUs are ignored and no
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
GL-10 365-312-877R7.2Issue 4 November 2009
further actions taken. Upper layers of the OSI stack are responsible for recovery actions.
Glossary
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
GL-11
Index
Numerics
15 minutes, 14-17
15 minutes unidirectional, 14-36
1643 AM
interfaces, 5-2
1643 AMS
interfaces, 5-3
24 hours, 14-17
24 hours bidirectional, 14-36
24 hours unidirectional, 14-36
.............................................................
A abort in-progress E generic
transfer, 17-11
Acceptable frame type, 6-42, 6-46
acceptance QL, 9-21, 9-25
Acceptance QL
for SCO timing status, 10-14
Acceptance quality level, 6-31,
6-37
access point identifier
See: API
acknowledged information transfer
service
See: AITS
activate
E generic, 17-16
E generics, 16-3
OMS-to-E connections, 4-12
remote device generic, 17-24,
17-30
remote device generics, 16-3
active timing source, 9-21
add
MSP protection group, 12-11
E generic to the management
system, 17-4
OMS-to-E connections, 4-4
transparent DCC
cross-connections, 4-30
uncorrelated cross-connection,
12-5
Additional Manual Area Address 1
for DC, 4-23
Additional Manual Area Address 2
for DC, 4-23
AFI, 3-10
for OMS-to-E connections,
4-4, 4-7
AFI (address field), 3-11, 3-12
AIS, 11-9, 13-6
AITS, 3-14
alarm indication signal
See: AIS
Alarm Severity Assignment Profile
(ASAP)
ASAP name, 7-14
ASAP types, 7-3
dcn, 7-3
DEFAULTASAP, 7-3
equipment, 7-4
ethPath, 7-6
ethPS, 7-7
mdi, 7-5
pdhPath, 7-8
pdhPS, 7-7
sdhHOPath, 7-11, 7-12
sdhMS, 7-10
sdhMSP, 7-11
sdhPRS, 7-9
sdhVCG, 7-13
timing, 7-9
alarm suppression
SHDSL remote power supply
port, 6-100
alarms
blocking, 6-68
lining-up, 6-68
API, 13-5
area, 3-10
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-1
Area
for OMS-to-E connections,
4-4, 4-7
Area (address field), 3-11
area identifier
See: Area
assign
password to remote SHDSL
device, 6-93
authority and format identifier
See: AFI
Auto mode hold time (min), 6-24,
6-33, 6-39
Auto mode time (min)
for E timing ports, 10-3
auto negotiation, 11-26
Auto negotiation for pause mode,
6-41
Auto negotiation mode, 6-41
auto-discovery, 3-29
blocked, reasons for, 3-29
CMISE Es, 3-32
inventory of Es, 3-30
of Es, 3-29
of physical network
connections, 3-31
of rings, 3-29
of VCGs, 3-32
when it runs, 3-29
auto-discovery command-line tool,
3-32
Available data, 14-11
.............................................................
B Background Block Error (BBE),
14-8
backup
E database versions onto the
management system, 17-42
Backward Monitoring, 14-6
BBE, 14-4, 14-12
Bi-directional monitoring
Uni-directional monitoring,
14-17
BiDirUAPcount, 14-12
BiDirUAS, 14-12
bin, 14-4
Bin, 14-36
bins, 14-4
block
alarms, 6-68
Bridge PDU MAC suffix, 6-41
Bridge PDU VLA tag, 6-41
broadcast, 11-4
.............................................................
C Cable length (m), 6-28, 6-36
CbR, 14-12
CbS, 14-12
CIR Egress
for VCGs, 6-56
CIR Ingress
for VCGs, 6-56
clear wait to restore state, 9-12
Clear wait to restore state
for E timing sources, 10-10
CLP, 3-17
CMC407, 6-7
CMC408, 6-7
CMC409, 6-7
CMC410, 6-7
CMC411, 6-7
CMC413, 6-7
CMC414, 6-7
CMC415, 6-7
CMC416, 6-7
CMC417, 6-7
CMC417B, 6-7
CMC418, 6-7
CMC419, 6-7
CMISE Es
auto-discovery, 3-32
collision domains, 11-26, 11-27
command-line tools
auto-discovery tool, 3-32
Committed burst size, 6-26, 6-35
Communication mode
for MSP protection groups,
12-11
communications interfaces
OSI, 3-28
configuration possibilities, 5-2
connection discovery
schedule, 3-31
connectionless network protocol
CLP, 3-17
Consequent action on signal label
mismatch, 6-27, 6-36
Consequent action on trail trace
mismatch, 6-30, 6-48
convert
cross-connection, 12-7
Counters, 14-11
CQS, 11-29
CRC errors, 14-4
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-2 365-312-877R7.2Issue 4 November 2009
Cross-connection rate
for cross-connections, 12-5
cross-connections
add-drop (bi), 11-4
bidirectional, 11-4
broadcast, 11-4
convert, 12-7
delete, 12-8
loopback, 11-4
shape, 11-4
simple (bi), 11-4
simple (uni), 11-4
types, 11-4
unidirectional, 11-4
view, 12-2
Customer Port Flow Granularity
for Ethernet cards, 6-52
Customer side AIS forwarding
method, 6-25, 6-34
Customer side alarm monitoring,
6-26, 6-35
Customer side consequent action
control, 6-25, 6-34
Customer side CRC4 processing,
6-26, 6-35
Customer side degraded values
selection, 6-25, 6-34
Customer side force AIS, 6-25,
6-34
Customer side SA4 control, 6-24,
6-33
Customer side SA5 and SA6
control, 6-24, 6-33
Customer side SA6 alarm code,
6-25, 6-34
Customer side SA7 control, 6-24,
6-33
Customer side SA8 control, 6-24,
6-33
Customer side TS0 monitoring,
6-25, 6-34
Customer side TS0 termination,
6-25, 6-34
customer-role port, 11-22, 11-24
.............................................................
D data communication channel
See: DCC
data communication network
See: DC
Data Recovery
Loss of Association, 14-36
DCC, 3-2, 3-13
add transparent
cross-connections, 4-30
channel selection, 3-13
cross-connections, 3-13, 4-29,
4-30, 4-32
delete transparent
cross-connections, 4-32
disable for a port, 4-21
enable for a port, 4-21
for DCCs, 4-21
transparent cross-connections,
3-13, 4-29, 4-30, 4-32
view list transparent
cross-connections, 4-29
DCC in MSP mode, 3-15
set to independent, 4-26
set to slave, 4-26
view, 4-25
DCC/EOW status
modify, 4-21
DCC/EOW status for the port
overheads
view list, 4-20
DC, 3-2, 3-13
addresses, 3-9
area-divisioning, 3-5
communication protocols, 3-3
modify parameters, 4-23
deactivate
OMS-to-E connections, 4-10
DEFAULTASAP, 7-3
Default user priority, 6-41, 6-46
Degraded value selection, 6-32,
6-37
delete
cross-connections, 12-8
MSP protection group, 12-14
E, 4-18
E generic from the
management system, 17-5
OMS-to-E connections, 4-16
transparent DCC
cross-connections, 4-32
deprovision
loopback on a port, 6-20
Designated router priority
for DC, 4-23
DFI, 3-10
Diagnostic mode, 6-24, 6-33
differential delay, 11-20
Directionality
for cross-connections, 12-5
disable
association with E, 6-66
DCC for a port, 4-21
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-3
DIX frames, 11-13
DU, 9-5, 9-7
do not use
See: DU
domain specific part
See: DSP
download
MIB to E, 6-63
software image to remote
SHDSL device, 6-95
Dropped packets, 14-12
Also see: pDe
DSP, 3-10
DSP format identifier
See: DFI
DSwT, 3-16
connecting areas with manual
TAP tunnels, 3-23
routing table, 3-18
tunnel auto provisioning, 3-21
dual stack with tunneling
See: DSwT
.............................................................
E EB, 14-13
Egress channel AIS mapping,
6-25, 6-34
Egress force AIS, 6-25, 6-34
Egress PDH degraded value
selection, 6-32, 6-38
Egress PDH monitoring, 6-28,
6-36
electrostatic discharge
See: ESD
electrostatic protection
See: ESP
embedded operations channel
See: EOC
enable
association with E, 6-65
DCC for a port, 4-21
Encapsulation mode, 6-44
for VCGs, 6-56
Encapsulation mode
determination, 6-44
Encapsulation state
for VCGs, 6-56
end system
See: ES
EOC, 5-11
EoS, 11-16
Errored Block (EB), 14-7
Errored Second (ES), 14-8
Errored Seconds, 14-4
ES, 3-2, 14-4, 14-11
ESD
instructions, 1-12
symbol, 1-12
ESP
bonding point, 1-12
Ethernet, 11-13
Also see: TransLA®
hubs, 11-26
performance monitoring, 11-32
routers, 11-26
switches, 11-27
Ethernet address, 3-9
Ethernet card information
modify, 6-52
view, 6-51
Ethernet frame size, 11-16
Ethernet II, 11-13
Ethernet over SDH
See: EoS
Ethernet performance monitoring,
14-26
Ethernet port provisioning, 11-21
Ethernet switch, 11-15
Ethertype, 11-29
event
probable cause, 6-70, 6-72
Expected trace display mode,
6-30, 6-48
Expected trail trace format, 6-30,
6-48
Expected trail trace value, 6-30,
6-48
Explicit TCAmode, 14-19
.............................................................
F Fallback mode, 6-31, 6-37
fallback mode, 9-25
Far End, 14-4
Far End Monitoring, 14-5
final destination, 3-18
fixed 10-byte SAP address
structure, 3-11
fixed 20-byte SAP address
structure, 3-10
flexible SAP address structure,
3-12
Flexible part
for OMS-to-E connections,
4-4, 4-7
flow control, 11-26, 11-27
Force DU, 9-25
for SCO timing status, 10-14
forced DU, 9-26
ForceDU, 6-31, 6-37
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-4 365-312-877R7.2Issue 4 November 2009
Forward Monitoring, 14-6
Frame Alignment signal, 14-4
free running, 9-3
full duplex, 11-26
.............................................................
G gateway network element
See: GE
GbE auto negotiation mode, 6-41
generic framing procedure
See: GFP
GFP, 11-13, 11-16
GID monitor enable, 6-43
global wait to restore time, 9-12
Global wait to restore time
for E timing sources, 10-10
GE, 3-2
GVRP, 11-24
.............................................................
H half duplex, 11-26
hazard statements
symbols, 1-5
hold-off timer, 11-11
holdover, 9-3
.............................................................
I IDI, 3-10
IDP, 3-10
IEEE 802.3 MAC address, 3-10,
3-11
Implicit TCAmode, 14-19
in-progress transfers of E
generics
view list, 17-10
Ingress AIS type, 6-26, 6-35
Ingress Ethertype overwrite value
for Ethernet cards, 6-52
Ingress filtering mode, 6-41, 6-46
Ingress force AIS, 6-26, 6-35
Ingress PDH degraded value
selection, 6-32, 6-38
Ingress PDH monitoring, 6-28,
6-36
Ingress sa6 AIS code, 6-25, 6-34
initial domain identifier
See: IDI
initial domain part
See: IDP
inloop, 13-4
Inloop/Facility loopback, 6-27,
6-36
insertion and removal facilities,
1-12
Interface Mode, 6-25, 6-34
interfaces
1643 AM, 5-2
1643 AMS, 5-3
LA, 5-2
PDH, 5-2
SDH, 5-2
intermediate system
See: IS
intermediate system to
intermediate system
See: IS-IS
IP prefix, 3-19
IS, 3-2
IS routing information base
See: RIB
IS-IS, 3-2
IS-IS on LA
for DC, 4-23
IS-IS on E
for DC, 4-23
ISD mode, 6-28, 6-36
ISO DCC SAP address format,
3-10
isolated state, 5-6
ITM-CIT access control profiles
modify, 2-5
ITM-CIT accesses
view list of, 2-2
ITM-CIT users
log out, 2-3
.............................................................
L LA group, 11-15
LA interfaces, 5-2
LA parameters, 14-12
LA ports, 11-14
port roles, 11-21
LAPD
network_side mode, 3-14
user_side mode, 3-14
LAPD Mode
for DCCs, 4-21
LAPD Side
for DCCs, 4-21
laser safety
guidelines, 1-9
laser safety precautions
for enclosed systems, 1-10
for unenclosed systems, 1-11
LCAS, 11-20
LCAS hold-off time
for VCGs, 6-56
LCAS hold-off time (ms), 6-44
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-5
LCAS mode, 6-44
for VCGs, 6-56
LCAS state sink, 6-43
LCAS wait to restore time
for VCGs, 6-56
LCAS wait to restore time (min),
6-44
LC, 3-2
Line coding, 6-28, 6-36
line termination unit
See: LTU
lining-up mode, 6-68
link capacity adjustment scheme
See: LCAS
Link pass through consequent
action mode, 6-41
link state protocol data unit
See: LSP
list of ITM-CIT access control
profiles
view list of, 2-4
local communications network
See: LC
local Lucent Technologies SAP
address format, 3-11
lock out request, 9-21
locked, 9-3
lockout, 9-18, 9-22
lockout Request
for E timing sources, 10-6
Lockout Request
for SCO timing sources, 10-13
log out
ITM-CIT users, 2-3
logical ports
view a list of logical ports
contained within a physical
port, 6-17
loop, 6-19
loopback ports
view a list of loopback-enabled
ports, 6-19
LPT consequent action for client
signal fail, 6-43
LPT consequent action for server
signal fail, 6-43
LSP, 3-2
LTU, 5-11
.............................................................
M MAC address learning mode,
6-40, 6-45
manage
E database on management
system, 16-3
E database on E, 16-3
E generics on management
system, 16-2
E generics on Es, 16-2
remote device generics on
management system, 16-2
remote device generics on
Es, 16-2
management information base
See: MIB
manufacturers executable code
See: MEC
Maximum LSP size
for DC, 4-23
MDI, 5-9, 6-70, 6-72
modify, 6-79
use for SHDSL remote power
supply, 5-10, 5-17
view list, 6-78
MDI name, 6-79
MDO, 5-9, 6-70, 6-72
modify, 6-76
use for SHDSL remote power
supply, 5-10, 5-17
view associated alarms, 6-75
view list, 6-74
MDO name, 6-76
MDO status, 6-76
Measurement
Termination Point, 14-3
Measurement parameters, 14-11
Measurement Parameters
Alarm, 14-9
TR values, 14-9
measurement periods, 14-17
Measurement periods, 14-36
Measuring Method
BIP, 14-3
MEC, 16-5
MIB, 5-6, 16-2
clear, 16-3
download to E, 6-63
update image, 6-64
upload into management
system, 6-62
view list of backups stored on
the management system,
17-38
miscellaneous discrete input
See: MDI
miscellaneous discrete output
See: MDO
Mismatched MAC address list,
6-40, 6-45
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-6 365-312-877R7.2Issue 4 November 2009
modify
alarm suppression settings of
SHDSL remote power supply
port, 6-100
DCC/EOW status, 4-21
DC parameters, 4-23
Ethernet card information,
6-52
ITM-CIT access control
profiles, 2-5
MDI, 6-79
MDO, 6-76
MSP protection group, 12-13
E event controls, 6-68
E event parameter settings,
6-72
E system timing source, 10-6
E timing port, 10-3
E timing source, 10-10
OMS-to-E connections, 4-7
password for remote SHDSL
device, 6-93
port parameters, 6-22
remote SHDSL device, 6-89
SCO timing source, 10-13
SCO timing status, 10-14
SHDSL span diagnostic mode,
6-87
SHDSL transport mode, 6-82
slots, 6-6
system timing status, 10-7
VCG, 6-56
Monitored
for E timing sources, 10-10
Monitoring a point
Prerequisite, 14-3
MS DCC, 6-27
MS LAPD mode, 6-27
MS LAPD role, 6-27
MS MSP DCC, 6-27
MS MSP DCC mode, 6-27
MS MSP LAPD mode, 6-28
MS MSP LAPD role, 6-27
MSP, 11-10
bidirectional mode, 11-11
non-revertive mode, 11-10
protected, 12-11
revertive mode, 11-10
unidirectional mode, 11-10
MSP mode
for MSP protection groups,
12-11
MSP protection groups
add, 12-11
delete, 12-14
fail condition, 11-11
hold-off timer, 11-11
modify, 12-13
operate an MSP protection
switch, 12-15
protection switch states, 11-12
view list, 12-9
wait to restore timer, 11-11
multiplex section protection
See: MSP
.............................................................
N BMA, 3-17, 3-19
E
auto-discovery of, 3-29
DCC channel selection, 3-13
delete, 4-18
inventory of, 3-30
name, 4-4
protection switch states, 11-12
timing, 9-2
type, 4-4
view Ethernet card
information, 6-51
E database, 5-6, 16-2
Also see: MIB
backup onto the management
system, 17-47
manage on management
system, 16-3
manage on E, 16-3
restore from management
system to an E, 17-49
view list of versions stored on
the management system,
17-38
E database versions
view list of versions stored on
an E, 17-41
E database versions stored on the
management system
view list, 17-38
E event controls
modify, 6-68
E event parameter settings
modify, 6-72
view, 6-70
E generics
abort in progress transfer,
17-11
activate, 16-3, 17-16
add to the management system,
17-4
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-7
delete from the management
system, 17-5
manage on management
system, 16-2
manage on E, 16-2
schedule activation, 17-19
schedule transfer from
management system to E,
17-8
transfer from the management
system to an E, 17-6
view list of in-progress
transfers, 17-10
E generics stored on an E
view list, 17-14
E generics stored on the
management system
view list, 17-3
E location
for DC, 4-23
E name
for OMS-to-E connections,
4-4
E software
generics, 16-2
management, 16-2
storage, 16-5
E system timing source
modify, 10-6
E system timing sources
view list, 10-5
E timing port
modify, 10-3
E timing ports
view list, 10-2
E timing source
modify, 10-10
E timing sources
view list, 10-9
E type
for OMS-to-E connections,
4-4
ear End
Bidirectional, 14-4
ear End Monitoring, 14-5
Es
disable association, 6-66
enable association, 6-65
et Comm Grp
for OMS-to-E connections,
4-4, 4-7
network service access point
See: SAP
network service provider
See: SP
etwork side AIS method, 6-26,
6-35
etwork side CRC4 processing,
6-26, 6-35
etwork side force AIS, 6-26,
6-35
etwork side SA6 loopback
control, 6-26, 6-35
etwork side TS0 monitoring,
6-26, 6-35
network termination unit
See: TU
network-role port, 11-22, 11-24
etworkside alarm monitoring,
6-26, 6-35
etworkside degraded values
selection, 6-26, 6-35
node creation, 5-6
non-broadcast multiple access
See: BMA
SAP, 3-2, 3-3, 3-9, 4-4
address structures, 3-10
fixed 10-byte address structure,
3-11
fixed 20-byte address structure,
3-10
flexible address structure, 3-12
formats, 3-10, 3-11
SAP address, 3-9
for OMS-to-E connections,
4-4, 4-7
SP, 3-10
TU, 5-11
TU software
storage, 16-5
.............................................................
O OMS-to-E connections, 3-28
activate, 4-12
add, 4-4
deactivate, 4-10
definition, 3-28
delete, 4-16
modify, 4-7
view list, 4-3
On Connection, 14-37
operate an MSP protection switch,
12-15
Operator ID, 3-10
OSI-DC network, 3-6
outloop, 13-4
Outloop/Terminal loopback, 6-27,
6-36
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-8 365-312-877R7.2Issue 4 November 2009
output port timing, 9-25
overhead access ports
view list, 4-28
.............................................................
P Parity Check, 14-4
partition repair, 3-24
password
assign to remote SHDSL
device, 6-93
modify for remote SHDSL
device, 6-93
path overhead, 14-4
path protection, 11-8
path trace, 13-5
pause operation, 11-27
PDH interfaces, 5-2
PDU, 3-10
performance counters, 11-32
Performance Monitoring, 14-4
performance monitoring
Ethernet, 11-32
Performance monitoring points,
14-3
Performance Monitoring
Prerequisites, 14-3
physical network connections
auto-discovery of, 3-31
physical ports
view a list of logical ports
contained within a physical
port, 6-17
port address/port alias tool, 13-3
Port label, 6-41
Port mode, 6-24, 6-33, 6-39, 6-43
for E timing ports, 10-3
Port path cost, 6-42, 6-49
port translation, 13-3
ports
add, 13-2
definition, 13-2
delete, 13-2
deprovision loopback, 6-20
ID format, 13-3
LA, 11-14
logical, 13-2
modify parameters, 6-22
names, 13-2
physical, 13-2
port address/port alias tool,
13-3
provision loopback, 6-20
role assignment, 11-22
roles, 11-22
supported types, 13-2
view a list of logical ports,
6-16
view a list of logical ports
contained within a physical
port, 6-17
view a list of loopback-enabled
ports, 6-19
view a list of physical ports,
6-15
WA, 11-14
PRC, 9-5, 9-7
primary reference clock
See: PRC
priority, 9-18, 9-22
for E timing sources, 10-6
Priority
for SCO timing sources, 10-13
priority classification, queueing,
and scheduling
See: CQS
probable cause, 6-70, 6-72
propagation delay, 11-20
protection
MSP, 11-10
SCP, 11-8
Protection reference
for E timing sources, 10-10
Protection Section
for MSP protection groups,
12-11
protection switch states, 11-12
Protection type
for cross-connections, 12-5
Protection: High order TP
for cross-connections, 12-5
Protection: Low order TP
for cross-connections, 12-5
protocol data units
See: PDU
provider bridge mode, 11-29
provision
loopback on a port, 6-20
Provisioned bit rate (Mb/s), 6-41
Provisioned crossover mode, 6-41
Provisioned duplex mode, 6-41
Provisioned interface type, 6-41
Provisioned pause mode, 6-41
provisioning
LA and WA ports details,
11-30
.............................................................
Q QD2, 5-11
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-9
QL, 9-18
QL provisioned
for E timing sources, 10-10
QL-in, 9-13
QL-out, 9-13
QL-provisioned, 9-13
QoS, 11-29
configuration options, 11-29
quality of service
See: QoS
.............................................................
R RD, 3-10
RDI, 13-6
RDI/REI insertion, 6-28, 6-46
Regenerator loop
for SCO timing status, 10-14
REI, 14-4, 14-6
remote defect indicator
See: RDI
remote device generics
activate, 16-3, 17-24, 17-30
manage on management
system, 16-2
manage on E, 16-2
schedule activation, 17-35
schedule transfer from E to
remote device, 17-32
transfer from E to remote
device, 17-27
transfer from the management
system, 17-22
Remote lan port state, 6-26, 6-35,
6-39
remote power supply
See: SHDSL remote power
supply
remote SHDSL devices
assign password, 6-93
download software image,
6-95
management, 5-11
modify, 6-89
modify password, 6-93
numbering, 5-12
reset, 6-92
synchronize, 6-91
remove
remote devices on SHDSL
span, 6-86
reset
remote SHDSL device, 6-92
wait to restore timer for VC
TTPs, 6-60
Reset Threshold Report (RTR),
14-7
restart
discovery sequence for SHDSL
span, 6-84
low-level SHDSL hardware,
6-85
SHDSL remote power supply
port, 6-99
restore
E database version from the
management system to an
E, 17-49
retiming, 9-11
RIB, 3-2
rings
auto-discovery of, 3-29
routing domain
See: RD
RPS, 5-10, 5-17
RS DCC, 6-27
RS LAPD mode, 6-27
RS LAPD role, 6-27
RS MSP DCC, 6-27
RS MSP DCC mode, 6-27
RS MSP LAPD mode, 6-28
RS MSP LAPD role, 6-27
RTR, 14-14
.............................................................
S Sa Bit
for E timing ports, 10-3
schedule
activation of a remote device
generic, 17-35
backup E database versions
onto the management system,
17-47
E generic activation, 17-19
transfer of a remote device
generic from E to remote
device, 17-32
transfer of an E generic from
management system to an
E, 17-8
scheduled tasks
connection discovery, 3-31
software management, 16-4
SCO, 9-2, 9-21
SCO timing source
modify, 10-13
SCO timing sources
view list, 10-12
SCO timing status
modify, 10-14
SDH equipment clock
See: SEC
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-10 365-312-877R7.2Issue 4 November 2009
SDH interfaces, 5-2
SEC, 9-2, 9-5, 9-6, 9-7
section overhead, 14-4
SEL, 3-10
SEL (address field), 3-11, 3-12
Select Sa bit
for SCO timing status, 10-14
selector field
See: SEL
self-timed mode, 9-11
service level agreements, 11-30
SES, 14-4, 14-12
SES Declaration Threshold, 14-8,
14-13
set
DCC in MSP mode to
independent, 4-26
DCC in MSP mode to slave,
4-26
SFP module assignment state,
6-13
SHDSL remote power supply
management mode, 6-97
Set unit type
for slots, 6-6
Severely Errored Second (SES),
14-8
SFP, 5-4
SFP module assignment state
set, 6-13
SFP module information
view, 6-10
SFP modules
view list, 6-8
SHDSL, 5-11
SHDSL device information
view, 6-88
SHDSL performance monitoring,
14-15
SHDSL regenerator unit
See: SRU
SHDSL remote power supply,
5-10
Also see: RPS
management, 5-10, 5-17
SHDSL remote power supply
management mode
set, 6-97
SHDSL remote power supply ports
modify alarm suppression
settings, 6-100
restart, 6-99
view list, 6-98
SHDSL span
remove remote devices, 6-86
restart discovery sequence,
6-84
restart low-level hardware,
6-85
SHDSL span diagnostic mode
modify, 6-87
SHDSL spans
view, 6-83
SHDSL transport mode
modify, 6-82
SHDSL units
view list, 6-81
signal degrade thresholds, 13-6
signal label, 13-5
signal status, 9-14
signal type, 9-22
Signal type
for E timing ports, 10-3
for SCO timing status, 10-14
Slot state
for slots, 6-6
slots
modify, 6-6
view list, 6-4
small form-factor pluggable optics
See: SFP
SC/I protection, 11-9
SC/ protection, 11-9
SCP, 11-8
SPA, 3-19
software image
download to remote SHDSL
device, 6-95
software management, 16-2
software management tasks
schedule, 16-4
SOET
interworking, 11-11
Source selection
for SCO timing status, 10-14
SPA startup state, 6-24, 6-33
Squelch method
for E timing sources, 10-10
for SCO timing status, 10-14
SRU, 5-11
SSM, 9-5
SSM out, 9-26
SSU, 9-5
SSU-L, 9-5, 9-7
SSU-T, 9-5, 9-7
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-11
station clock input, 9-2
Station clock output
for SCO timing status, 10-14
station clock output
See: SCO
storage
E software, 16-5
TU software, 16-5
STP port priority, 6-42, 6-49
STVRP, 11-24
subnetwork connection protection
See: SCP
subnetwork point of attachment
See: SPA
supported ports, 13-2
Switch mode
for cross-connections, 12-5
for MSP protection groups,
12-11
switch request, 9-14, 9-18, 9-23
Switch Request
for E system timing, 10-7
for E timing sources, 10-10
for SCO timing status, 10-14
switch status, 9-15, 9-19, 9-23
symbols
in hazard statements, 1-5
symmetrical single-pair high speed
digital subscriber line
See: SHDSL
synchronization status message
See: SSM
synchronization supply unit
See: SSU
local
See: SSU-L
transit
See: SSU-T
synchronize
remote SHDSL device, 6-91
System & output timing QL mode
for E system timing, 10-7
for SCO timing status, 10-14
system ID, 3-10
System ID
for OMS-to-E connections,
4-4, 4-7
System ID (address field), 3-11,
3-12
system identifier
See: system ID
See: System ID
system QL, 9-20
system timing, 9-17
system timing status
modify, 10-7
.............................................................
T Tagging mode
for Ethernet cards, 6-52
TAP, 3-21
target identifier
for OMS-to-E connections
See: TID
TCAmode, 14-19
test loops, 13-4
test the communication with an
E, 4-14
Threshold Crossing Alert, 14-4
Threshold crossing alert (TCA)
TCAmode, 14-19
Threshold Report (TR), 14-7
Thresholds, 14-7
Alarms, 14-11
TID
for OMS-to-E connections,
4-4
TIM, 11-9, 13-6
timing
mode, 9-3
network synchronization, 9-5
output, 9-2
priorities, 9-9
quality levels, 9-7
reference, 9-2
retiming, 9-11
sources, 9-12
Timing alarm reporting, 6-31, 6-37
Timing mode, 6-31, 6-36
timing mode, 9-20, 9-26
Timing mode
for E system timing, 10-7
Timing source to switch to
for E system timing, 10-7
for SCO timing status, 10-14
TP, 11-5
TP 1: High order TP
for cross-connections, 12-5
TP 1: Low order TP
for cross-connections, 12-5
TP 2: High order TP
for cross-connections, 12-5
TP 2: Low order TP
for cross-connections, 12-5
TR, 14-14
Trace Identifier Mismatch, 14-9
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-12 365-312-877R7.2Issue 4 November 2009
trace identifier mismatch
See: TIM
trail termination point
See: TTP
trail trace identifier
See: TTI
Trail trace mismatch detection
mode, 6-30, 6-48
transfer
remote device generic from E
to remote device, 17-27
remote device generic from the
management system, 17-22
transfer an E generic from the
management system to an E,
17-6
TransLA®
cards, 11-13
TransLA®
overview, 11-13
transmission architecture, 5-2
transmission plan, 11-2
transmission speed, 11-26
Transmitted trace display mode,
6-29, 6-47
Transmitted trail trace format,
6-29, 6-47
Transmitted trail trace value, 6-29,
6-47
transparent DCC
cross-connections, 3-13
Tresholds, 14-13
tresholds, 14-14
TTI, 13-5
TTP, 13-5
TU-AIS, 11-9
TU-LOP, 11-9
tunnel auto provisioning
See: TAP
.............................................................
U UAP, 14-8, 14-12, 14-13
UAS, 14-8, 14-12
UAS/UAT, 14-4
UITS, 3-14
unacknowledged information
transfer service
See: UITS
uncorrelated cross-connections
add, 12-5
UEQ, 11-9
Untagged frame processing, 6-26,
6-35
update
MIB image, 6-64
upload
MIB into management system,
6-62
.............................................................
V VC TTP view
for VCGs, 6-56
VC TTPs
view, 6-59
VC-n concatenation, 11-7
VCG
auto-discovery of, 3-32
modify, 6-56
view, 6-54
VCG capacity
for VCGs, 6-56
VCG TTP mode
for VCGs, 6-56
VCG type
for VCGs, 6-56
view
alarms associated with an
MDO, 6-75
cross-connections, 12-2
DCC in MSP mode, 4-25
Ethernet card information,
6-51
list of DCC/EOW status for the
port overheads, 4-20
list of in-progress transfers of
E generics, 17-10
list of ITM-CIT access control
profiles, 2-4
list of ITM-CIT accesses, 2-2
list of MDIs, 6-78
list of MDOs, 6-74
list of MIB backups stored on
the management system,
17-38
list of MSP protection groups,
12-9
list of E database versions
stored on an E, 17-41
list of E database versions
stored on the management
system, 17-38
list of E generics stored on an
E, 17-14
list of E generics stored on
the management system, 17-3
list of E system timing
sources, 10-5
list of E timing ports, 10-2
list of E timing sources, 10-9
list of OMS-to-E
connections, 4-3
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
365-312-877R7.2Issue 4 November 2009
IN-13
list of overhead access ports,
4-28
list of SCO timing sources,
10-12
list of SFP modules, 6-8
list of SHDSL remote power
supply ports, 6-98
list of SHDSL units, 6-81
list of slots, 6-4
list of transparent DCC
cross-connections, 4-29
E event parameter settings,
6-70
SFP module information, 6-10
SHDSL device information,
6-88
SHDSL spans, 6-83
VC TTPs, 6-59
VCG, 6-54
virtual concatenation, 11-7, 11-18,
11-18
virtual switch, 11-15
VLA tagging, 11-22, 11-29
VLA tags, 11-21
.............................................................
W Wait to restore time (minutes)
for MSP protection groups,
12-11, 12-13
wait to restore timer, 11-11
wait to restore timer for VC TTPs
reset, 6-60
WA ports, 11-14
port roles, 11-21
worker reference, 9-15
Working reference
for E timing sources, 10-10
Working Section
for MSP protection groups,
12-11
WTR, 6-60
.............................................................
X X12SHDSL, 6-7
X12SHDSL option card, 5-11
X12SHDSL-V2, 6-7
X16DS1, 6-7
X16E1-V3, 6-7
X2DS3-V2, 6-7
X2E3-V2, 6-7
X2S11TRIB, 6-7
X2STM1ETRIB, 6-7
X4IP-V1, 6-7
X4IP-V2, 6-7
X4X.21, 6-7
X5IP, 6-7
X8PL, 6-7
Index
...................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................
IN-14 365-312-877R7.2Issue 4 November 2009