You are on page 1of 139

iManager U2000 Unified Network Management System V100R001C00

Operation Guide for WDM End-to-End Management

Issue Date

02 2009-10-23

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com support@huawei.com

Website: Email:

Copyright Huawei Technologies Co., Ltd. 2009. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are the property of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided AS IS without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Operation Guide for WDM End-to-End Management

Contents

Contents
About This Document.....................................................................................................................1 1 Customer Management.............................................................................................................1-1
1.1 Creating a Customer........................................................................................................................................1-3 1.2 Browsing Customer Information.....................................................................................................................1-3 1.3 Viewing Relevant Trails of a Customer..........................................................................................................1-3 1.4 Browsing Current Alarms of a Customer........................................................................................................1-4 1.5 Browsing History Alarms of a Customer........................................................................................................1-5 1.6 Modifying Customer Information...................................................................................................................1-6 1.7 Deleting a Customer........................................................................................................................................1-6 1.8 Viewing the Customers Affected by an Alarm...............................................................................................1-6 1.9 Specifying the Customer of a Service.............................................................................................................1-7

2 Managing WDM Protection Subnets.....................................................................................2-1


2.1 Basic Concepts................................................................................................................................................2-2 2.1.1 Protection Subnet...................................................................................................................................2-2 2.1.2 Isolated Node..........................................................................................................................................2-2 2.2 Searching for Protection Subnets....................................................................................................................2-2 2.3 Configuring 1:N Wavelength Protection.........................................................................................................2-3 2.3.1 Creating 1:N Optical Channel Protection...............................................................................................2-3 2.3.2 Searching for 1:N Wavelength Protection Subnet.................................................................................2-5 2.3.3 Setting 1:N Wavelength Protection Subnet Parameters.........................................................................2-6 2.3.4 Verifying the 1:N Wavelength Protection Switching............................................................................2-7 2.4 Configuring Protection for an ODUk SPRing.................................................................................................2-8 2.4.1 Creating an ODUk SPRing Protection Group........................................................................................2-8 2.4.2 Searching for an ODUk SPRing Protection Subnet.............................................................................2-10 2.4.3 Setting Parameters of an ODUk SPRing Protection Subnet................................................................2-11 2.4.4 Verifying the ODUk SPRing Protection Switching.............................................................................2-11 2.4.5 ODUk Ring Network Protection..........................................................................................................2-13 2.5 Maintaining Protection Subnets....................................................................................................................2-17 2.5.1 Finding Protection Subnets..................................................................................................................2-17 2.5.2 Querying Protection Subnet Resources................................................................................................2-18 2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet..................................2-18 2.5.4 Performing ODUk Ring Protection Switching.....................................................................................2-19 Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. i

Contents

iManager U2000 Operation Guide for WDM End-to-End Management

2.6 Deleting Isolated Nodes................................................................................................................................2-21 2.7 Deleting Protection Subnets..........................................................................................................................2-21

3 End-to-End WDM Management..............................................................................................3-1


3.1 Managing WDM Trails...................................................................................................................................3-2 3.1.1 Basic Concepts.......................................................................................................................................3-2 3.1.1.1 WDM Trail..........................................................................................................................................3-3 3.1.1.2 Conflict Trail.......................................................................................................................................3-7 3.1.1.3 Trail Creation Method.........................................................................................................................3-9 3.1.1.4 Process for Creating a Trail...............................................................................................................3-10 3.1.2 Creating WDM Trails by Trail Search.................................................................................................3-11 3.1.2.1 Searching for WDM Trails................................................................................................................3-12 3.1.2.2 Discrete Service Causes and Handling Measures.............................................................................3-13 3.1.3 Configuring WDM Trails.....................................................................................................................3-14 3.1.3.1 Creating an OCh Trail.......................................................................................................................3-15 3.1.3.2 Creating an ODUk Trail....................................................................................................................3-17 3.1.3.3 Creating Client Trails........................................................................................................................3-19 3.1.4 Viewing WDM Trails...........................................................................................................................3-20 3.1.4.1 Viewing Route Information of WDM Trail......................................................................................3-21 3.1.4.2 Viewing the Signal Flow Diagram for WDM Trails.........................................................................3-22 3.1.4.3 Viewing Relevant Client Trails.........................................................................................................3-23 3.1.4.4 Browsing Related Server Trails........................................................................................................3-23 3.1.4.5 Viewing the Optical Power for the Trails.........................................................................................3-24 3.1.4.6 Analyzing the WDM Trail Fault.......................................................................................................3-25 3.1.4.7 Viewing the Connectivity of WDM Services Networkwide.............................................................3-26 3.1.4.8 Browsing Associated Working and Protection Trails.......................................................................3-27 3.1.5 Maintaining WDM Trails.....................................................................................................................3-27 3.1.5.1 Activating/Deactivating WDM Trails...............................................................................................3-28 3.1.5.2 Configuring OTU Overhead on the OCh Trail.................................................................................3-29 3.1.5.3 Querying the 1+1 Protection for a WDM Trail.................................................................................3-30 3.1.5.4 Performing 1+1 Protection Switching for a WDM Trail..................................................................3-31 3.1.5.5 Querying the WXCP/SNCP Protection of a WDM Trail..................................................................3-32 3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail............................................3-32 3.1.5.7 Querying the DPPS Protection of a WDM Trail...............................................................................3-33 3.1.6 Collecting Resource Statistics..............................................................................................................3-33 3.1.6.1 Collecting Statistics on Client-Side Port Resources.........................................................................3-34 3.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources...........................................................3-35 3.1.6.3 Collecting Statistics on WDM Link Resources.................................................................................3-36 3.1.7 Modifying WDM Trails.......................................................................................................................3-37 3.1.7.1 Modifying the Source and Sink of a Client Trail..............................................................................3-37 3.1.7.2 Modifying WXCP/SNCP Protection.................................................................................................3-38 3.1.7.3 Modifying Trail Names in Batches...................................................................................................3-39 3.1.8 Deleting a WDM Trail.........................................................................................................................3-40 ii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

Contents

3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode.....3-41 3.1.10 Sample Application: Configuring an OCh Trail................................................................................3-45 3.2 Configuring EAPE........................................................................................................................................3-50 3.2.1 EAPE....................................................................................................................................................3-50 3.2.2 Creating an OCh Trail..........................................................................................................................3-54 3.2.3 Creating EAPE Objects........................................................................................................................3-56 3.2.4 Starting EAPE Adjustment...................................................................................................................3-57 3.2.5 Deleting EAPE Objects........................................................................................................................3-58 3.3 Managing Alarms on WDM Trails...............................................................................................................3-58 3.3.1 Viewing Current Alarms of a WDM Trail...........................................................................................3-59 3.3.2 Viewing History Alarms of a WDM Trail...........................................................................................3-59 3.3.3 Managing Networkwide WDM Alarm Trails in Real Time................................................................3-60 3.4 Managing the Performance of WDM Trails..................................................................................................3-60 3.4.1 Querying Current Performance of WDM Trails..................................................................................3-61 3.4.2 Browsing the History Performance of WDM Trails............................................................................3-61 3.4.3 Setting Performance Monitoring Parameters of an WDM Trail..........................................................3-62 3.4.4 Setting WDM Trail Performance Threshold........................................................................................3-63

A Glossary and Abbreviations..................................................................................................A-1


A.1 Numerics........................................................................................................................................................A-2 A.2 A....................................................................................................................................................................A-2 A.3 B....................................................................................................................................................................A-6 A.4 C....................................................................................................................................................................A-7 A.5 D....................................................................................................................................................................A-8 A.6 E.....................................................................................................................................................................A-9 A.7 F...................................................................................................................................................................A-11 A.8 G..................................................................................................................................................................A-12 A.9 H..................................................................................................................................................................A-12 A.10 I..................................................................................................................................................................A-13 A.11 L.................................................................................................................................................................A-15 A.12 M................................................................................................................................................................A-15 A.13 N................................................................................................................................................................A-17 A.14 O................................................................................................................................................................A-18 A.15 P.................................................................................................................................................................A-20 A.16 Q................................................................................................................................................................A-21 A.17 R................................................................................................................................................................A-21 A.18 S.................................................................................................................................................................A-22 A.19 T.................................................................................................................................................................A-26 A.20 U................................................................................................................................................................A-28 A.21 V................................................................................................................................................................A-29 A.22 W...............................................................................................................................................................A-30 A.23 X................................................................................................................................................................A-31

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iii

iManager U2000 Operation Guide for WDM End-to-End Management

Figures

Figures
Figure 3-1 Trail....................................................................................................................................................3-4 Figure 3-2 OSC Trail............................................................................................................................................3-4 Figure 3-3 ODUk (k = 1, 2, ...) trail.....................................................................................................................3-5 Figure 3-4 ODUk (k = 0, 1, 2, ...) trail.................................................................................................................3-5 Figure 3-5 40G inverse multiplexing trail ...........................................................................................................3-6 Figure 3-6 10G inverse multiplexing trail ...........................................................................................................3-7 Figure 3-7 A conflict trail generated because a fiber is added.............................................................................3-8 Figure 3-8 A conflict trail generated because a single station cross-connection is lost.......................................3-8 Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis........................3-8 Figure 3-10 Creating trails by trail search..........................................................................................................3-10 Figure 3-11 Creating trails in the automatic mode.............................................................................................3-11 Figure 3-12 Network Design..............................................................................................................................3-42 Figure 3-13 Station A.........................................................................................................................................3-42 Figure 3-14 Station B.........................................................................................................................................3-43 Figure 3-15 Station C.........................................................................................................................................3-43 Figure 3-16 Station D.........................................................................................................................................3-43 Figure 3-17 Network design...............................................................................................................................3-46 Figure 3-18 NE panel on station A.....................................................................................................................3-47 Figure 3-19 Signal flow of the trail from station B to station C........................................................................3-47 Figure 3-20 Signal flow of the trail from station B to station D........................................................................3-48 Figure 3-21 Signal flow of the trail from station D to station B........................................................................3-48 Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source.................................3-52 Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources .............................................................................................................................................................................3-53 Figure 3-24 Scenario of the dual VOA units with the OLP protection units.....................................................3-53

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Operation Guide for WDM End-to-End Management

Tables

Tables
Table 3-1 ODUk rate level...................................................................................................................................3-3 Table 3-2 Comparison of methods for creating trails...........................................................................................3-9 Table 3-3 Network data table.............................................................................................................................3-46 Table 3-4 The versions of the equipment and U2000 that support the EAPE function.....................................3-51

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

vii

iManager U2000 Operation Guide for WDM End-to-End Management

About This Document

About This Document


Purpose
The iManager U2000 Operation Guide for WDM End-to-End Management describes the operation tasks of managing WDM network in the trail mode. This document also provides the glossary, and the acronyms and abbreviations.

Related Version
The following table lists the product version related to this document. Product Name iManager U2000 Version V100R001C00

Intended Audience
The intended audiences of this document are:
l l l l

Network Monitoring Engineer Data Configuration Engineer NM Administrator System Maintenance Engineer

Organization
This document is organized as follows. Chapter 1 Customer Management 2 Managing WDM Protection Subnets Description This chapter describes how to manage and maintain the customer information. This chapter describes how to manage WDM protection subnets.
1

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

About This Document

iManager U2000 Operation Guide for WDM End-to-End Management

Chapter 3 End-to-End WDM Management A Glossary and Abbreviations

Description This chapter describes end-to-end WDM management. This part lists the glossary and abbreviations used in the document.

Conventions
Symbol Conventions
The following symbols may be found in this document. They are defined as follows. Symbol Description

DANGER

Indicates a hazard with a high level of risk which, if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury. Indicates a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results. Provides additional information to emphasize or supplement important points of the main text. Indicates a tip that may help you solve a problem or save you time.

WARNING

CAUTION
NOTE

TIP

General Conventions
Convention Times New Roman Boldface Description Normal paragraphs are in Times New Roman. Names of files, directories, folders, and users are in boldface. For example, log in as user root. Book titles are in italics. Terminal display is in Courier New.

Italic Courier New

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

About This Document

Command Conventions
Convention Boldface Italic [] { x | y | ... } [ x | y | ... ] Description The keywords of a command line are in boldface. Command arguments are in italic. Items (keywords or arguments) in square brackets [ ] are optional. Alternative items are grouped in braces and separated by vertical bars. One is selected. Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. Optional alternative items are grouped in square brackets and separated by vertical bars. A maximum of all or none can be selected.

{ x | y | ... } *

[ x | y | ... ] *

GUI Conventions
Convention Boldface Description Buttons, menus, parameters, tabs, window, and dialog titles are in boldface. For example, click OK. Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder.

>

Keyboard Operation
Format Key Key 1+Key 2 Description Press the key. For example, press Enter and press Tab. Press the keys concurrently. For example, pressing Ctrl+Alt+A means the three keys should be pressed concurrently.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

About This Document

iManager U2000 Operation Guide for WDM End-to-End Management

Format Key 1, Key 2

Description Press the keys in turn. For example, pressing Alt, A means the two keys should be pressed in turn.

Mouse Operation
Action Click Double-click Description Select and release the primary mouse button without moving the pointer. Press the primary mouse button twice continuously and quickly without moving the pointer. Press and hold the primary mouse button and move the pointer to a certain position.

Drag

Update History
Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions.

Updates in Issue 02 (2009-10-23) Based on Product Version V100R001C00


The updated contents are as follows. Some bugs in the manual of the previous version are fixed.

Updates in Issue 01 (2009-09-25) Based on Product Version V100R001C00


Initial release.

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

1 Customer Management

1
About This Chapter

Customer Management

By using the U2000, you can manage and maintain the customer information as required. 1.1 Creating a Customer You can create customer information as required, so that you can set a specific customer and a maintenance network for the trail. 1.2 Browsing Customer Information By browsing customer information, you can know the name, legal representative and contact modes of the relevant customer of the service. 1.3 Viewing Relevant Trails of a Customer In a normally running network, the trail is the carrier of the customer service and is the resource of the customer. In the network management, knowing the trails of different customers is very helpful to take care of the interests of different customers. 1.4 Browsing Current Alarms of a Customer Each customer has a number of services that can report alarms when they run in the network. These alarms show the current status of the service. For this reason, you must query the current alarms of the customer. 1.5 Browsing History Alarms of a Customer By querying the history alarms of a customer, you can learn about the long-term status of the services that run in the network. When maintaining the services of the customer, you can use the history alarm information for reference. 1.6 Modifying Customer Information If the customer information such as contact mode is changed, you need to modify the customer information in time. 1.7 Deleting a Customer The information of customers with whom contracts are fulfilled must be deleted. This operation ensures that the customer information is not disclosed, and decreases the redundant information in the database. 1.8 Viewing the Customers Affected by an Alarm

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-1

1 Customer Management

iManager U2000 Operation Guide for WDM End-to-End Management

When an alarm occurs on a service, you need to query the customers that are affected by the alarm. According to the query result, you can determine whether to notify the customer of the alarm. 1.9 Specifying the Customer of a Service When creating and modifying a service, you need to specify the customer that the service belongs to. This can facilitate the trail management.

1-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

1 Customer Management

1.1 Creating a Customer


You can create customer information as required, so that you can set a specific customer and a maintenance network for the trail.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Management window is displayed. Step 2 Click Create, the Create Customer window is displayed. Step 3 According to actual requirements, fill in the new customer information, such as Customer Name, Legal Representative, and Phone. Step 4 Click OK, the new customer information field is displayed in the customer list. ----End

1.2 Browsing Customer Information


By browsing customer information, you can know the name, legal representative and contact modes of the relevant customer of the service.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. In the Customer Management window, all customer information is displayed. Step 2 Optional: If the customer information is changed, you can click Refresh to browse the changed customer information. ----End

1.3 Viewing Relevant Trails of a Customer


In a normally running network, the trail is the carrier of the customer service and is the resource of the customer. In the network management, knowing the trails of different customers is very helpful to take care of the interests of different customers.

Prerequisite
You must be an NM user with "network monitor" authority or higher.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-3

1 Customer Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The information of all customers is displayed in the Customer Management window. Step 2 You can view the SDH/WDM/Ethernet/ATM trails seperately. l l l l Right-click a record of customer information, and choose Browse Relevant Trails > SDH Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > WDM Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > Ethernet Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > ATM Trail from the shortcut menu.

The SDH/WDM/Ethernet/ATM trails of the customer are displayed in the SDH/WDM/ Ethernet/ATM Trail Management window. ----End

1.4 Browsing Current Alarms of a Customer


Each customer has a number of services that can report alarms when they run in the network. These alarms show the current status of the service. For this reason, you must query the current alarms of the customer.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Managementdialog box displays the information about all the customers. Step 2 You can view the SDH/WDM/Ethernet/ATM current alarms separately. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH Current Alarm. Right-click a customer and choose Browse Relevant Alarms > WDM Current Alarm. Right-click a customer and choose Browse Relevant Alarms > Ethernet Current Alarm. Right-click a customer and choose Browse Relevant Alarms > ATM Current Alarm.

The current SDH/WDM/Ethernet/ATM service alarms of the customer are displayed in the Current Alarms dialog box. Step 3 To display the latest alarms, select the Display latest alarms check box in the bottom-left corner.
NOTE

This check box is similar to the refresh function. After you select this check box, theRefresh button is unavailable.

Step 4 Optional: Right-click one or more alarms, and select Check from the short menu to check the selected alarms.
1-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management


NOTE

1 Customer Management

The check function means that one or more currently unterminated alarms on the U2000 are compared with those on the NE side. If the alarm is found among the current alarms on the NE side, it is not modified on the U2000 side. Otherwise, terminate it on the U2000 side.

Step 5 Select an alarm. The detail information and reason of the alarm are displayed in the following list. Step 6 Optional: Select one or more alarms. Click Acknowledge to display the Acknowledge Alarms dialog box. Step 7 Optional: Click Yes. The Ack Time, Ack Status and Ack User columns of the selected alarm shows the relevant values.
NOTE

The confirmed and terminated alarms are changed to history alarms.

Step 8 Optional: Select one or more alarms, and then click Delete. In the Delete the Alarms prompt box, click Yes. The progress bar is displayed for the operation of deleting the alarms. Step 9 Optional: Click Print or Save As to output the alarm data. ----End

1.5 Browsing History Alarms of a Customer


By querying the history alarms of a customer, you can learn about the long-term status of the services that run in the network. When maintaining the services of the customer, you can use the history alarm information for reference.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Management dialog box displays the information about all the customers. Step 2 You can view the SDH/WDM/Ethernet/ATM history alarms separately. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH History Alarm. Right-click a customer and choose Browse Relevant Alarms > WDM History Alarm. Right-click a customer and choose Browse Relevant Alarms > Ethernet History Alarm. Right-click a customer and choose Browse Relevant Alarms > ATM History Alarm.

The history alarms of the SDH/WDM/Ethernet/ATM service are displayed in the History Alarms dialog box. Step 3 Optional: Select an alarm. The detail information and reason of the alarm are displayed in the following list. Step 4 Optional: Click Print or Save As to output the alarm data. ----End
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-5

1 Customer Management

iManager U2000 Operation Guide for WDM End-to-End Management

1.6 Modifying Customer Information


If the customer information such as contact mode is changed, you need to modify the customer information in time.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. Step 2 Select a customer from the customer list, edit the customer information, and then click Apply. Step 3 The Operation Result prompt box is displayed. Click Close. ----End

1.7 Deleting a Customer


The information of customers with whom contracts are fulfilled must be deleted. This operation ensures that the customer information is not disclosed, and decreases the redundant information in the database.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. Step 2 Select the customer to be deleted. Click Delete. In the Warningdialog box, select Yes.
NOTE

Deleting the customer does not affect the information of the trails and alarms that are related to the customer.

Step 3 The Operation Result prompt box is displayed. Click Close. ----End

1.8 Viewing the Customers Affected by an Alarm


When an alarm occurs on a service, you need to query the customers that are affected by the alarm. According to the query result, you can determine whether to notify the customer of the alarm.

Prerequisite
You must be an NM user with "network monitor" authority or higher.
1-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

1 Customer Management

Procedure
Step 1 Choose Fault > Browse Current Alarm or Fault > Browse History Alarm from the main menu. The window of viewing alarms is displayed. Step 2 Right-click an alarm and choose Alarm Affected Customers from the shortcut menu.
NOTE

You can query the customers affected by only the alarms that occur on trails.

Step 3 In the Customer Management window, view the information about the customers that are affected by the alarm. ----End

1.9 Specifying the Customer of a Service


When creating and modifying a service, you need to specify the customer that the service belongs to. This can facilitate the trail management.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
For WDM trails, you can not specify the customers of OTS, OMS, OSC level trails.

Procedure
Step 1 Choose Service > SDH Trail > SDH Trail Management, Service > WDM Trail > WDM Trail Management, Service > MSTP ATM Trail > ATM Trail Management, Service > MSTP Ethernet Trail > Ethernet Trail Management, Service > PTN Service > L3VPN Service Management, Service > PTN Service > L2VPN Service Management, Service > PTN Service > CES Service Management, or Service > PTN Service > ATM Service Management from the main menu. Step 2 In the trail management window, double-click a trail. In the Details window, select the required customer. Step 3 Click OK. ----End

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-7

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Managing WDM Protection Subnets

About This Chapter


A protection subnet has a structure of providing complete self-protection functions. The purpose of managing protection subnets is to configure and display network protection, for example, browsing, deleting, modifying and searching for protection subnets, managing isolated nodes. 2.1 Basic Concepts According to the layered structure of transport network, protection subnet, belonging to the network layer, refers to a network structure that has a comprehensive self-protection function. The protection subnet is a network unit of composing the optical transport network. To have a good understanding of the protection subnet, you need to learn some basic concepts of the network layer. 2.2 Searching for Protection Subnets By searching for a protection subnet, the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically. 2.3 Configuring 1:N Wavelength Protection On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength protection subnets, and perform an external switch from 1:N wavelength protection subnets. 2.4 Configuring Protection for an ODUk SPRing By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create an ODUk protection group, search for the ODUk SPRing, perform data consistency check on the ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an ODUk SPRing. 2.5 Maintaining Protection Subnets On the U2000, you can maintain protection subnets. 2.6 Deleting Isolated Nodes To release protection resources that are used by isolated nodes, you need to delete isolated nodes. 2.7 Deleting Protection Subnets When an existing protection subnet is not suitable, you can delete the protection subnet.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-1

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

2.1 Basic Concepts


According to the layered structure of transport network, protection subnet, belonging to the network layer, refers to a network structure that has a comprehensive self-protection function. The protection subnet is a network unit of composing the optical transport network. To have a good understanding of the protection subnet, you need to learn some basic concepts of the network layer. 2.1.1 Protection Subnet A protection subnet refers to a network architecture that has a comprehensive self-protection function. It is a network that composes the optical transmission network. 2.1.2 Isolated Node An isolated node is not equal to an isolated NE. An isolated node refers to a special logical system that is independent from any protection subnet. An isolated node does not belong to any protection subnet.

2.1.1 Protection Subnet


A protection subnet refers to a network architecture that has a comprehensive self-protection function. It is a network that composes the optical transmission network. In the U2000, a protection subnet is a network level concept. NEs and fiber connections are the basic elements required to construct a protection subnet. You should create NEs, perform basic configurations for them, and then properly create fiber connections between the NEs. You should have access to sufficient resources to create a protection subnet.

2.1.2 Isolated Node


An isolated node is not equal to an isolated NE. An isolated node refers to a special logical system that is independent from any protection subnet. An isolated node does not belong to any protection subnet. An isolated node is a node that is configured at NEs but cannot or does not compose a protection subnet with other nodes. Currently, the WDM equipment supports the 1:N optical path protection subnet and the ODUk SPRing protection subnet. The network node that is configured with the 1:N optical path protection group or the ODUk SPRing protection group but does not belong to any protection subnet is an isolated node. An isolated node should not exist in a transmission network that runs normally. The reason for the existence of any isolated nodes can be as follows:
l l

The configuration is incorrect at the NE side. The fiber that should be connected to the node is not created on the U2000.

2.2 Searching for Protection Subnets


By searching for a protection subnet, the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically.
2-2 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Prerequisite
l l

You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet and click Next.
NOTE

If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.

Step 3 Click Search to start the search. The Subnet Name, Consistent Status and Subnet Type parameters of the searched protection subnet are automatically displayed.
NOTE

If there are isolated nodes searched out, you can delete the nodes that do not form any protection subnet. Refer to 2.6 Deleting Isolated Nodes.

Step 4 Click Finish. The searched protection subnet is displayed in the Main Topology. ----End

2.3 Configuring 1:N Wavelength Protection


On the U2000, you can create 1:N wavelength protection groups, search for 1:N wavelength protection subnets, and perform an external switch from 1:N wavelength protection subnets. 2.3.1 Creating 1:N Optical Channel Protection 1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical channel protection group for each node. 2.3.2 Searching for 1:N Wavelength Protection Subnet After creating 1:N wavelength protection groups and searching for WDM trails, you need to search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength protection as a protection subnet. 2.3.3 Setting 1:N Wavelength Protection Subnet Parameters You can set parameters for a 1:N wavelength protection subnet. 2.3.4 Verifying the 1:N Wavelength Protection Switching After you search out the 1:N wavelength protection subnet and set the related parameters, you can verify whether the subnet works properly by performing the switching and querying the switching status.

2.3.1 Creating 1:N Optical Channel Protection


1:N (N8) optical channel protection is created based on 1:N (N8) optical channel protection group. To create 1:N (N8) optical channel protection, you need to create a 1:N (N8) optical channel protection group for each node.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-3

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Prerequisite
l l l l l

You must be an NM user with "NE operator" authority or higher. Fibers must be correctly created, and all internal and external fibers must be correctly connected. An OCP board and two or more OTU boards of same kind must be created. Applies to the OptiX BWS 1600G, OptiX BWS 320GV3, OptiX BWS 1600G OLA and OptiX BWS 1600S. Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).

Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > 1:N Optical Channel Protection from the Function Tree. Step 2 Click Query to query the information about the protection from the NE. Step 3 Click New. The Create dialog box is displayed. Step 4 Double-click the Number of Working Channels field, and choose the proper number from the drop-down list. For other parameters, refer to 1:N Optical Channel Protection. Step 5 Double-click the OTU Optical Interface Number field corresponding to the Protection Channel of the Working Channel-1. Set the optical interface number of each working channel in a similar way. Double-click Protection Priorities of Protection Channel, and set the priority based on the actual requirement.

2-4

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management


NOTE

2 Managing WDM Protection Subnets

l l l

OTUs that serve as the working and protection channels must be configured on the same NE. Every board in this protection group and the OCP board must be set in the same shelf. If you need to check the consistency of the parameters, you need to set Parameter Consistency Check Flag to a proper value.

Step 6 Click OK. The created 1:N (N8) optical channel protection group is displayed. Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N8) wavelength protection group of the opposite NE. ----End

2.3.2 Searching for 1:N Wavelength Protection Subnet


After creating 1:N wavelength protection groups and searching for WDM trails, you need to search for the 1:N wavelength protection subnet. In this way, you can manage the 1:N wavelength protection as a protection subnet.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. Applies to the OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX BWS 1600S and the OptiX BWS 320GV3. Applies to the LWF, LWFS, LWS, LWC, LWC1, LBE, LBES, LBF, LBFS boards. Fibers must be created properly. The 1:N wavelength protection group must be created. The WDM trail must be created and the bidirectional client trail must be searched out.

l l l l

Background Information
For two NEs that are preconfigured as a 1:N WDM protection subnet, the protection group IDs of the WDM protection groups on the NEs must be consistent.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 Click Next to perform the consistency check of the subnet. Step 3 Click Search to search for the protection subnet. The existing 1:N wavelength protection subnet is displayed in the Protection View.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-5

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. Step 5 Click Finish. ----End

2.3.3 Setting 1:N Wavelength Protection Subnet Parameters


You can set parameters for a 1:N wavelength protection subnet.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection subnet must be searched out. Applies to the OptiX BWS 1600G, OptiX BWS 1600S and the OptiX BWS 320GV3. 

Context

CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform this operation.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Select a protection link, right-click, and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes user interface is displayed. Click the Protection Subnet Parameters tab.
2-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Step 3 Set parameters for the protection subnet. Step 4 Click Apply. ----End

2.3.4 Verifying the 1:N Wavelength Protection Switching


After you search out the 1:N wavelength protection subnet and set the related parameters, you can verify whether the subnet works properly by performing the switching and querying the switching status.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection group must be searched out.

Context

CAUTION
Performing protection switching may interrupt services.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet.
NOTE

If the protocol on a node is disabled, enable the protocol first.

Step 4 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. l To perform a manual switching, click East or West and select Manual Switching from the drop-down menu. Then, select the channel that services are switched to according to the OCP optical swtich number. To perform a forced switching, click East or West and select Forced Switching from the drop-down menu. Then, select the channel that services are switched to according to the OCP optical swtich number.
NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.

Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-7

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the 1:N wavelength protection subnet. Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then select Clear from the drop-down menu to clear the switching on each node. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End

2.4 Configuring Protection for an ODUk SPRing


By using the U2000, you can query the protection subnet resources for an ODUk SPRing, create an ODUk protection group, search for the ODUk SPRing, perform data consistency check on the ODUk SPRing, set the protection subnet parameters for the ODUk SPRing, and delete an ODUk SPRing. 2.4.1 Creating an ODUk SPRing Protection Group The ODUk SPRing protection is used in a ring network that is configured with distributed services. It occupies two ODUk channels, realizing the protection for multiple services among all stations. 2.4.2 Searching for an ODUk SPRing Protection Subnet The U2000 can search for and form ODUk SPRing protection subnets according to the created fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In this way, ODUk SPRing networks can be managed as protection subnets. 2.4.3 Setting Parameters of an ODUk SPRing Protection Subnet This section describes how to set parameters of an ODUk SPRing protection subnet. 2.4.4 Verifying the ODUk SPRing Protection Switching This topic describes how to perform the external switching for an ODUk SPRing protection on the U2000. During the deployment commissioning, the external switching is performed to test whether the ODUk SPRing protection functions normally and provides protection. 2.4.5 ODUk Ring Network Protection In this user interface, you can configure the east working channel, west working channel, protection channel, span ID and management node of the ODUk ring network protection.

2.4.1 Creating an ODUk SPRing Protection Group


The ODUk SPRing protection is used in a ring network that is configured with distributed services. It occupies two ODUk channels, realizing the protection for multiple services among all stations.

Prerequisite
You must be an NM user with "NE operator" authority or higher. Currently, The ODU1/ODU2-level protection can be achieved. When configuring the ODUk SPRing protection of ODU1 or ODU2 levels, the Service Mode of the port on the line board should be set to ODU1 or ODU2.
2-8 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Background Information
l

When the protection channel forms a ring, you can search out an ODUk protection subnet at the network layer. The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently.

Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the Function Tree. Step 2 Click New. The New ODUk Ring Network Protection dialog box is displayed. Step 3 Set Protection Group ID and Level as required. In the Select Mapping Direction area, set the West Working Unit, West Protection Unit, East Working Unit, and East Protection Unit. To set a unit, select one channel from the Available Channel and click .

NOTE

l l l

The services in the east and west directions must be configured on different NS2/ND2 boards. The working and protection channels in the east and west directions of an ODUk protection group can be on different NS2/ND2 boards. You can create a protection group when the Selected Channel contains at least East Protection Unit and West Protection Unit.

Step 4 Click OK. After successful operation, click Close in the Operation Result dialog box. Step 5 Select one protection group. In Channel Mapping Relation, select West Working Unit and East Working Unit. Right-click them, and select Bound Span ID.
NOTE

l l

Before binding the span IDs, ensure that a bidirectional cross-connection is created successfully between the working unit in the protection group in the corresponding direction and the add/drop board. The span IDs need be bound only on the stations that add or drop services. In the case of those stations that do not add or drop services, you need not perform such an operation.

Step 6 In the Bound Span ID window, set Span ID, and then click OK. Span ID will be updated.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-9

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Step 7 Select one protection group. Right-click the Management Node, and select YES. Then click Apply. Management Node will be updated. Step 8 Select one protection group, and you can set parameters such as WTR Time(s) and Enable SD. In Channel Mapping Relation, double-click the Hold-Off Time(s) and set the hold-off time. For related parameters, refer to 2.4.5 ODUk Ring Network Protection.
NOTE

The hold-off time of the protection unit should be longer than that of the working unit.

Step 9 In the case of the NEs in other stations on the ring, start the NE Explorer. Then, refer to Steps 1 through 8 to create the ODUk SPRing protection on the local NE, to complete the creation of the protection ring.
NOTE

In a ODUk SPRing protection group, there must be only one management node.

Step 10 After the protection ring is created, select one protection group, and click Start Protocol to make the protection group take effect. Step 11 Optional: Select one protection group and click Delete. Click OK on the Confirm dialog box displayed. The protection group is deleted. ----End

2.4.2 Searching for an ODUk SPRing Protection Subnet


The U2000 can search for and form ODUk SPRing protection subnets according to the created fiber cables and ODUk SPRing protection groups. After you create an ODUk SPRing protection group or search for WDM trails, you need to search for ODUk SPRing protection subnets. In this way, ODUk SPRing networks can be managed as protection subnets.

Prerequisite
l l l l l

You must be an NM user with "network operator" authority or higher. Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I. Fiber connections must be created. All internal and external fibers are correctly connected. The bidirectional server trail must be searched out. An ODUk protection group must be created.

Context
NOTE

The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trail exists between the ports of adjacent protection groups.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 Click Next to check consistency of the protection subnet. Step 3 Click Search to search for the protection subnet. The ODUk SPRing protection subnet that is searched out is displayed.
2-10 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. Step 5 Click Finish. ----End

2.4.3 Setting Parameters of an ODUk SPRing Protection Subnet


This section describes how to set parameters of an ODUk SPRing protection subnet.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I. The ODUk SPRing protection subnet must be searched out.

Context

CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform this operation.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click a protection link and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes user interface is displayed. Click the Protection Subnet Parameters tab. Step 3 Click Query to query the parameters of the protection subnet from the NE side. Step 4 Set the WTR Time(s), SD Condition, and Management Node as required. Step 5 Optional: Click Calculate Span ID. The calculated span ID is displayed in the Span ID field. Step 6 Click Apply. After the operation succeeds, click Close in the Operation Result dialog box. Step 7 Click Close to return to the Protection View. ----End

2.4.4 Verifying the ODUk SPRing Protection Switching


This topic describes how to perform the external switching for an ODUk SPRing protection on the U2000. During the deployment commissioning, the external switching is performed to test whether the ODUk SPRing protection functions normally and provides protection.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-11

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The ODUk SPRing protection subnet must be searched out.

Context

CAUTION
The protection switching may affect the services or the functions that are already configured.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnet from the NE.
NOTE

If the protocol on a node is disabled, enable the protocol first.

Step 4 Perform the manual, forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. l l l To perform a manual switching, click East or West and select Manual Switch to Protection-Ring from the drop-down menu. To perform a forced switching, click East or West and select Forced Switch to ProtectionRing from the drop-down menu. To perform a exercise switching, click East or West and select Exercise-Ring from the drop-down menu.
NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.

Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the ODUk SPRing protection subnet. Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then select Clear All from the drop-down menu to clear the switching on each node. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End
2-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

2.4.5 ODUk Ring Network Protection


In this user interface, you can configure the east working channel, west working channel, protection channel, span ID and management node of the ODUk ring network protection.

Navigation Path
In the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the Function Tree.

Buttons
Button Start Protocol Stop Protocol Query New Add Working Unit Delete Working Unit Delete Apply Description Starts the automatic protection switching protocol. Stops the automatic protection switching protocol. Queries the ODUk protection group from the NE. Creates an ODUK ring network protection. Adds working units of the ODUK ring network protection. Deletes working units of the ODUK ring network protection. Deletes the protection group. Applies the configuration of the ODUk protection group to the NE.

Shortcut Menu Items


Shortcut Menu Item Bound Span ID Unbound Span ID Lockout Forced Switching-Ring Description Sets the span ID for the protection unit. Deletes the span ID for the protection unit. Locks out the switching. Forcibly switches the service from the working channel to the protection channel. This switching does not consider the status of the protection channel, unless the protection channel must satisfy higher priority bridge request. Performs manual switching from the working channel to the protection channel. If the protection channel is normal, the switching takes place. If the protection channel has a failure or must satisfy higher priority switching, the switching does not take place.

Manual Switching-Ring

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-13

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Shortcut Menu Item Exercise Switching-Ring

Description Simulates the switching operation. It is not a real switching. By simulating the switching, you can test the multiplex section protection function of the ring network, without interrupting services. Clears all the switching.

Clear

Parameters
Field Protection Group ID Level Switching Status Value 1-65535 ODU1, ODU2 Unknown, The protocol is not started, The protocol is to be started, Idle, East Switching, West Switching, Full Pass-Through, APS Byte Pass-Through Description Displays the ID of the protection group. Displays the level of the protection group. Displays the switching status of the protection group.

2-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Field West Switching Request/ East Switching Request

Value
l l l l

Description Displays the status of east and west switching requests.

Unknown Locked Protection SF SF Ring Switching Working SF Protection SF SF Ring Switching Working SD Protection SF SF Ring Switching Working SF Protection SD SF Ring Switching Working SF Protection OK Forced Switching - Ring Protection SD SD Ring Switching Working SD Protection SD SD Ring Switching Working SD Protection OK Manual Switching - Ring WTR - Ring Switching Exercise Switching - Ring No Request

l l l

l l l l

West Remote/Near-End Indication

Unknown, Remote-End, Near-End

Displays the west remote and local ends indication.


l

Near-End: Indicates the local node, that is, the transmit end of the service. Remote-End: Indicates the west adjacent node, that is, the respond end of the service.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-15

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Field East Remote/Near-End Indication

Value Unknown, Remote-End, Near-End

Description Displays the east remote and local ends indication.


l

Near-End: Indicates the local node, that is, the transmit end of the service. Remote-End: Indicates the west adjacent node, that is, the respond end of the service.

WTR Time(s)

300-720 Default value: 300

Indicates the time interval between the time when the working service is detected to be normal after switching and the time when the service is switched back to the working path. Click WTR Time (ODUk SPRing Protection) for more information.

Enable SD

Enabled, Disabled

Displays whether the SD enable flag is enabled. Click Enable SD (ODUk SPRing Protection) for more information.

Management Node Protection Unit

Yes, No West Working Unit, West Protection Unit, East Working Unit, East Protection Unit For example: 12-NS2-1(IN/ OUT)-ODU1:1

Displays whether it is the management node. Displays the east working unit, west working unit, east protection unit and west protection unit. Displays the east working channel, west working channel, east protection channel and west protection channel. Displays the span ID. Displays the channel status. Displays the hold-off time.

Channel Mapping

Span ID Channel Status Hold-Off Time(s)

1-31 Normal, SF, SD, Unmonitored, Unknown Working Unit: 0.0-10 Protection Unit: 0.5-10 Default value: Working Unit: 0, Protection Unit: 0.5

2-16

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

2.5 Maintaining Protection Subnets


On the U2000, you can maintain protection subnets. 2.5.1 Finding Protection Subnets When there are a number of protection subnets in a network, you use the search function to quickly find the desired protection subnet. 2.5.2 Querying Protection Subnet Resources After you search out a protection subnet, you can query the usage of subnet resources, so that you can plan and manage the subnet in a better way. 2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet You can run an external switching command to perform or clear the switching for a 1:N wavelength protection subnet. External switching commands include: forced switching, manual switching, and lockout. In the deployment and commissioning, you can perform switching to test whether the 1:N wavelength protection switching works properly. In the fault maintenance, you can perform this operation to locate faults. 2.5.4 Performing ODUk Ring Protection Switching On the U2000, you can perform or clear external switching for an ODUk ring network. During the deployment and commissioning, you can perform external switching to test whether ODUk ring switching works properly. During the fault maintenance, you can perform this operation for fault location.

2.5.1 Finding Protection Subnets


When there are a number of protection subnets in a network, you use the search function to quickly find the desired protection subnet.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The protection subnet must be created.

Procedure
Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet. The Search Protection Subnet dialog box is displayed.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-17

2 Managing WDM Protection Subnets


NOTE

iManager U2000 Operation Guide for WDM End-to-End Management

You need to select the Protection check box on the upper right corner of the Main Topology in advance.

Step 2 Set the search condition and enter the keyword. Step 3 Click Search and the protection subnet that is searched out is highlighted in the Network View. ----End

2.5.2 Querying Protection Subnet Resources


After you search out a protection subnet, you can query the usage of subnet resources, so that you can plan and manage the subnet in a better way.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The protection subnet must be searched out.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click a protection link, and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes window is displayed. Click the Resource Description tab. Step 3 Click Query to query the usage of the protection subnet resources. ----End

2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet
You can run an external switching command to perform or clear the switching for a 1:N wavelength protection subnet. External switching commands include: forced switching, manual switching, and lockout. In the deployment and commissioning, you can perform switching to test whether the 1:N wavelength protection switching works properly. In the fault maintenance, you can perform this operation to locate faults.

Prerequisite
l l l l l l

You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection group must be searched out. Applies to the OptiX BWS 1600G, OptiX BWS 1600S and OptiX BWS 320GV3. Applies to the LWF, LWFS, LWC1, LBE, LBES, LBF and LBFS boards. Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA). Applies to the LWF, LWFS, LWC1, LBE and LBES boards.

2-18

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Context

CAUTION
Force switching and manual switching may interrupt services.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet. Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the dropdown menu.
NOTE

If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu.

Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. l l To perform a manual switching, click East or West and select Manual Switching from the drop-down menu. To perform a forced switching, click East or West and select Forced Switching from the drop-down menu.
NOTE

When performing the switching, maintenance or lockout on a node, you cannot select east and west direction at the same time.

Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or Lock West, and select Lockout of Protection. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 9 Optional: To clear protection switching, select a node, click East or West, and then select Clear from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End

2.5.4 Performing ODUk Ring Protection Switching


On the U2000, you can perform or clear external switching for an ODUk ring network. During the deployment and commissioning, you can perform external switching to test whether ODUk
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-19

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

ring switching works properly. During the fault maintenance, you can perform this operation for fault location.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The ODUk ring protection subnet must be searched out.

Context

CAUTION
The protection switching may affect the services or the functions that are already configured.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnet from the NE. Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the dropdown menu.
NOTE

If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu.

Step 5 Perform the manual, forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. l l l To perform a manual switching, click East or West and select Manual Switch to Protection-Ring from the drop-down menu. To perform a forced switching, click East or West and select Forced Switch to ProtectionRing from the drop-down menu. To perform a exercise switching, click East or West and select Exercise-Ring from the drop-down menu.
NOTE

When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.

Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or Lock West, and select Lockout of Protection-Ring. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK.
2-20 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

2 Managing WDM Protection Subnets

Step 9 Optional: To clear protection switching, select a node, click East or West, and then select Clear All from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End

2.6 Deleting Isolated Nodes


To release protection resources that are used by isolated nodes, you need to delete isolated nodes.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. One or more isolated nodes must exist. Applies to the isolated node which node type is ODUk SPRing.

Context

CAUTION
Deleting isolated nodes may interrupt services. Exercise caution when you perform this operation.

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Isolated Node Management from the Main Menu. Step 2 Select the isolated node you want to delete, right-click and choose Delete. Step 3 Click Yes in the confirmation dialog box. ----End

2.7 Deleting Protection Subnets


When an existing protection subnet is not suitable, you can delete the protection subnet.

Prerequisite
You must be an NM user with "network maintainer" authority or higher.

Context
NOTE

The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercise caution before this operation.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-21

2 Managing WDM Protection Subnets

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM or Delete from the NE or Delete All from the NM from the short-cut menu.
NOTE

The methods to delete a protection subnet are as follows:


l

Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE side, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE and does not affect the services. The deleted protection subnet can be located by using the search feature. The U2000 locates it according to the NE layer protection information. Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic in the protection subnet. The deleted protection subnet cannot be restored without being created again. Delete All from the NM: Deletes data other than fibers in the network layer. The deleted protection subnet can be located by using the search feature. It is recommended that you do not select this option, as a large amount of data can be deleted.

l l

Step 3 In the Operation Prompt dialog box, click Yes.


NOTE

If Delete from the NE is selected, you need to confirm the operation once more.

Step 4 After completion, click Close in the dialog box displayed to complete the operation. ----End

2-22

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3
Prerequisite

End-to-End WDM Management

About This Chapter


You can configure WDM services using the trail management function.

The trail management license must be provided for the U2000. 3.1 Managing WDM Trails This section describes how to manage end-to-end WDM services based on the trail management function of the U2000. 3.2 Configuring EAPE The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. By adjusting the optical power of a WDM trail, the EAPE can reduce or even eliminate bit errors of services on the trail. 3.3 Managing Alarms on WDM Trails You can use the U2000 function of end-to-end trail management to manage the alarms generated on WDM trails at the network layer. 3.4 Managing the Performance of WDM Trails You can use the network layer function of the U2000 to perform end-to-end performance management on WDM trails.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-1

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

3.1 Managing WDM Trails


This section describes how to manage end-to-end WDM services based on the trail management function of the U2000. 3.1.1 Basic Concepts This section describes the basic concepts of the WDM end-to-end management. 3.1.2 Creating WDM Trails by Trail Search After a new network is set up or services are configured on a per-NE basis, you need to perform an WDM trail search so that you can manage configured services by using the trail management function. 3.1.3 Configuring WDM Trails After searching out the relevant trail information on the U2000, you can create OCh, ODUk or client trails by specifying the sources and sinks of the trails. 3.1.4 Viewing WDM Trails This section describes how to view the connection relation of all boards on a WDM NE. 3.1.5 Maintaining WDM Trails The end-to-end trails are carriers of services of the customers. In the routine maintenance, the administrator and maintainer must find out the status of the trails to ensure that all the services are transmitted correctly. 3.1.6 Collecting Resource Statistics You can collect statistics on resources to learn the existing inventory of a network. Resource statistics is a key basis of network maintenance and expansion. 3.1.7 Modifying WDM Trails Due to service requirements, sometimes, you need to modify the configuration of a WDM trail. U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trail names in batches, instead of creating WDM trails. This greatly simplifies the operations. 3.1.8 Deleting a WDM Trail The operation deletes the WDM trails from the network layer or from the NE layer. You need to delete the trails if the network will be adjusted or rebuilt. 3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode This sample describes how to configure GE Services with the WXCP protection in the end-toend mode. 3.1.10 Sample Application: Configuring an OCh Trail This section describes how to configure an OCh trail in the end-to-end mode.

3.1.1 Basic Concepts


This section describes the basic concepts of the WDM end-to-end management. 3.1.1.1 WDM Trail The concept, type and relevant information about trails are described here. 3.1.1.2 Conflict Trail
3-2 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at the NE layer, this trail is a conflict trail. 3.1.1.3 Trail Creation Method The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. 3.1.1.4 Process for Creating a Trail The trail creation process describes a series of procedures before a trail is generated on the U2000. The detailed process varies with the creation method.

3.1.1.1 WDM Trail


The concept, type and relevant information about trails are described here. The U2000 enables you to create, search, view, join, split, and delete WDM trails. In addition, the U2000 provides the signal flow diagram that visually displays the signal flow and the transmission media layer route of trails. This facilitates operations and improves the maintenance efficiency. Currently the U2000 provides the following OTN trail modules that comply with ITU-T G.872:
l l l l l l l

Client trail ODUk trail: optical channel data unit (ODUk) trail OTUk trail: optical channel transport (OTUk) unit trail OCh trail: optical channel trail OMS trail: optical multiplexing section trail OTS trail: optical transmission section trail OSC trail: optical supervisory channel (OSC) trail
NOTE

l l l

The first six types are related to services, and the OSC trail is related to supervisory signals. The OTS trail cannot be deleted from the U2000. You must delete the fiber connection before deleting the OTS trail. The rate level varies with the value of "k" in ODUk/OTUk. For details, see Table 3-1. ODU5G/OTU5G is a level customized by Huawei.

Table 3-1 ODUk rate level Trail Level ODU0 ODU1/OTU1 ODU5G/OTU5G ODU2/OTU2 ODU3/OTU3 Rate (bit/s) 1.25G 2.5G 5G 10G 40G

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-3

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Trail Module
Figure 3-1 and Figure 3-2 illustrate the relationship and location of the trails. Figure 3-1 Trail
Client ODUk OTUk OCh OMS
OTS OTS OTS

Figure 3-2 OSC Trail


OSC Trail OSC Trail

TM

RM

TM

RM

OSC

OSC

OSC

OTM

FIU

FIU

OLA

FIU

FIU

OTM

ODUk Trail
Different from other trails, an ODUk/OTUk sets the source and sink at the internal ports of an OTU board, a tributary board or a line board. Figure 3-3 displays a typical ODUk trail module whose source and sink are set on the internal ports of tributary ports or of line boards.

3-4

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Figure 3-3 ODUk (k = 1, 2, ...) trail


TQS STM-16 RX1 LP1 O D U 1 NS2 ODU1 O D U 2 O T U 2 NS2 ODU1 TQS LP1 O D U 1 STM-16 TX1

OUT

IN

O T U 2

O D U 2

OCh Trail

OTU2 Trail ODU2 Trail ODU1 Trail Client Trail

Electrical Signal Optical Signal

In the case of the client-side service whose rate is less than 1.25 Gbit/s, an ODU0 trail is added, as shown in Figure 3-4. Figure 3-4 ODUk (k = 0, 1, 2, ...) trail
52TOM GE RX1
ODU0 LP1 O D U 1

52NS2
ODU1

52NS2
ODU1

52TOM
LP1 O D U 1 ODU0

GE TX1

O D U 2

O T U 2

OUT

IN

O T U 2

O D U 2

OCh Trail OTU2 Trail ODU2 Trail ODU1 Trail ODU0 Trail Client Trail

Electrical Signal Optical Signal

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-5

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Inverse Multiplexing Trail


The rate of the client layer of an inverse multiplexing trail is greater than the rate of the server layer. Hence, an inverse multiplexing client trail needs multiple trails to serve as its server layer. Currently, you can only search for an inverse multiplexing trail, but you cannot create an endto-end inverse multiplexing trail. An inverse multiplexing client trail can take an ODU1 or ODU2 trail as the server trail. That is, an inverse multiplexing client trail cannot take ODU1 and ODU2 trails as the server trails at the same time.

40G inverse multiplexing trail model


The transmission rate of a single wavelength is 40G, but a single wavelength cannot used for long-distance transmission due to an optical layer index (such as dispersion) restriction. In a 40G inverse multiplexing transmission scheme, a 40G signal is converted to four 10G ODU2 signals, each of which uses one wavelength. This is equal to four 10G signals on the line side and lowers the optical layer index requirement. Figure 3-5 shows the inverse multiplexing trail model of the TSXL board. You cannot dynamically adjust the bandwidth of STM-256 or OC768 services whose rate is 40G. Hence, you can search for a client trail only after you configure four ODU2 trails. If you configure only one, two or three ODU2 trails, services are unavailable and you fail to search for the client trail. Figure 3-5 40G inverse multiplexing trail

10G inverse multiplexing trail model


The TDX board is a 10G inverse multiplexing tributary board that has two individual transmission paths. Each path inversely multiplexes a 10G service to multiple ODU1 signals, which are cross-connected to a line board for transmission. The 10G service uses any or all of the four ODU1 signals according to bandwidth status. When the 10G service does not use all of
3-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

the four ODU1 signals, the 10G service share an ODU2 trail with other ODU1 signals. This saves line resources. Figure 3-6 shows the inverse multiplexing trail model of the IP3 port on the TDX board. A 10G service is an Ethernet service for which you can dynamically adjust bandwidth. The server layer allows one, two, three or four ODU1 trails. Hence, the client trail that you search out is of different rate levels. Figure 3-6 10G inverse multiplexing trail

3.1.1.2 Conflict Trail


If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at the NE layer, this trail is a conflict trail.

Cause
A trail consists of a single station cross-connection at the NE layer. If the configuration data at the NE layer changes and a complete trail cannot be formed at the network layer, the trail that exists on the U2000 is a conflict trail, and the corresponding cross-connection at the NE layer becomes a discrete service.
l

Adding a fiber leads to trail extension. Assume that a trail is NE A-> NE B. Create a fiber from NE B to NE C, and create a service on NE C. As a result, the trail is extended as NE A->NE C. The trail NE A-> NE B that exists on the U2000 becomes a conflict trail. See Figure 3-7.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-7

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Figure 3-7 A conflict trail generated because a fiber is added

NE A

NE B

NE C

The single station cross-connection is lost. The original trail is NE A-> NE C. The cross-connection of the trail on NE B is deleted. On the U2000, the original trail of NE A-> NE C becomes a conflict trail and services on NE A and NE C become discrete services. See Figure 3-8. Figure 3-8 A conflict trail generated because a single station cross-connection is lost

NE A

NE B

NE C

Delete a protection service on a per-NE basis. NE 1 and NE 2 comprises a 1+1 linear protection and the original trail is NE 1-> NE 2. If cross-connection D of NE 2 is deleted, the original trail of NE 1-> NE 2 becomes a conflict trail. See Figure 3-9. Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis
Cross-Connection A Working Trail Cross-Connection C

Cross-Connection B NE1

Protection Trail

Cross-Connection D NE2

Handling Method
During trail search, if the U2000 searches out a conflict trail, the U2000 stops the searching and asks you to confirm the conflict trail. There are the following two handling methods:
l

Stop searching. If you fail to verify that the conflict trail is correct, you can choose to stop searching. The conflict trail remains, but the U2000 does not generate a new trail.

3-8

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management


l

3 End-to-End WDM Management

Continue to search. The system deletes the conflict trail from the network layer. This operation does not delete the cross-connection on a per-NE basis, and does not affect services on the NE.
NOTE

After the conflict trail is deleted, its customized information, including the trail name, user, and remarks, is permanently lost and cannot be restored.

3.1.1.3 Trail Creation Method


The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. To successfully create a trail on the U2000, the following prerequisites must be met:
l l l

All the NEs that the trail passes through must have enough idle resources. The data on the U2000 must be consistent with the data on the NE. The fibers on the U2000 are correctly connected.

Table 3-2 shows the methods, features, and application scenarios of the trail creation. Table 3-2 Comparison of methods for creating trails Trail Creation Method Feature Application Scenario This method is applicable to the scenario that the service is already configured on a perNE basis. This method requires better technical knowledge of users. During the search, users may need to handle conflict trails and discrete services. This method is applicable to the creation of a majority of normal trails.

Creating trails by trail search On a per-NE basis, configure all nodes that a service passes through. Then, by using the network-layer trail search function, combine crossconnections of each node to form end-to-end trails.

Creating trails in the automatic mode

The service is configured directly at the network layer. After the activation of the trail, the U2000 deliver the crossconnections related to the trail to all NEs involved. The route can be computed automatically. If multiple routes exist between the selected source and sink, you can set the compulsory link, the prohibited node to select a route.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-9

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

3.1.1.4 Process for Creating a Trail


The trail creation process describes a series of procedures before a trail is generated on the U2000. The detailed process varies with the creation method. Figure 3-10 shows the process for creating trails by trail search. Figure 3-11 shows the process for creating trails in the automatic mode. Figure 3-10 Creating trails by trail search
Start

Obtain all cross-connections of NEs networkwide

Sort cross-connections by level

Search out trails at the server layer and then the client layer

Check whether new trails conflict with original trails

The searched is paused and conflicting trails are displayed

Delete conflicting trails

Whether to resume the search N Stop the trail search

The network management system starts to manage new trails

Check whether discrete services that do not form trails exist Y N The information about discrete services is displayed

End

3-10

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Figure 3-11 Creating trails in the automatic mode


Start

Check whether the server trail for the trail to be created exists Y Set trail attributes, such as the direction, level, and rate

Create or search out the server trail

Set the source and sink NEs for the trail

Set route restriction conditions related to the node, link, and timeslot (optional)

Whether to set the trail as an SNCP trail N Set basic attributes for the trail

Set the SNCP protection route

Activate the trail

End

3.1.2 Creating WDM Trails by Trail Search


After a new network is set up or services are configured on a per-NE basis, you need to perform an WDM trail search so that you can manage configured services by using the trail management function. 3.1.2.1 Searching for WDM Trails After you create fibers and configure services for WDM equipment on the U2000, the trail information does not exist in the network layer of the U2000. To manage WDM trails, you need
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-11

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

to search for the data of cross-connections and fiber connections over the network to generate end-to-end WDM trails at the network layer of the U2000. 3.1.2.2 Discrete Service Causes and Handling Measures After trail search, discrete services are usually caused by the following factors, which are unsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrong configuration of cross-connections.

3.1.2.1 Searching for WDM Trails


After you create fibers and configure services for WDM equipment on the U2000, the trail information does not exist in the network layer of the U2000. To manage WDM trails, you need to search for the data of cross-connections and fiber connections over the network to generate end-to-end WDM trails at the network layer of the U2000.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. Fiber connections must be created correctly for the WDM equipment.

Context
l

Among the five types of trails, only the OTS trail can be managed directly without being searched, because the data is stored at the network layer when fibers are created. The networking in which no fiber connection exists between cross-connections of the same level is not supported. The U2000 supports the ability to search for an unterminated trail. The U2000 supports the ability to search for a WDM trail that has multiple sources and sinks. The U2000 supports the ability to restore the user-defined information. When the you delete a trail from the network layer of the U2000, the user-defined information of the trail is saved in the system. Hence, when you search for a trail that has the same source or sink and direction as the deleted trail, you can restore the user-defined information. You can only search for an inverse multilplexing client trail.

l l

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Step 2 Under Advanced settings, set the search policies.

3-12

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

NOTE

In the mode of searching by subnet, the selected subnet range should be independent from the networking aspect. That is, no fiber connection exists between the selected subnet range and the area that beyond the selected subnet range.

Step 3 Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services.
NOTE

l l

If there are cross-connections that are collisions and these cross-connections cannot form end to end trails, the U2000 shows the conflicting trails after you perform the search operation. The principles of verifying a conflict trail are as follows: The networking changes. The trail may cause interruption of service flow. For example, the key information of the trail, including deleting a crossconnection or fiber, is verified.

Step 4 Optional: Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE

Skip this step if the Automatically create trails after searching policy is selected in Step 2.

Step 5 Click Next to view all discrete services in the network.


NOTE

If Step 4 is executed, the U2000 deletes trails that do not have the management flag from the network layer. This does not affect services of the actual NE or the data of an individual NE on the U2000.

Step 6 After the search is complete, click Finish. ----End

3.1.2.2 Discrete Service Causes and Handling Measures


After trail search, discrete services are usually caused by the following factors, which are unsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrong configuration of cross-connections.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-13

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Causes of Discrete Services


1. Unsatisfied trail search conditions
l l l l

The data on the U2000 is inconsistent with those on NEs. The fibers created on the U2000 do not match actual fiber connections. Protection subnets are not created or cannot be searched. The NE data configuration is incorrect. For example, a non-protection chain service is created on the protection ring, the NE logic system of the service does not belong to any protection subnet, or the protection subnet configuration is wrong. The timeslot for the protection route is not configured. The timeslot configured for the protection route is wrong. The SNCP service configuration is wrong, which results in an incomplete protection route. The service configuration is incomplete. Check whether incomplete services are configured in the station-by-station mode, for example, pass-through services may not be configured on pass-through NEs. You should complete this service configuration and search for the trails again.

2.

Incomplete or wrong configuration of cross-connections


l l l

Handling Discrete Services


1. 2. 3. 4. Perform a consistency check to check whether the data on the U2000 and the data on the NEs are consistent or not. If not, upload the configuration data to the U2000. Verify that the fiber connections created on the U2000 are consistent with the actual fiber connections, and that there are no errors like wrong fiber connection on the U2000. Perform a trail search on the U2000. If discrete services are found, analyze and handle them according to the causes displayed on the U2000 and the handling measures that are given above. It is recommended that you handle the discrete services at add/drop tributaries first, then handle the those SDH NNI discrete services, and finally the pass-through discrete services.

How to Avoid Discrete Services


Use the trail management function to configure services whenever possible. This is because services configured in this way do not form discrete services. When a discrete service is found, handle it as soon as possible so that it does not affect subsequent service configuration.

3.1.3 Configuring WDM Trails


After searching out the relevant trail information on the U2000, you can create OCh, ODUk or client trails by specifying the sources and sinks of the trails. 3.1.3.1 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 can generate an OCh trail based on the searched server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion).Before creating an EAPE pair, you should create OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of the
3-14 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

equipment with the dynamic optical cross-connection boards, you can create OCh trails manually by using the trail management function of the U2000. 3.1.3.2 Creating an ODUk Trail The U2000 supports creating ODUk trails in an end-to-end mode. After you specify the source and the sink of a service, the U2000 automatically searches for the server trail and creates the ODUk trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. 3.1.3.3 Creating Client Trails The U2000 supports creating client trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 generates a client trail based on the searched or created server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion.

3.1.3.1 Creating an OCh Trail


The U2000 supports creating OCh trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 can generate an OCh trail based on the searched server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion).Before creating an EAPE pair, you should create OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of the equipment with the dynamic optical cross-connection boards, you can create OCh trails manually by using the trail management function of the U2000.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The OMS server trail must be searched out.

Background Information
The U2000 does not support the ability to reuse discrete cross-connections. The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows:
l l l

For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9. For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4. For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9, RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9, 13WSD9, RDU6, WSM6. The typical scenario of non-protected OCh networking is as follows:

Typical OCh networking scenarios are as follows:


l

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-15

3 End-to-End WDM Management


ONE2 ONE1
OCh
D40
OT U O T U

iManager U2000 Operation Guide for WDM End-to-End Management

O T U

OCh
M40 WSM FIU

ONE3

FIU

FIU

WSD

FIU

OT U

OSC

OSC

OSC

OCh

fiber oxc

The typical scenario of protected OCh networking is as follows:


ONE1
OSC

ONE2
OSC OSC

ONE4

F I U O T U O L P

F I U

WSD

WSM

F I U

F I U

ONE3
F I U F I U WSD WSM F I U F I U

O L P

O T U

OSC

OSC

OSC

OCh

fiber oxc

NOTE

The source and sink of an OCh trail cannot be modified.

Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level and direction of the service. Set the level to OCh and set the direction according to the specific networking. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
TIP

l l

During the selection of source or sink in the NE Panel, when you move the cursor to a board, the wavelength information of the board port is displayed. By default, if you already select one end (source or sink) of a trail and open the NE Panel to select another end, the U2000 uses the board and port that have the same band and wavelength with priority.

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed.
3-16 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. The sign is displayed on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 8 Optional: Check the Activate the trail check box. Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and click OK. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End

Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP

You can filter other trails according to the source and sink of the new trail.

2.

In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.3.2 Creating an ODUk Trail


The U2000 supports creating ODUk trails in an end-to-end mode. After you specify the source and the sink of a service, the U2000 automatically searches for the server trail and creates the ODUk trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The OTU1 ODU1, ODU2, ODU3 or OTU2 server trail must be searched out.

Context
The configuration principles are as follows:
l

The source and sink of an ODUk (k = 0, 1, 2, 3, 5G) trail are LP ports of the TDG, TQM, or TQS boards. The source and sink of an ODU0 trail are the LP ports of the tributary boards, such as the 52TOM boards. The line boards that support the grooming of ODU0 services are as follows: 52NS3, 52NQ2, 52ND2, and 52NS2. The boards support the grooming of ODU0 services only in the synchronous mode. The boards, however, do not support the grooming of ODU0 services in the asynchronous mode.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-17

3 End-to-End WDM Management


NOTE

iManager U2000 Operation Guide for WDM End-to-End Management

In the synchronous mode, the boards (including tributary and line boards) that support the grooming of ODU0 services work with synchronous cross-connect boards. The cross-connect board can be the 52XCH boards.
l

Only ODU0, ODU1 and ODU2 trails can be created. ODU5G and ODU3 trails cannot be created, but can be searched. If no cross-connect board (for example, XCS board) is available, the tributary board and line board must be installed in paired slots of the same subrack. During the installation of cross-connect board (for example, XCS board), the tributary board and line board must be installed on the same subrack. An ODU1 trail cannot be created on an OTU1 server trail formed by the networking of the TQS boards. Currently, two types of boards support the inverse multiplexing trail. The TSXL board supports the inverse multiplexing of the 40 Gbit/s service and the TDX board supports the inverse multiplexing of the 10 Gbit/s service The U2000 supports the ability to reuse discrete cross-connections. The U2000 does not support the ability to create a trail whose source and sink use the same subrack. The U2000 does not support the ability to create a trail that is terminated at one end.

l l

An example of the ODUk networking scenario is as follows:


TQS STM-16 RX1 LP1 O D U 1 NS2 ODU1 O D U 2 O T U 2 NS2 ODU1 TQS LP1 O D U 1 STM-16 TX1

OUT

IN

O T U 2

O D U 2

OCh Trail

OTU2 Trail ODU2 Trail ODU1 Trail Client Trail

Electrical Signal Optical Signal

Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level, rate and direction of the service. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
3-18 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. The sign is shown on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 9 Optional: Check the Activate the trail check box. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End

Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP

You can filter other trails according to the source and sink of the new trail.

2.

In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.3.3 Creating Client Trails


The U2000 supports creating client trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 generates a client trail based on the searched or created server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. An OCh or ODUk server trail is correctly searched out or created.

Background Information
The restrictions for configuring cross-connections and networking are as follows:
l

The working route and protection route of WXCP/SNCP trails must be different server trails. Currently, the U2000 only supports the Client trails created based on the ODUk server trails in a network composed all by NG WDM equipment. The server trail can be ODU1 trail, ODU5G trail and ODU2 trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-19

Issue 02 (2009-10-23)

3 End-to-End WDM Management


l

iManager U2000 Operation Guide for WDM End-to-End Management

The U2000 supports the creation and search for the Client trails using the SW SNCP scheme. For the dual-fed OTU, if services are configured at only one port, the client trail cannot be created even if the OCh trail is searched out. The U2000 supports the ability to create a mono nodal trail.

Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level, rate and direction of the service. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port. Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. The sign is shown on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 9 Optional: Check the Activate the trail check box. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End

Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP

You can filter other trails according to the source and sink of the new trail.

2.

In the WDM Trail Management user interface, find out that the trail is correctly created.

3.1.4 Viewing WDM Trails


This section describes how to view the connection relation of all boards on a WDM NE. 3.1.4.1 Viewing Route Information of WDM Trail The U2000 provides the transmission media route of the trails. You can view the transmission media layer route to find out the transmission media of the trail. 3.1.4.2 Viewing the Signal Flow Diagram for WDM Trails
3-20 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

The U2000 provides the signal flow diagram for trails of an optical NE. In the signal flow diagram, you can view fiber connections between boards on optical NEs. The signal flow diagram visually display the flow direction of optical signals, and facilitates operation and maintenance. 3.1.4.3 Viewing Relevant Client Trails At a level higher than sever trails, client trails are used to carry services. By using the U2000, you can view the client trail information of a specified trail. 3.1.4.4 Browsing Related Server Trails The U2000 supports querying related server trails. By using this function, you can learn about the information including status and attributes of a server trail related to the desired trail. 3.1.4.5 Viewing the Optical Power for the Trails You can query the optical power for trails. The U2000 provides a way to manage the optical power that is related to the NE layout, topology structure and routing. 3.1.4.6 Analyzing the WDM Trail Fault This section describes how to query relevant information about the WDM trail status. 3.1.4.7 Viewing the Connectivity of WDM Services Networkwide The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. For example, the alarm that causes service interruption is handled with priority. 3.1.4.8 Browsing Associated Working and Protection Trails U2000 supports the function of displaying associated working and protection trails of an optical NE on an optical layer trail. Through the function of querying a WDM trail, you can view the other associated working and protection trails of a trail in the trail list.

3.1.4.1 Viewing Route Information of WDM Trail


The U2000 provides the transmission media route of the trails. You can view the transmission media layer route to find out the transmission media of the trail.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The WDM trails must be created.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Choose a trail and click Transmission Media Layer Route in the bottom portion of the window. The transmission media is displayed in the bottom window.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-21

3 End-to-End WDM Management


NOTE

iManager U2000 Operation Guide for WDM End-to-End Management

Hover the cursor over the trail and the source and sink port information of this route is displayed.

----End

3.1.4.2 Viewing the Signal Flow Diagram for WDM Trails


The U2000 provides the signal flow diagram for trails of an optical NE. In the signal flow diagram, you can view fiber connections between boards on optical NEs. The signal flow diagram visually display the flow direction of optical signals, and facilitates operation and maintenance.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. There must be correct WDM trails.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, and select the Signal Flow Diagram tab in the bottom portion of the window. The signal flow direction of the entire trail is shown.
NOTE

Hover the cursor on a trail to display the source and sink port information of that section of the route.

Step 4 Optional: Right-click on the view of signal flow diagram, and choose Legend from the shortcut menu. The fibers related to the trail are displayed in the signal flow diagram. Dotted lines represents intra-station fibers and real lines represents inter-station fibers. Step 5 Optional: When an alarm is generated in the case of fiber cut, you can refresh the signal flow diagram manually. Right-click on the view of signal flow diagram, and choose Refresh. Then, the broken fiber is highlighted in red, so that you can easily view the alarm status and start initial fault location. Step 6 Optional: To query the current working route of a trail, select the trail, right-click on the view of signal flow diagram, and then choose Display valid routes from the shortcut menu. The valid positive working route is highlighted in green, while the valid negative working route is highlighted in orange.
NOTE

l l

The auto-refresh function of the valid routes is not supported. This function does to support trail groups.

----End
3-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.1.4.3 Viewing Relevant Client Trails


At a level higher than sever trails, client trails are used to carry services. By using the U2000, you can view the client trail information of a specified trail.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The WDM trail must be created or serached out.

Context
In the network models specified in the ITU-T G.872 and G.805, the OTN transport network is divided.That is, each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server. A connection of the client layer is carried by an adjacent server trail for transmission. For example, the link connection of a OCh trail is provided by a OMS trail, while the link connection of a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of the OCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is the server trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail. For details of the trail models, refer to 3.1.1.1 WDM Trail.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click a trail and choose Browse Relevant Client Trails from the shortcut menu. The corresponding client trail information is displayed in the trail list. ----End

3.1.4.4 Browsing Related Server Trails


The U2000 supports querying related server trails. By using this function, you can learn about the information including status and attributes of a server trail related to the desired trail.

Prerequisite
l l l

You must be an NM user with "network monitor" authority or higher. A WDM trail must be searched out or created. OTS trails do not support querying related server trails.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-23

Issue 02 (2009-10-23)

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Context
In the network models specified in the ITU-T G.872 and G.805, the OTN transport network is divided.That is, each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server. A connection of the client layer is carried by an adjacent server trail for transmission. For example, the link connection of a OCh trail is provided by a OMS trail, while the link connection of a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of the OCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is the server trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail. For details of the trail models, refer to 3.1.1.1 WDM Trail.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Right-click a trail and choose Browse Related Server Layer Trails from the shortcut menu. This trail and the related server trails are displayed in the user interface. Step 4 You can select another trail to continue the query. ----End

3.1.4.5 Viewing the Optical Power for the Trails


You can query the optical power for trails. The U2000 provides a way to manage the optical power that is related to the NE layout, topology structure and routing.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The WDM trails must be correctly created.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

3-24

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Step 3 Right-click a trail and choose Query Relevant Optical Power from the shortcut menu. Step 4 In the Optical Power Management window displayed, click the Table tab. Click Query to query the optical power information of ports from the NE. In the Operation Result dialog box displayed, click Close.
NOTE

In the View tab, move the cursor on a link. The U2000 shows the optical power information of all fibres in the link.

Step 5 Click the Graphic tab to query the graphic interface of the port optical power.

NOTE

l l l

Green indicates that the current optical power is in the normal range. Orange indicates that the current power exceeds the reference deviation and there is an exception. Black "E" shape in the histogram indicates the allowable deviation range of the optical power.

----End

3.1.4.6 Analyzing the WDM Trail Fault


This section describes how to query relevant information about the WDM trail status.

Prerequisite
l l l

You must be an NM user with "network monitor" authority or higher. WDM trails must be created and in the active state. Client trails, ODUk (k =0, 1, 2, 3, and 5G) trails, and OTUk (k =1, 2, 3, and 5G) trails are supported. Trails that have multiple sources and sinks are not supported.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-25

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. Then, the desired trails are displayed in the trail list.
NOTE

l l l

To filter all the trails on the U2000, click Filter All. To add trails that meet the new criteria based on the existing trails, click Incremental Filter. To filter the trails again according to the new criteria based on the existing trails, click Secondary Filter.

Step 3 Select an WDM trail in the trail list, right-click the trail, and then choose Analyse Trail Status. Step 4 In the Operation Result dialog box displayed, click Close. Step 5 In the WDM Trail Status dialog box displayed, view Trail Status. ----End

3.1.4.7 Viewing the Connectivity of WDM Services Networkwide


The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. For example, the alarm that causes service interruption is handled with priority.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
In the case of the trails that reports the alarms, certain services of the trails are interrupted while other services of the trails are not interrupted. The services that are interrupted cannot be identified when you view alarms. You can only handle those alarms one by one. The alarm that causes service interruption, however, is not handled in time. After the service interruption is detected, the U2000 automatically generates a service-level alarm that is displayed in the Browse Current Alarm window.

Procedure
Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list. Step 3 View Connection Status. The connectivity of the service is refreshed in real time. ----End
3-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.1.4.8 Browsing Associated Working and Protection Trails


U2000 supports the function of displaying associated working and protection trails of an optical NE on an optical layer trail. Through the function of querying a WDM trail, you can view the other associated working and protection trails of a trail in the trail list.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. There must be created or searched WDM trails.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, right click and select the Browse Associated Working/Protection Trails.
NOTE

If there are associated working and protection trails, they are displayed with the selected trail on the trail management interface. If there are no associated working and protection trails, only the selected trail is displayed.

----End

3.1.5 Maintaining WDM Trails


The end-to-end trails are carriers of services of the customers. In the routine maintenance, the administrator and maintainer must find out the status of the trails to ensure that all the services are transmitted correctly. 3.1.5.1 Activating/Deactivating WDM Trails Deactivating WDM trails deletes the related services from the NE side and saves the relevant data on the U2000 to release the occupied path resource. Activating trails enables the services on the WDM trails according to the trail data that is saved on the U2000. 3.1.5.2 Configuring OTU Overhead on the OCh Trail You can use the U2000 to configure the overhead bytes of the trail node through the overhead management function of the OTU layer that corresponds to the end-to-end OCh trail. 3.1.5.3 Querying the 1+1 Protection for a WDM Trail This section describes how to query the 1+1 protection status for a WDM trail from the network layer. 3.1.5.4 Performing 1+1 Protection Switching for a WDM Trail You can perform 1+1 protection switching for a WDM trail. 3.1.5.5 Querying the WXCP/SNCP Protection of a WDM Trail This section describes how to query the WXCP or SNCP protection state of a WDM trail from the network layer.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-27

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail The U2000 supports performing the WXCP or SNCP protection switching for the trails in the end-to-end mode. Performing the WXCP or SNCP protection switching for the trails in the endto-end mode is more direct and easier than that on the per-NE basis. 3.1.5.7 Querying the DPPS Protection of a WDM Trail This section describes how to query the DPPS protection state of a WDM trail from the network layer.

3.1.5.1 Activating/Deactivating WDM Trails


Deactivating WDM trails deletes the related services from the NE side and saves the relevant data on the U2000 to release the occupied path resource. Activating trails enables the services on the WDM trails according to the trail data that is saved on the U2000.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The Client, ODUk, OTUk or OCh trail must be created.

Context

CAUTION
Deactivating WDM trails may interrupt the services.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Optional: Select one or more trails, right-click and choose Deactivate. Step 4 Optional: Select one or more trails, right-click and choose Activate.
NOTE

If a certain server trail carries an active client trail or a partially active client trail, you need to deactivate the client trail and then the server trail.

Step 5 Click OK in the Confirm window and the Reconfirm window displayed. A prompt appears telling you that the operation was successful. Step 6 Click Close. ----End
3-28 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.1.5.2 Configuring OTU Overhead on the OCh Trail


You can use the U2000 to configure the overhead bytes of the trail node through the overhead management function of the OTU layer that corresponds to the end-to-end OCh trail.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The OCh trail must be searched, and the source and sink OTU boards must support overhead management.

Context

CAUTION
You need to configure OTU overheads correctly. Otherwise, services may be interrupted.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select an OCh trail, click Maintenance, and select Overhead Management. The OTU Overhead window is displayed. Step 4 Select a port from the object list. Right-click on the TTI to be Received or TTI to be Sent column. Select the overhead bytes input mode.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-29

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

NOTE

l l

Choose Copy All Form Received to automatically copy the contents of current overhead bytes received to the table. Choose Manual Input to customize the contents of the overhead bytes.

Option

Description

Copy All Form Received Click Copy All Form Received. Manual Input Click Manual Input, and the Please input the overhead byte dialog box is displayed. Enter the information about Source Flag, Sink Flag and User Tag. Click OK.

Step 5 Click Apply. The Confirm dialog box is displayed. Step 6 Click OK. A prompt appears telling you that the operation was successful. Step 7 Click Close. ----End

3.1.5.3 Querying the 1+1 Protection for a WDM Trail


This section describes how to query the 1+1 protection status for a WDM trail from the network layer.

Prerequisite
l l l l

You must be an NM user with "network monitor" authority or higher. The optical line protection or 1+1 protection groups must be configured. Trail search must be performed properly. Applies to Client, OCh, and OMS trails.

Context
You can query the status and parameters of inter-board 1+1 protection, intra board 1+1 protection, client-side 1+1 protection, optical line protection, 1+1 optical path protection, and inter-subrack 1+1 protection for a trail.
3-30 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methods as needed. Click Filter All. Step 3 In the WDM Trail Management view, select a trail that is configured with the 1+1 protection. Click Maintenance and choose WDM Trail 1+1 Parameter Settings from the drop-down menu. The WDM Trail 1+1 Parameter Settings window is displayed. The 1+1 protection information of the WDM trail is shown in the window. Step 4 Select a protection group of WDM trails. Click Function and select Query Switching Status. The Operation Result dialog box is displayed indicating that the operation is successful. Step 5 Click Close. ----End

3.1.5.4 Performing 1+1 Protection Switching for a WDM Trail


You can perform 1+1 protection switching for a WDM trail.

Prerequisite
l l l l

You must be an NM user with "network operator" authority or higher. The 1+1 protection status of the WDM trail is queried. A trail search must be performed properly. Applies to OCh client, OCh or OMS trails.

Context

CAUTION
Services may be interrupted when performing 1+1 protection switching for a WDM trail.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methods as needed. Click Filter All. Step 3 Select a client trail that has WDM 1+1 protection, click Maintenance and select WDM Trail 1+1 Parameter Settings. Step 4 Select a trail in the WDM Trail 1+1 Parameter Settings window. Right-click in the Current Status field and choose Force to Working or any of the other switching operations. In the Confirm dialog box, confirm the operation. The Operation Result dialog box is displayed, indicating that the operation is successful.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-31

3 End-to-End WDM Management


NOTE

iManager U2000 Operation Guide for WDM End-to-End Management

You need to confirm the operation only when performing the forced switching and trail locking.

Step 5 Click Close. ----End

3.1.5.5 Querying the WXCP/SNCP Protection of a WDM Trail


This section describes how to query the WXCP or SNCP protection state of a WDM trail from the network layer.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. A trail with the WXCP or SNCP protection must be configured.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 Select a trail with WXCP or SNCP in the WDM Trail Management window. Click the Maintenance button and select WXCP/SNCP Service Control from the drop-down list. The WXCP/SNCP Service Control window is displayed, indicating the WXCP or SNCP information of the WDM trail. Step 4 Select the protection group of this WDM trail and click Query. The Operation Result dialog box is displayed, indicating that the operation is successful. Step 5 Click Close. ----End

3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail


The U2000 supports performing the WXCP or SNCP protection switching for the trails in the end-to-end mode. Performing the WXCP or SNCP protection switching for the trails in the endto-end mode is more direct and easier than that on the per-NE basis.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. A trail with the WXCP or SNCP protection must be configured.

Context

CAUTION
Services may be interrupted when performing the WXCP/SNCP protection switching for a WDM trail.
3-32 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 In the WDM Trail Management view, select a trail with the WXCP or SNCP protection. Click Maintenance and select WXCP/SNCP Service Control from the drop-down list. The WXCP/ SNCP Service Control window is displayed, indicating the WXCP or SNCP information of the WDM trail. Step 4 Select the protection group of this WDM trail. Click Function and select the forced or manual switching from the drop-down list. The Operation Result dialog box is displayed, indicating that the operation is successful. Step 5 Click Close. ----End

3.1.5.7 Querying the DPPS Protection of a WDM Trail


This section describes how to query the DPPS protection state of a WDM trail from the network layer.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. A trail with the DPPS protection must be configured.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 Select a trail with DPPS in the WDM Trail Management window. Click the Maintenance button and select DPPS Query from the drop-down list. The DPPS Protection window is displayed, indicating the DPPS information of the WDM trail. Step 4 Select the protection group of this WDM trail and click Query, the DPPS information of the WDM trail is displayed. ----End

3.1.6 Collecting Resource Statistics


You can collect statistics on resources to learn the existing inventory of a network. Resource statistics is a key basis of network maintenance and expansion. 3.1.6.1 Collecting Statistics on Client-Side Port Resources By collecting statistics on resource inventory for WDM client-side ports (Ethernet service and client-side ports of the OTU board), you can check whether the resources are sufficient before configuring services.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-33

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

3.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources The statistics report of inter-station wavelength resources shows the usage of the wavelength resources of one or more trails between the selected stations. This provides reference for service planning and increases the service availability ratio. 3.1.6.3 Collecting Statistics on WDM Link Resources By using this function, you can learn about the usage of the WDM link resources between the specific stations. This provides reference for service planning and increases the service availability ratio.

3.1.6.1 Collecting Statistics on Client-Side Port Resources


By collecting statistics on resource inventory for WDM client-side ports (Ethernet service and client-side ports of the OTU board), you can check whether the resources are sufficient before configuring services.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red). Step 3 Click Statistics to query the resource information of the WDM client-side ports.

Step 4 Click Used Port, Unused Port or Dynamic Port tab to query details of the ports.

3-34

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management


NOTE

3 End-to-End WDM Management

l l

If a client-side port is not used by a trail, this port is idle. Otherwise, this port is used. Discrete services are taken as idle resources.

Step 5 Optional: Click Print or Save As to output the report. ----End

3.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources


The statistics report of inter-station wavelength resources shows the usage of the wavelength resources of one or more trails between the selected stations. This provides reference for service planning and increases the service availability ratio.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. You cannot collect statistics on the wavelengths that are used by WDM ASON trails at the OCh level. You cannot collect statistics if the trail to be counted is bidirectional, and the source and sink ends of the trail use the optical multiplexer/demultiplexer board or optical add/drop multiplexing board.

Context
To ensure that statistics are correct, it is recommended that you search for WDM trails before you collect statistics on wavelength resources.

Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of Inter-Station Wavelength Resources from the Main Menu. Step 2 Set the Level and Direction of the trail to be counted.
NOTE

Currently, only OCh trails are supported.

Step 3 Click Browse to select the source end and click the button again to select the sink end. Click OK in the Search NE dialog box.
NOTE

The source and sink ends can be optical NEs, NEs or boards.

Step 4 Optional: Click Browse to select the intermediate NE.


NOTE

l l

The intermediate NE can only be an optical NE. You can select multiple intermediate NEs to determine the trail to be counted out of multiple trails between the source and sink ends.

Step 5 Click Count. The Confirm dialog box is displayed prompting you to search for trails before collecting statistics.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-35

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Step 6 Click OK. The Operation Result dialog box is displayed indicating that the operation was successful. Click Close. You can view the created report in the right-hand pane.
NOTE

If there is a large number of network data, it takes a long time to create the report.

Step 7 Optional: Click Print or Save As to output the report. ----End

3.1.6.3 Collecting Statistics on WDM Link Resources


By using this function, you can learn about the usage of the WDM link resources between the specific stations. This provides reference for service planning and increases the service availability ratio.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Link Resources from the main menu. Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red). Step 3 In the Inter-Station Link Resource Statistics pane, view the link resources among stations.

Step 4 In the Inter-Station Link Resource Statistics pane, select a record. Then, in the Link List pane, view the details of all the links between the two stations.

3-36

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Step 5 Optional: Right-click one or more links in the Link List pane and choose Browse Relevant Client Trails from the shortcut menu to view the client trail of this link. ----End

3.1.7 Modifying WDM Trails


Due to service requirements, sometimes, you need to modify the configuration of a WDM trail. U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trail names in batches, instead of creating WDM trails. This greatly simplifies the operations. 3.1.7.1 Modifying the Source and Sink of a Client Trail Because of service requirements, you may need to modify the source and sink of a WDM trail. The U2000 supports manually modifying the source and sink of an existing WDM trail. As a result, you need not create a new WDM trail, and thus the operation is simplified. 3.1.7.2 Modifying WXCP/SNCP Protection In the case of a trail change, you can modify the WXCP/SNCP protection for trail. 3.1.7.3 Modifying Trail Names in Batches The network administrator can set the trail naming rules and modify trail names in batches according to these rules.

3.1.7.1 Modifying the Source and Sink of a Client Trail


Because of service requirements, you may need to modify the source and sink of a WDM trail. The U2000 supports manually modifying the source and sink of an existing WDM trail. As a result, you need not create a new WDM trail, and thus the operation is simplified.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. Idle ports must be available at the source and sink ends.

Context
The configuration principles are as follows:
l

The OTU boards at the source and sink ends, such as the L4G, LOG, and LQG boards, must support configuring cross-connections and must be installed on different NEs. Applies to a trail with only one source and one sink. The source and sink of a trail represent specific service ports. The U2000 supports the ability to modify the source and sink ends of a client trail that is in service. The U2000 does not support the ability to modify a cross-subrack WDM trail. If you want to modify the sink end of a WDM trail, the sink end before modification and the sink end after modification must reside in the same subrack.

l l l

CAUTION
Modifying the source or sink of a trail interrupts services.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-37

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Condition dialog box is displayed. Set filter criteria and methods as needed.
NOTE

l l l

To filter all trails on the U2000, click Filter All. Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Select a desired trail, click Create/Modify, and choose Modify Trail from the drop-down menu. The Modify WDM Trail window is displayed. Step 4 Click Browse corresponding to Source to select a source port. Step 5 Click Browse corresponding to Sink to select a sink port. Step 6 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 7 Click Finish, and if the modified trail is an activated trail, the Confirm dialog box is displayed, click Yes. Step 8 The Operation Result dialog box is displayed. Click Close. ----End

Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP

You can filter other trails according to the source and sink of the new trail.

2.

In the WDM Trail Management user interface, find out that the trail is correctly modified.

3.1.7.2 Modifying WXCP/SNCP Protection


In the case of a trail change, you can modify the WXCP/SNCP protection for trail.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. Support the function of modifying the WXCP/SNCP protection for Client, ODU0, ODU1, and ODU2 trails.

Context

CAUTION
This operation may cause short interruption of the services.

3-38

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail and click Create/Modify and choose Modify Trail. Step 4 Click the Protection Setting tab. l Add WXCP/SNCP protection.

Right-click the dual-fed point and choose Set Dual-Fed Point from the shortcut menu, and the node is displayed as . Right-click the selective-receiving point and choose Set Selective-Receiving Point from the shortcut menu, and the node is displayed as .

Right-click the blank area in the Node List frame and choose Add from the shortcut menu. The Add the dual-fed and selective-receiving node is displayed, select DualFed Point and Selective-Receiving Point. Click OK. Right-click the dual-fed point and choose Cancel Dual-Fed Point from the shortcut menu, right-click the selective-receiving point and choose Cancel Selective-Receiving Point from the shortcut menu. Right-click a record in the Node List frame and choose Delete from the shortcut menu. Click OK. Click Delete Protection.

Delete WXCP/SNCP protection.

Modify WXCP/SNCP protection. Click Protection Setting. In the Specify Route Channel window, sets the Server Layer Trail and Channel of the protection route .

Step 5 Click Finish. In the Confirm dialog box, click Yes. In the Operation Result dialog box, click Close. ----End

3.1.7.3 Modifying Trail Names in Batches


The network administrator can set the trail naming rules and modify trail names in batches according to these rules.

Prerequisite
l l

You must be an NM user with "network maintainer" authority or higher. The trail naming rules must be set on the U2000.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-39

Issue 02 (2009-10-23)

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more trails from the list, and choose Name from the shortcut menu. For the naming rules, refer to Customizing Naming Rule. Step 4 In the Confirm dialog box displayed, click OK. ----End

3.1.8 Deleting a WDM Trail


The operation deletes the WDM trails from the network layer or from the NE layer. You need to delete the trails if the network will be adjusted or rebuilt.

Prerequisite
l l l l

You must be an NM user with "network operator" authority or higher. The trail is not the OTS trail. The trail must have the highest priority. The trails that contain dynamic cross-connections must be deactivated before deleted. Other trails can be directly deleted.

Context
A WDM trail can be deleted from the network side or the NE side.
l

If a trail is deleted from the network side, only the WDM trail at the network layer is deleted on the U2000 side. The deleted trail is not delivered to the NE. Moreover, the service is not affected. Generally, this method is adopted to synchronize the trail information on the U2000 side and the trail information at the network layer. After the trail is deleted from the network layer, you can search for and find it again based on the service information at the NE layer. If a trail is deleted at the NE layer, the trail on the NE side is deleted accordingly. After the trail is deleted, the service is interrupted. If the service configuration of the trail is incorrect or needs to be modified, you can delete the trail at the NE layer and then create another trail. The U2000 supports the ability to delete a WDM trail and to delete a dynamic crossconnection related to the trail. The U2000 does not support the ability to delete the WDM trail that has a client trail. The U2000 does not support the ability to delete an OTS trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

l l

3-40

iManager U2000 Operation Guide for WDM End-to-End Management


l

3 End-to-End WDM Management

Before you delete a WDM trail, the dynamic cross-connection related to the trail must be inactive. If active, an error is displayed during the deletion.

CAUTION
Deleting the trails from NE layer will affect service.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l 1. 2. If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter. Select the WDM trail that you want to delete, right-click it and choose Delete. In the Confirm and Reconfirm dialog boxes displayed, click OK. The operation is complete. Select the WDM trail that you want to delete, right-click it and choose Delete from Network Layer. In the Operation Result dialog boxes displayed, click Close.

Step 3 Optional: Deleting WDM Trails from the NE Layer.

Step 4 Optional: Deleting WDM Trails from the Network Layer. 1. 2.

----End

3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode
This sample describes how to configure GE Services with the WXCP protection in the end-toend mode.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. The Optical NE must be created as shown in Figure 3-12. The NEs and boards must be created as shown in NE Panel.

Context
Network Design The Project T constructs a ring network with station A, station B, station C and station D. All the equipments are OptiX Metro 6100V1E. Station A is an Optical Terminal Multiplexer (OTM) station. The station A has two back-to-back OTMs including two NEs. Station B, station C and
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-41

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

station D are Optical Add/Drop Multiplexer (OADM) stations. Each station has one NEs. The network design is shown in Figure 3-12. Figure 3-12 Network Design

OADM OTM

Slot Diagram Figure 3-13 Station A

3-42

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Figure 3-14 Station B

Figure 3-15 Station C

Figure 3-16 Station D

Service Requirements In the network management center, the maintenance engineer is responsible for the service deployment and adjustment. Suppose that the engineer is familiar with all the services carried by the WDM network. One of the routine tasks of this engineer is to deploy the GE level service to a wavelength. After receiving a request, the engineer must follow the request to configure a GE level service with WXCP from station A to station C.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-43

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure 1. 2. 3. Query the available resources of the WDM side. Search for WDM trails. Create a GE trail with the WXCP protection.

Procedure
Step 1 Query the available resources of the WDM side. 1. 2. Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Select the optical NE A and the optical NE C from the Navigation Tree. Click the double arrow button to add the port resources of the two NEs to the statistics area at the right-hand side. Click Used Port and Unused Port to view the using status of each port. Record all the available resources.

3. 4.

Step 2 Search for WDM trails. 1. 2. 3. Connect fibers on the U2000 according to the actual networking diagram. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Under Advanced settings, set the search policies.

4. 5.

Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services. Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE

If no trails conflict, no window about conflicting trails is displayed. After you click Next, the U2000 displays the window about discrete services.

6.
3-44

Click Next to view all discrete services in the network.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

7. 1. 2. 3.

After the search is complete, click Finish. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level, rate and direction of the service. Set the service level as GE, and set the service direction as Unidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port. Set the source port as No.3 port of the No.1 timeslot LQG on NE331. Set the sink port as No.3 port of the No.1 timeslot LQG on NE333.

Step 3 Create a GE trail with the WXCP protection.

4.

Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Set optical NE A as the dual transmitting node and optical NE C as the receiving node.

5. 6. 7.

Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

3.1.10 Sample Application: Configuring an OCh Trail


This section describes how to configure an OCh trail in the end-to-end mode.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. The optical NE as shown in Figure 3-17 must be created. The NEs and boards as shown in NE Panel must be created.

Context
Project network design Project T is a ring network that consists of stations A, B, C, and D. The network uses the OptiX Metro 6100 equipment. Stations A, B, C, and D are optical add/drop multiplexer (OADM) stations. Each station has only one NE. Figure 3-17 shows the network design, and Table 3-3 lists the network configuration data.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-45

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Figure 3-17 Network design

OADM

Table 3-3 Network data table Station A B C D NE Type OADM OADM OADM OADM NE Name NE403 NE430 NE401 NE402 IP Address 129.9.1.174 129.9.1.145 129.9.1.146 129.9.1.147 Remarks Gateway NE Non-gateway NE Non-gateway NE Non-gateway NE

NE Panel In the project, the configurations for NEs on stations A, B, C, and D are the same.

3-46

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Figure 3-18 NE panel on station A

LL 44 GG

F S SF W W P I C CI S S M U 2 CU D M U 9 9

Service demand A main responsibility of the transmission equipment maintenance engineers in the transmission maintenance department of the network management center is to provision and groom services in the WDM network. An engineer receives a grooming order for provisioning two services. One is a unidirectional service from station B to station C. The other is a bidirectional service from station B to station D. Based on the services, the planned OCh trails are as follows:
l

There is a unidirectional trail from station B to station C. The route is B->C. The wavelength of the service is wavelength 1. Figure 3-19 shows the trail signal flow.

Figure 3-19 Signal flow of the trail from station B to station C

There is a bidirectional trail from station B to station D. The route from station B to station D is B->C->D. This route passes through station C. The wavelength of the service is wavelength 2. The route from station D to station B is D->A->B. This route passes through station A. The wavelength of the service is wavelength 2. Figure 3-20 and Figure 3-21 show the trail signal flows.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-47

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Figure 3-20 Signal flow of the trail from station B to station D

Figure 3-21 Signal flow of the trail from station D to station B

Configuration procedure 1. 2. 3. Search for WDM server trails. Create an OCh trail from station B to station C. Create an OCh trail between station B and station D.

Procedure
Step 1 Search for WDM server trails. 1. 2. 3.
3-48

Connect fibers on the U2000 according to the actual networking and signal flow diagrams. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Under Advanced settings, set the search policies.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

4. 5.

Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services. Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE

If no conflict trail exists, the window of conflict trails is not displayed. Click Next. The U2000 displays a window that displays discrete services.

6. 7. 1. 2. 3.

Click Next to view all discrete services in the network. After the search is complete, click Finish. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level and direction of the service. Set the service level to OCh, and set the service direction to Unidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, port and wavelength. Set the source port to port 1 of the L4G in slot 1 on NE430 and the sink port to port 1 of the L4G in slot 1 on NE401.

Step 2 Create an OCh trail from station B to station C.

4. 5. 6.

Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level, rate and direction of the service. Set the service level to OCh, and set the service direction to Bidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-49

Step 3 Create an OCh trail between station B and station D. 1. 2. 3.

Issue 02 (2009-10-23)

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Set the source port to port 1 of the L4G in slot 2 on NE430 and the sink port to port 1 of the L4G in slot 2 on NE402. 4. 5. 6. Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.

----End

3.2 Configuring EAPE


The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. By adjusting the optical power of a WDM trail, the EAPE can reduce or even eliminate bit errors of services on the trail. 3.2.1 EAPE The U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. The EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available. 3.2.2 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 can generate an OCh trail based on the searched server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion).Before creating an EAPE pair, you should create OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of the equipment with the dynamic optical cross-connection boards, you can create OCh trails manually by using the trail management function of the U2000. 3.2.3 Creating EAPE Objects The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. For a WDM service configured with the EAPE, the U2000 fine-tunes the optical power of the transmit end according to signal quality detected by the receive end. This can improve the signal quality. 3.2.4 Starting EAPE Adjustment In the case of a WDM service configured with EAPE, when the OTU at the sink end detects the signal degrade, an exceptional EAPE event is reported to and displayed on the U2000. This event prompts the user to start EAPE adjustment so that the VOA at the source end finely tunes the optical power at the transmit end. This can enhance the signal quality. 3.2.5 Deleting EAPE Objects When you need to activate a trail or the EAPE function on the trail is not required, you can manually delete the EAPE.

3.2.1 EAPE
The U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. The EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available.

3-50

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Function Description
In practice of WDM system operation, the optical power flatness of each channel, compared with that during deployment commissioning, greatly changes due to fiber condition variation. As a result, the quality of received signals does not meet the requirement. In this case, EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available.

Function Implementation
The procedure to implement the EAPE function is as follows: 1. During deployment commissioning, manually adjust the optical power of each channel to obtain signal quality that meet the requirement. This ensures that each channel normally operates. During system operation, the OTU at the receive end detects the signal quality of each channel. When the OTU at the receive end detects an alarm, if the optical power of the OTU at the receive end does not cross the threshold, adjust the optical power attenuation ratio of the corresponding channel according to the actual situation. This ensures that the receive-end signal quality of each channel meets the preset requirement and that the services are available.

2. 3.

Involved Units
The Table 3-4 lists the equipment and U2000 versions that support the EAPE function and their relations. Table 3-4 The versions of the equipment and U2000 that support the EAPE function Equipment Version OptiX OSN 6800/3800 V100R003 or later versions OptiX OSN 3800A/6800A V100R001C01 or later versions OptiX OSN 1600A/G(NA) V100R003C02 or later versions U2000 Version V100R001 or later versions V100R001 or later versions V100R001 or later versions

The service board and the SCC board are jointly used to achieve the EAPE function. This function involves the following types of boards and ports:
l

OTU detection unit

Detects the receive-end signal quality of each channel and reports any EAPE unbalance event detected. The boards that support this function include the OTUs and line boards with the FEC function.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-51

3 End-to-End WDM Management


l

iManager U2000 Operation Guide for WDM End-to-End Management

Adjustment unit: It is the EAPE adjustment entity that adjusts the optical attenuation of each channel. The boards that support this function include ROAM, WSM9, WSD9, WSM5, WSD5, WSMD4, DWC, EDWC, V40, M40V, D40V, V48, VA2, VA1 and VA4. Received signal selection unit

The system locates the point to be adjusted according to the current protection state of the OLP or DCP board. The boards that support this function include the OLP and DCP. It is the system entity that carries out the EAPE function. The boards that support this function include the SCC.

System control and communication unit


NOTE

For the EAPE function, EAPE protocol frames can be sent to each node as long as the physical communication route is reachable. The EAPE protocol frames can be sent in modes such as the OSC and ESC.

Networking Scenarios
The EAPE function can be applied in three typical scenarios. EAPE application scenario 1 is with the basic configuration that only a trail with VOA unit exists. Figure 3-22 shows the networking diagram of this application mode. The figure illustrates only the unidirectional EAPE pair. Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source

EAPE application scenario 2 is applicable to the dual fed and selective receiving OTU board. Each of the two receive optical interfaces of the dual fed and selective receiving OTU has an FEC module. Two trails with VOA units exist. Hence, in this networking mode, you need to configure two EAPE pairs.Figure 3-23 shows the networking diagram of this application mode. The figure illustrates only the unidirectional EAPE pair.

3-52

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources

EAPE application scenario 3 is applicable to the 5 Gbit/s, 10 Gbit/s and 40 Gbit/s OTUs. In this networking mode, the intra-board 1+1 protection needs to be configured. Only one EAPE pair needs to be configured. When the sink OTU detects an anomaly, the system locates the VOA to be adjusted according to the current services operating channel. Figure 3-24 shows the networking diagram of this application mode. The figure considers the OLP board as an example to illustrate only the unidirectional EAPE pair. Figure 3-24 Scenario of the dual VOA units with the OLP protection units

Configuration Principle
The EAPE configuration principles are as follows:
l l

When creating the EAPE, you must create the corresponding OCh trail firstly. Based on the basic application scenario, you just need to specify the source OTU, sink OTU and adjustment unit. When the OTU is jointly used with the OLP or DCP board for networking, besides specifying the source OTU and sink OTU, you also need to specify the OLP or DCP board and the active and standby adjustment units. In this networking mode, the sink OLP or DCP board and the sink OTU must be configured on one NE; the adjustment unit and the source OTU must be configured on another NE. The FEC type of the source and sink OTU must keep consistent. After EAPE is configured, the FEC working mode of the OTU must not be changed; the FEC function of the OTU must be enabled. EAPE requires that the monitored path is a complete end-to-end wavelength without any intermediate add or drop wavelength.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-53

Issue 02 (2009-10-23)

3 End-to-End WDM Management


l

iManager U2000 Operation Guide for WDM End-to-End Management

An OCh trail with regenerating stations equals to two independent wavelengths and thus need be configured with two EAPE pairs. EAPE requires that the adjustment unit is configured in the transmit-end station and the OTU detection unit is configured in the receive-end station. An OCh trail with multiple sources and sinks does not support the EAPE function. The uploading function is not supported, but the script importing and exporting function is supported. If the EAPE ID on the U2000 is inconsistent with that on the NE, you need to delete the trail on the U2000 from the network layer, search for a new trail, and then query or create EAPE objects. In this way, you can obtain the EAPE objects with consistent data between the U2000 and the NE. When an OCh trail has the corresponding EAPE objects, you cannot modify or deactivate the trail. The adjustment board cannot be on the sink NE, and the selective receiving board cannot be on the source NE. The FEC mode of the source OTU and sink OTU should be the same.

l l

3.2.2 Creating an OCh Trail


The U2000 supports creating OCh trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 can generate an OCh trail based on the searched server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion).Before creating an EAPE pair, you should create OCh trails. The EAPE function uses OCh trails to identify EAPE pairs. In the case of the equipment with the dynamic optical cross-connection boards, you can create OCh trails manually by using the trail management function of the U2000.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The OMS server trail must be searched out.

Background Information
The U2000 does not support the ability to reuse discrete cross-connections. The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows:
l l l

For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9. For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4. For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9, RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9, 13WSD9, RDU6, WSM6.

Typical OCh networking scenarios are as follows:


l

The typical scenario of non-protected OCh networking is as follows:


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

3-54

iManager U2000 Operation Guide for WDM End-to-End Management


ONE2 ONE1
OCh
D40
OT U O T U O T U

3 End-to-End WDM Management

OCh
M40 WSM FIU

ONE3

FIU

FIU

WSD

FIU

OT U

OSC

OSC

OSC

OCh

fiber oxc

The typical scenario of protected OCh networking is as follows:


ONE1
OSC

ONE2
OSC OSC

ONE4

F I U O T U O L P

F I U

WSD

WSM

F I U

F I U

ONE3
F I U F I U WSD WSM F I U F I U

O L P

O T U

OSC

OSC

OSC

OCh

fiber oxc

NOTE

The source and sink of an OCh trail cannot be modified.

Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level and direction of the service. Set the level to OCh and set the direction according to the specific networking. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
TIP

l l

During the selection of source or sink in the NE Panel, when you move the cursor to a board, the wavelength information of the board port is displayed. By default, if you already select one end (source or sink) of a trail and open the NE Panel to select another end, the U2000 uses the board and port that have the same band and wavelength with priority.

Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-55

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. The sign is displayed on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 8 Optional: Check the Activate the trail check box. Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and click OK. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End

Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP

You can filter other trails according to the source and sink of the new trail.

2.

In the WDM Trail Management user interface, find out that the trail is correctly created.

3.2.3 Creating EAPE Objects


The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. For a WDM service configured with the EAPE, the U2000 fine-tunes the optical power of the transmit end according to signal quality detected by the receive end. This can improve the signal quality.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. An OCh trail must be created or searched out.

Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select a desired OCh trail, click Maintenance, and select EAPE Management from the dropdown menu. The EAPE Management dialog box is displayed.

3-56

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

Step 3 Click New to create the EAPE management.

NOTE

You need not configure the data of the EAPE objects. The U2000 automatically calculates and then applies the data to the sink NE. The data of the EAPE objects is not displayed in the user interface. By default, the adjustment board nearest to the source is used. If the OLP dual fed board is available, a power adjustment board for the protection trail is required.

----End

3.2.4 Starting EAPE Adjustment


In the case of a WDM service configured with EAPE, when the OTU at the sink end detects the signal degrade, an exceptional EAPE event is reported to and displayed on the U2000. This event prompts the user to start EAPE adjustment so that the VOA at the source end finely tunes the optical power at the transmit end. This can enhance the signal quality.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-57

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. The EAPE must be created. The 15-min performance monitoring must be started on the sink NE.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select a desired OCh trail, click Maintenance , and select EAPE Management from the dropdown menu. The EAPE Management dialog box is displayed. Step 3 If the Status is Can Be Adjusted, click Start Adjustment to start adjusting the EAPE.
NOTE

l l

When the adjustment is finished, Status changes to Adjustment Not Required. Status indicates the current adjustment status of the EAPE. The status can be Adjustment Not Required, Can Be Adjusted, Being Adjusted, Unequalized, or Not Specified. Unequalized indicates that the optical power received by the sink end exceeds the threshold or the received signal degrades.

Step 4 Repeat Step 1 to 3 to start the reverse adjustment. ----End

3.2.5 Deleting EAPE Objects


When you need to activate a trail or the EAPE function on the trail is not required, you can manually delete the EAPE.

Prerequisite
l l

You must be an NM user with "network operator" authority or higher. The EAPE must be created.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select an OCh trail whose EAPE that you want to delete, click Maintenance, and select EAPE Management from the drop-down menu. The EAPE Management dialog box is displayed. Step 3 Click Delete to delete the EAPE objects on the trail. ----End

3.3 Managing Alarms on WDM Trails


You can use the U2000 function of end-to-end trail management to manage the alarms generated on WDM trails at the network layer.

3-58

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.3.1 Viewing Current Alarms of a WDM Trail By querying current alarms of a WDM trail, you can learn about faults on this trail to perform maintenance in a timely and effective manner. 3.3.2 Viewing History Alarms of a WDM Trail By querying history alarms of a WDM trail, you can learn about history faults on this trail and provide reference for maintenance of current faults. 3.3.3 Managing Networkwide WDM Alarm Trails in Real Time The U2000 can manage the networkwide WDM alarm trails in real time. It manages all the WDM trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.

3.3.1 Viewing Current Alarms of a WDM Trail


By querying current alarms of a WDM trail, you can learn about faults on this trail to perform maintenance in a timely and effective manner.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Alarm, and choose Current Alarm from the drop-down menu. The current alarms on this trail are displayed in the window. Step 4 Perform maintenance according to the current alarms reported on this trail. ----End

3.3.2 Viewing History Alarms of a WDM Trail


By querying history alarms of a WDM trail, you can learn about history faults on this trail and provide reference for maintenance of current faults.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-59

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

l l l

If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Alarm, and choose History Alarm from the drop-down menu. The history alarms on this trail are displayed in the window. Step 4 Learn about the history alarms reported on this trail to provide reference for maintenance of current faults. ----End

3.3.3 Managing Networkwide WDM Alarm Trails in Real Time


The U2000 can manage the networkwide WDM alarm trails in real time. It manages all the WDM trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The license for trail management must be available.

Procedure
Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu. Step 2 Set the trail filter criteria and click Filter All. Step 3 In the Alarm Affected WDM Trails window displayed, the alarm affected WDM trails that meet the criteria are displayed. Step 4 Optional: Right-click the title of a parameter column and set the trail attributes to be displayed. Step 5 Choose Alarm. Select the corresponding command from the drop-down menu to query or set the alarm data of each trail. Step 6 Optional: To query the performance data of a trail, click Performance > Browse Performance. Step 7 Optional: To print the trail information, click Print. To save the trail information, click Save As. ----End

3.4 Managing the Performance of WDM Trails


You can use the network layer function of the U2000 to perform end-to-end performance management on WDM trails. 3.4.1 Querying Current Performance of WDM Trails You can find out the running status of the service carried by the WDM trails by querying the performance data.
3-60 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.4.2 Browsing the History Performance of WDM Trails By querying the history performance data of a WDM trail, you can learn about the running status of the services carried on the trail in a specific period in the past and provide reference for analyzing the current performance of this trail. 3.4.3 Setting Performance Monitoring Parameters of an WDM Trail Performance monitoring keeps a detailed record of the performance of services over a trail, helping the maintenance engineer to monitor and analyze the states of services. 3.4.4 Setting WDM Trail Performance Threshold In this user interface, you can set performance thresholds based on a trail. Specifically, you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail.

3.4.1 Querying Current Performance of WDM Trails


You can find out the running status of the service carried by the WDM trails by querying the performance data.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a trail, click Performance and select Browse Performance from the drop-down list. Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and query the latest 15-minute or 24-hour performance data of the trail. Perform the maintenance operation according to the current performance events. Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End

3.4.2 Browsing the History Performance of WDM Trails


By querying the history performance data of a WDM trail, you can learn about the running status of the services carried on the trail in a specific period in the past and provide reference for analyzing the current performance of this trail.

Prerequisite
You must be an NM user with "network monitor" authority or higher.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-61

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select a desired trail, click Performance and select Browse Performance from the drop-down list. Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view the history performance data. Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End

3.4.3 Setting Performance Monitoring Parameters of an WDM Trail


Performance monitoring keeps a detailed record of the performance of services over a trail, helping the maintenance engineer to monitor and analyze the states of services.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail. Click Performance and choose from the drop-down menu. Step 4 In the dialog box displayed, select an monitored object, and set the monitor status and auto reporting status. Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End
3-62 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

3 End-to-End WDM Management

3.4.4 Setting WDM Trail Performance Threshold


In this user interface, you can set performance thresholds based on a trail. Specifically, you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail.

Prerequisite
l l

You must be an NM user with "network monitor" authority or higher. The trail must be created.

Procedure
Step 1 Select Service > WDM Trail > WDM Trail Management from the main menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select one or more trails. Click Performance and choose Performance Threshold from the drop-down menu. Step 4 In the Performance Threshold window, double-click Threshold Value to change the performance threshold value. ----End

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-63

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Glossary and Abbreviations

Glossary and abbreviations are listed in an alphabetical order. Numerics, A, B, C, D, E, F, G, H, I, L, M, N, O, P, Q, R, S, T, U, V, W, X

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-1

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

A.1 Numerics
2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit 2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit

40-channel 40-channel Multiplexing Unit With VOA Multiplexing Unit With VOA 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board

A.2 A
Access Control List Access Control List (ACL) is a list of IP address. The addresses listed in the ACL are used for authentication. If the ACL for the user is not null, it indicates that the address where the user logged in is contained in the list. Adaptive Communication Environment. See Access Control List If there are two cross-connect boards on the SDH equipment, which are in hot back-up relation of each other, the operation reliability is improved. When both the cross-connect boards are in position, the one inserted first is in the working status. Unplug the active board, the standby one will run in the working status automatically. When the active cross-connect board fails in self-test, the board is pulled out, the board power supply fails or the board hardware operation fails, the standby cross-connect board can automatically take the place of the active one. XC1, XC4, GTC, X16, X64, XCS, TXC, DTD, AXCS and STG boards all support active/standby switching. A board like MB2 divides the wavelength resources into such fixed wavelength groups as 1 - 4, 5 - 8 and 9 - 12, etc. A wavelength group is called a wave band, and a wave band bearing the added/dropped services is called add/drop wave band. In the OADM equipment, the boards MR2, MR3, MR4, MR8 and MB2 bear the wavelength directly adding/dropping services. Add/Drop Multiplexer.

ACE ACL Active/standby switching of crossconnect board

Add/drop wave band

Add/drop wavelength ADM

A-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

AIS AIS insertion

Alarm Indication Signal. If there are excessive errors in a channel, AIS is inserted in this channel to indicate it is unavailable. For a line board, it can be set whether to insert AIS when there are excessive errors in the B1, B2 and B3 bytes. For tributary board at the E1/T1 level, it can be set whether to insert AIS when there are excessive errors in BIP-2. For tributary board at the E3 level or higher, it can be set whether to insert AIS when there are excessive errors in the B3 byte. A message reported when a fault is detected by a device or by the network management system during the process of polling devices. Each alarm corresponds to a recovery alarm. After a recovery alarm is received, the status of the corresponding alarm changes to cleared. In case alarm2 is generated within five seconds after alarm1 is generated, and it complies with the conditions defined in the alarm correlation analysis rule, you can either mask the alarm or raise the level of alarm2 according to the behavior defined in the alarm correlation rule. Such a process is called alarm correlation analysis.

Alarm

Alarm correlation analysis

Alarm correlation rules It refers to the rule of processing alarm1 and alarm2 under certain conditions. Such conditions are supported as follows:(1) Alarm1 and alarm2 occur on the same object;? (2) Alarm1 occurs in the service upstream of alarm2;? (3) Alarm1 occurs at the opposite service end of alarm2.? The following actions are supported at present:(1) Alarm1 masks alarm2;? (2) Raise the level of alarm2The alarm correlation rule is the basis for alarm correlation analysis, which affects the result of alarm correlation analysis. Set it with caution. Alarm filtering Alarms are detected and reported to the NMS system, and whether the alarm information is displayed and saved is decided by the status of the alarm filter. An alarm with the filtering status set to "Filter" is not displayed and saved on the NMS, but is monitored on the NE. Alarm delay includes starting delay and stopping delay. An alarm is not regarded as being generated until the NE has been detecting it for a period of time, and this period of time is the alarm start hold-off time; An alarm is not regarded as being ended until the NE has been detecting the ending of it for a period of time, and this period of time is the alarm end hold-off time; Setting the hold-off time can avoid the generation of unnecessary alarms due to misreport or jitter. On the cabinet of an NE, there are three indicators with different colors indicating the current status of the NE: Green indicator on: The NE is powered on; Red indicator on: A critical alarm is generated; Orange indicator on: A general alarm is generated. You can stop the NE alarm indication through the NMS.

Alarm hold-off time

Alarm indication

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-3

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Alarm inversion

For the port that has already been configured but has no service, this function can be used to avoid generating relevant alarm information, thus preventing alarm interference. The alarm report condition of the NE port is related to the alarm inverse mode (not inverse, automatic recovery and manual recovery) setting of the NE and the alarm inversion status (Enable and Disable) setting of the port. When the alarm inversion mode of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever the inversion status of the port is.? When the alarm inversion mode of the NE is set to automatic recovery, and the alarm inversion state of the port is set to Enabled, then the alarm of the port will be suppressed. The alarm inversion status of the port will automatically recover to "not inverse" after the alarm ends. For the port that has already been configured but not actually loaded with services, this function can be used to avoid generating relevant alarm information, thus preventing alarm interference.? When the alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion status of the port is set as Enable, the alarm of the port will be reported. After the service is accessed or the fault is removed, whether the port is automatically restored to the normal status depends on the alarm inversion mode of this NE. There are three alarm inversion modes: normal, revertible and non-revertible.? (1) Automatic restoration mode: If the NE alarm inversion mode is set to automatic restoration, after the NE port set to the inversion status accesses services or the fault is removed, it will be restored to the normal status automatically and an event is reported;? (2) Manual restoration mode: If the NE alarm inversion mode is set to manual restoration, after the NE port set to the inversion status accesses services or the fault is removed, it will not be restored to the normal status automatically and manual restoration is required;? (3) Not-to-invert mode: If the NE alarm inversion mode is set to not-to-invert, how the inversion status of the NE port is set will not affect alarm reporting of this port. Alarm mask means not monitoring the alarm event of a specific object.? The object here may be the networkwide equipment, a specific NE, a specific board and even a specific functional module of a specific board. Alarm severity is to identify the severity of an alarm or event. It is divided up into four levels: critical, major, minor, and warning alarm. There are two modes for saving alarms: stop and wrap.? Under stop mode, new alarms will be discarded when the alarm register in NE is full.? Under wrap mode, the earliest alarms will be deleted and new alarms will always be saved when the alarm register in NE is full. When the bit error reaches a specific limit, the equipment will report an alarm. This limit is the bit error alarm threshold. The threshold can be divided into crossing threshold and defect threshold. Classification of alarms with different attributes. There are six alarm types as following: Communication: alarm indication related with information transfer. Processing: alarm indication related with software or information processing Equipment: alarm indication related with equipment fault Service: alarm indication related with QoS of the equipment Environment: alarm related with the environment where the equipment resides, usually generated by a sensor Security: alarm indication related with security See Automatic Level Control The ALC link is a piece of end-to-end configuration information, which exists in the equipment (single station) as an ALC link node. Via the ALC function of each node, it fulfills optical power control on the line that contains the link.

Alarm inversion mode

Alarm mask

Alarm severity Alarm storing mode

alarm threshold

Alarm type

ALC ALC link

A-4

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

ALC node ALS AMI AMI code APE APS ASN.1 ASON

ALC functional unit, which corresponds to the equipment, achieves the ALC function through the coordination among the VOA, WBA, SC1/SC2 and MS2 boards. See Automatic laser shutdown Alternate Mark Inversion. Alternate Mark Inversion code. Automatic Optical Power Equalization Automatic Protection Switching. Abstract Syntax Notation One. Automatically Switched Optical Network

Asynchronous transfer An electronic digital data transmission technology. In June 1992, ATM is designated by mode the ITU-T as the transfer and switching mode for B-ISDNs. Because of its high flexibility and support for multimedia services, ATM is considered as the key to implementing broadband communications. ATM See Asynchronous transfer mode ATM protection group It refers to the logically bound ATM VP network/sub-network connections that share the same physical transmission channel. In the VP Group (VPG), a pair of VP connections (working connection and its protective connection) is used for monitoring the automatic protection switching, called monitoring connections (APS VPCs). If the monitoring connections switch over, the whole VPG will switch over to quicken the ATM protection switching (as quick as the protection switching of the SDH layer. Auto-negotiation Automatic alarm report Automatic alarm synchronization The rate/work mode of the communication party set as self-negotiation is specified through negotiation according to the transmission rate of the opposite party. Report the alarm to the NMS as soon as it is generated at the equipment side. The NMS pops up the alarm panel. The user can view this alarm information in the alarm panel without active query. The NMS can automatically acknowledge all unacknowledged alarms before the specified days at 3:00 AM every day.? The ended alarm that has been acknowledged will become the history alarm. The user in the acknowledgement information is "Automatic Acknowledgment". Automatic laser shutdown means that automatic laser shutdown is permitted when the optical interface board does not bear services or the optical fiber is faulty. Its service life can be prolonged by decreasing the on time of the laser. In shutdown period, the laser will start automatically every other a period of time (off time) to test whether the line is normal. In the laser shutdown period, the test function can be manually started immediately (by clicking ) without the off time. The NMS will test whether the service over the fiber is restored to normal. If yes, the laser will be turned on again and starts working normally. If no, the laser will be shut down again after continuous light emitting after a certain period of time (continuously on time). The on and off time of the laser during automatic test can be set on the NMS . Automatic Level Control. A technique (procedure) to automatically reduce the output power of optical amplifiers to avoid exposure to hazardous levels.

Automatic laser shutdown

Automatic Level Control

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-5

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Automatic switching

When a fault occurs to the line, the line board will detect SD (signal deterioration) or SF (signal failure) condition and then report it to the SCC board that will generate K byte and send it out via the line board according to APS protocol. The line boards of other nodes will report it to the SCC board after receiving K byte. Finally SCC board will specify the switching status of the node according to protocol, and send command to XCS board to perform the switching of payloads. Fault restoration. After switching restoration time, this protection sub-network will switch to the working route and resume normal working status. Auxiliary Equipment

AUX

A.3 B
BER Binding Basic Encoding Rules In virtual cascaded payload configuration, designating one bind number to identify the VC4s of the same virtual cascaded payload is called "bind". If a fault occurs to one of the bound services, all bound services will switch as a whole. The bind ID is of 1-24 characters. On the same NE, the bind ID is unique. However, the bind IDs of the same virtual cascaded payload on the passed NE can be different. Basic Input/Output System Bit error means that an error occurs to some bits in the digital code stream after being received, judged, and regenerated, thus damaging the quality of the transmitted information. Building Integrated Timing Supply System Business Management Layer The VC Trunk refers to the 2M paths which are bound together to transmit the Ethernet data. The VC Trunk is an entity between the Ethernet port and the 2M path. It is introduced for the use of the routing and convergence functions in the future. Each ET1 has eight Ethernet ports and each ET1 board can be configured with up to 16 VC Trunks. The number of VC12s assigned to each VC Trunk are configurable. As in the networking application one ET1 board can provide 48 VC12s at most, one VC Trunk can be configured with up to 48 VC12s, with the corresponding bandwidth as 100M, of which the payload bandwidth is 90M. The specific configuration is dependent on the bandwidth that users need. On the same ET1 board, one VC12 can be assigned to only one VC Trunk. The unidirectional services from one service source to multiple service sinks are called the broadcast service. Since the tone interface provided by the TDA board does not contain such call and control signals as ringing current and signaling, it is only applicable to the semi-permanent connection between the equipment with the tone interface, either point-to-point private line connection or point-to-multipoint broadcast connection. Broadcast service is a wide application of the TDA board. For example, in a paging center, the TDA board is adopted to sent the signals to the TDA boards of other stations via fibers, and send the received signals to the wireless paging transmitters for further transmission. Backbone WDM System

BIOS Bit error

BITS BML Bound path

Broadcast service

BWS

A-6

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

A.4 C
CAR CC CDE Charging zone Class of Service Committed Access Rate Continuity Check Common Desktop Environment The time zone between the start time and end time of charging. Class of Service. CoS keeps the priority mapping rules. It works in internal ports, especially when there is congestion, CoS is even more important. The services at different levels are processed according to the corresponding priorities. The service with higher priority is processed first and the service with lower priority is discarded when the bandwidth is insufficient. The login mode of a client, which includes the single-user mode and multi-user mode. By default, the login mode is the multi-user mode. It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc) transporting Ethernet services have the same server trail. It refers to the data that configures the NE hardware for coordination between this NE and other NEs in the entire network and operation of specified services. Configuration data is the instruction file of NEs, and it is the key for efficient network running.? The typical configuration data includes board configuration, clock configuration and protection relationship. Common Object Request Broker Architecture. See Class of Service Cyclic Redundancy Check. Cyclic Redundancy Code. An alarm that is uncleared and unacknowledged, uncleared but acknowledged, or cleared but unacknowledged. For each performance parameter of each performance monitoring entity, the NE provides two types of registers:(1) 15-minute register: Accumulates the performance event data within 15 minutes;? (2)24-hour register: Accumulates the performance event data within 24 hours Each type of register can be further divided as follows:(1) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changed within the monitor period.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full, the register storing the earliest history data will be overwritten.? The performance data stored in the current register is called current performance data. A subset of the main topology view, which contains network entities such as NEs, the NMS or submaps. The network administrator needs to customize custom views and select managed network entities from the main topology view. Coarse Wavelength Division Multiplexing

Client mode Concentrated routing Ethernet trail Configuration data

CORBA CoS CRC CRC Current alarm Current performance data

Custom View

CWDM

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-7

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

A.5 D
D32 D40 Data Communication Channel 32-channel Demultiplex Unit 40-channel Demultiplexing Unit Data Communications Channel. The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to transmit information on operation, management, maintenance and provision (OAM&P) between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the 192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12 is referred to as the 576 kbit/s DCCM channel. The data interface service works in point-to-point mode. The service that uses the F1 byte or some undefined bytes to transmit information such as call charge, network management system information and power supply monitoring. It is the NE configuration data saved on the SCC board of the OptiX equipment, which can be uploaded on the NMS and then saved in the NMS. See Data Communication Channel Data Communication Network. Digital Distribution Frame Digital Data Network. Delete the association between the logical systems of the protection sub-network and the NE . After deletion, such functions as deleting optical fiber and re-uploading NE data are available. The command is not sent to NE and has no effect on the service. After configuring, search the protection sub-network again, and then search the trail in the trail view to create the original service. Delete the logical systems of the protection sub-network and the NE and delete all the related services.? A deleted protection sub-network cannot be restored but can be reestablished. After successfully deleting it, the SDH NNI becomes an isolated node and has no effect on service. After creating the isolated node as SDH NNI again, the SDH NNI can be found again in the trail view.

Data interface service

Data on NE DCC DCN DDF DDN Delete protection subnetwork at network layer

Delete protection subnetwork on NE side Delete SDH NNI at network layer

Delete SDH NNI on NE Delete the SDH NNI and all its service directly, and can not resume them later. side Device set It is an aggregate of multiple managed equipments.? Device set facilitates the authority management on devices in the management domain of the NMS. If some operation authorities over one device set are assigned to a user (user group), these operation authorities over all devices of the device set are assigned to the user (user group), thus eliminating the need to set the operation authorities over these devices respectively. It is suggested to design device set according to such criteria as geographical region, network level, device type, etc. Dynamic Gain Equalizer The cross-connection that exists on an NE but cannot form trails on the network management system.

DGE Discrete service

A-8

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Disk Mirroring

A procedure that involves duplicating data from a NetWare partition on one hard disk to the NetWare partition on another disk. Disk mirroring pairs multiple hard disks on the same channel, and like disk duplexing, writes data to both the original and secondary disk. If the original disk fails, the secondary disk automatically takes over. Disk mirroring cannot protect against failures that occur along the channel between the disks and the NetWare server, because the duplicate disks exist on the same channel. It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc) transporting the Ethernet service have different server trails. Division as per VC4 means that different timeslots in a fiber belong to different protection sub-networks. Assign timeslots, as per VC4, into different protection sub-networks. It functions to implement virtual optical path protection. It means that some of the VC4s over the fiber can be put into one protection sub-network.? For example, in an STM-16 fiber, the 1st to 4th VC4s belong to an STM-4 unprotected ring, while the 5th to 8th VC4s belong to another unprotected link. Dual Node Interconnection Dual node interconnection is an architecture between two rings where two nodes in each ring are interconnected. The two interconnections between the two rings can be arranged to provide protection of the traffic crossing from one ring to the other. The service between ring networks can be classified into the Single Node Interconnection (SNI) mode and the dual node interconnection (DNI) mode. The former can be protected in line protection mode. However, in this mode, protection is only valid for fiber and optical transmitting/receiving ports, and protection fails in the case of interconnection node failure. In the latter mode, specific regulations on the protection mode for the inter-ring service are made in G.? 842 Recommendation. It regulates the protection modes of the two interconnection nodes both on a MSP ring or a PP ring, therefore, by adopting the recommended protection modes, the protection of the interconnecting service between two ring networks composed of the devices of different manufacturers and in different protection modes can be realized. Moreover, in case of fiber failure or node failure, services can also be protected Destination (signalling) Point Code Dynamic Random Database Digital Signal, Level n Dispersion Slope Equalizer Dense Wavelength Division Multiplexing

Dispersed routing Ethernet trail Division as per VC4

DNI DNI

DPC DRDB DS-n DSE DWDM

A.6 E
EGT EML EMS Environment Monitor Unit Gigabit Ethernet Transparent Transmission Board Element Management Layer. Element Management System. As one type of power and environment monitoring unit, EMU is installed on the top of the equipment cabinet to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, etc. can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-9

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

EPL EPLAN ESCON ET1 board

Ethernet Private Line Ethernet Private LAN Enterprise System Connection The ET1 (Ethernet Transparent Transmission Unit) has eight 10M/100M standard Ethernet interfaces (in compliance with the IEEE 802.? 3 recommendation). Its applications are as follows:(1) The ET1 board can map the Ethernet frames of 1 to 8 10/100Base-T ports into 1 to 48 2Ms.? Where, each network port can also be mapped into 1 to 48 2Ms.? The ET1 board can perform bandwidth separation and management for users in VLAN mode. In this way, different users can be differentiated in the same 10M/100M signal so as to manage the bandwidth. Besides, the VLAN-based port bandwidth sharing and statistical multiplexing can be realized.? (3) As the Ethernet frames are mapped into N 2Ms (N=<48) and transmitted in the same point-to-point mode as the SDH, the protection capability of the SDH can be fully used. The board attributes include tributary loopback, path protection, path impedance, retiming work mode, SXT work mode, path service type, code pattern, path phase lock, input type equalization, tobe-sent J2, to-be-received J2, ser It is the MAC port to MAC port Ethernet service transparent transport trail provided by multiple SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc). The processing board and wire led-out board are separated in the Ethernet interface unit. Therefore, when different interfaces are needed, if the 100M optical interface is to be used or more network interfaces are to be added for example , now it only needs to replace or add the corresponding wire led-out board. It not only saves costs for users but also facilitates the upgrade and maintenance.? The ET1 board has two types of interface boards: ETF4 and EFF4. As the Ethernet service outlet board of the Ethernet transparent transmission interface unit, they have the following functions: 1. Support the access of four 10/100Base-T Ethernet services (ETF4 board); Support the port self-adaptation function; Support port full duplex and half duplex; 2. Support the access of four 100BaseFX Ethernet services (EFF4 board); Provides the single-mode/multimode optical interface; Support the automatic shutdown function of multimode optical interface. Ethernet Virtual Private Line Ethernet Virtual Private LAN Exercise switching is used to test whether a switching protocol can work normally and no switching operation is really conducted. This command exercises ring protection switching of the requested channel without completing the actual bridge and switch. The command is issued and the responses are checked, but no working traffic is affected. This command exercises span protection of the requested channel without completing the actual bridge and switch. The command is issued and the responses are checked, but no working traffic is affected.

Ethernet end-to-end trail Ethernet interface board

EVPL EVPLAN Exercise switching Exerciser - Ring

Exerciser - Span

Extended IP address of It is the serial number of a sub-network where an NE resides, which is usually used to NE distinguish different network segments in a WAN. An extended ID and an ID form the physical ID of an NE.

A-10

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Extended protection subnet

An unprotected chain like ADM-ADM-TM or ADM-ADM-ADM. The end-point NEs of a link is of the ADM type. As this type of protection subnetwork can be extended, we name it extended protection subnetwork. For a chain protection sub-network, the logical systems at the two ends should be configured as TM, with only the one in the middle configured as ADM. But in the process of practical engineering installation, the networking equipments at the bottom layer may arrive in different batches. Thus the part of no protection line is not available, but the service on it needs activating gradually during project building.? Then, another protection sub-network is needed to support the incomplete protection sub-network. As it is can be extended, we name it extended protection sub-network. The NMS can support searching for it, deleting it and deleting it from network layer but creating it. When the new equipment arrive, the user should delete it from network level and search for protection sub-network and trail once more.

A.7 F
F1 byte It is the user path byte, which is reserved for the user but usually it is special for network providers. It is mainly used to provide the temporary data/voice path for special maintenance Objectives. It belongs to the regenerator section overhead byte. They are the path user channel bytes. These two bytes provide the user with the communication between path units related to payload. They belong to the higher order path overhead byte. Fault Management,Configuration Management,Accounting Management,Performance Management,Security Management Frequency Diversity Flash Database Forward Error Correction Fiber & Cable is the general name of optical fiber and cable. It refers to the physical entities that connect the transmission equipment, carry transmission objects (user information and network management information) and perform transmission function in the transmission network. The optical fiber transmits optical signal, while the cable transmits electrical signal.? The fiber/cable between NEs represents the optical fiber connection or cable connection between NEs. The fiber/cable between SDH NEs represents the connection relation between NEs. At this time, the fiber/cable is of optical fiber type. A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for the purposes of retrieving or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP. This function forces the service to switch from the working channel to the protection channel, with the service not to be restored automatically. This switch occurs regardless of the state of the protection channels or boards, unless the protection channels or boards are satisfying a higher priority bridge request.

F2, F3 bytes

FCAPS FD FDB FEC fiber/cable

File Transfer Protocol

Forced switch

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-11

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Forecast laser performance

It is to forecast the laser performance within a certain period of time on the basis of the collected laser performance data and according to a certain performance model so that you can replace the laser in time if necessary.? The forecast can be roughly divided into two types: 1. Forecast the bias current, input optical power and output optical power at a moment in future; 2. Forecast the period of time which is taken for the bias current, input optical power and output optical power to reach the specified value. See File Transfer Protocol The system that can transmit information in both directions on a communication link.On the communication link, both parties can send and receive data at the same time. In the full searching mode, all the trail information at the NM side will be deleted first (but the service configuration information of respective NEs is saved at the NM side). Then the service configuration information of respective NEs at the NM side is researched to form the trail information in the network. In the full search mode, all the trail information on the NM side will be deleted first (Only the trail information at the network layer on the NM side are deleted, while the service configuration information of NE in NE layer on the NM side and on the NE side still remain). Then the service configuration information of respective NEs in the NE layer on the NM side is re-searched to form the trail information in the network layer on the NM side.

FTP Full duplex Full mode

Full search

A.8 G
Gateway ID Gateway NE A gateway ID refers to the ID of an NES serving as a gateway. Gateway NE refers to the NE that communicates with the NMS via Ethernet or serial port line. The non-gateway NE communicates with the gateway NE via ECC and communicates with the NMS via the gateway NE. The gateway NE is a communication route that the NMS must pass through when managing the entire network. The communication status between the gateway NE and the NMS can be:(1) Normal: The current communication is efficient;? (2) Connecting: The destination gateway responds, and the communication is interrupted but is being connected;? (3) Disconnected: The destination gateway does not respond (Maybe the network cable is disconnected or not within the same network segment), and the communication is unreachable or the gateway is disabled manually. Global Cluster Manager Gigabit Ethernet. Gate Network Element Graphical User Interface.

GCM GE GNE GUI

A.9 H
HA Half duplex History Alarm High Availability. On the communication link, only one party can send data, while the other party can only receive data. An alarm that is acknowledged and cleared.

A-12

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

History performance data

For each performance parameter of each performance monitoring entity, the NE provides two types of registers:(1) 15-minute register: accumulating the performance event data within 15 minutes;? (2) 24-hour register: accumulating the performance event data within 24 hours.? Each type of register can be further divided as follows:(2) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changes within the monitor period.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full, the register storing the earliest history data will be overwritten.? The performance data stored in the history register and the auto-report performance data saved on the NM are called history performance data in a unified way. The hotline phone number can be called immediately by picking up only, but not by dialing. Hot-Standby Hyper-Text Transmission Protocol

Hotline phone HSB HTTP

A.10 I
Idle resource optical NE When the NMS is started successfully, an NE icon called "Idle ONE" will be displayed on the topological view.? In this NE, the subracks and boards that are not divided to other optical NEs (such as OTM, OADM and other NEs) are retained. In this NE, idle DWDM subracks and boards are reserved, which can be distributed to other ONEs. Double-click the NE icon to view all the currently idle DWDM subracks or boards in the network. Internet Group Management Protocol. Inverse Multiplexing for ATM. Integrated Management Application Platform. In this search mode, the network management system first reserves the trail data of the current client and then re-searches the service configuration data of respective NEs on the network management system according to the newly given search condition to form the new trail data and combine it with the original trail data to get the result. The incremental mode means to compare the trail information of the NM side with the service configuration information of respective NEs at the NMS side. If inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information of the NMS side which has not formed the trail information. The increment search mode means to compare the trail information in network layer on the NMS side with the service configuration information of respective NEs on the NMS side. If they are inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information that has not formed the trail in the NE layer on the NMS side.

IGMP IMA iMAP Incremental filtering trail

Incremental mode

Incremental search

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-13

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Inter-board wavelength path protection

The optical wavelength inter-board channel protection is mainly implemented by the SCC judging the alarm report in the line of the wavelength conversion board to turn off the laser in the tributary of the board. The dual fed is implemented by adding a passive optical splitter to the tributary. The signal selection is implemented by the SCC turning off the laser in the tributary with poorer signal quality according to the signal quality of the lines of two wavelength conversion boards, and letting the channel of light with higher quality pass through the coupler. The coupler is also a passive device and only one channel of light can pass through it. If there are two channels of light passing through the coupler, they will interfere each other that would cause bit error to the service. Therefore, it is necessary to ensure that only the channel of light with higher quality pass through the coupler at a destined time. It refers to the equipment used for optical fiber management and dispatch in the metropolitan area. It has multiple pairs of interfaces for the optical fiber connection. Every two interfaces in a pair are connected with each other to form a longer physical optical fiber path. The physical optical fiber path connecting the transmission equipment can comprise two or more sections of optical fiber cascaded via the intermediate office. There is an intermediate office information list for some fiber & cable connections, which shows the section information about the fiber & cable. The intra-board optical wavelength path protection is mainly implemented by the wavelength conversion board with dual fed and signal selection function. The dual fed is implemented by the optical divider inside the board, while the signal selection is implemented by the board turning off the laser of one of the receiving optical interfaces. Therefore, this protection mode is also called optical wavelength intra-board channel protection. The switching in this protection mode can be completed within a short time, but the services must be interrupted during the maintenance of the damaged boards or devices. Therefore this protection mode will have a relatively lower reliability. Intelligent Optical Network Internet Protocol. In the TCP/IP protocol, it is used to uniquely identify the 32-bit address of the communication port, An IP address consists of a network ID and a unique host ID. An IP address consists of the decimal values of its eight bytes, separated with periods; for example,192.168.7.27. Intelligent Power Adjustment Integrated Services Digital Network. A type of special NE or an optical port on an NE. An isolated node does not refer to an isolated NE, instead, it refers to a type of special logical system which does not belong to any protection sub-network or SDH NNI.? It is the node that has been configured on the NE side but cannot form (or has not formed) a corresponding protection sub-network with other nodes. This node may be either an NE or a logical system on the NE.? An isolated node may be formed when:(1) There is something wrong with the configuration information of the NE side;? (2) The fiber/cable connected to this node has not been created on the NMS.? The sub-network where this node resides is of unprotected type. Interleaver Unit International Telecommunication Union-Telecommunication Standardization Sector

Intermediate office

Intra-Board optical wavelength path protection

ION IP IP address

IPA ISDN Isolated node

ITL ITU-T

A-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

A.11 L
LAN LCAS LCD LCT LDG LLID Lock NE login Lock NE setting Local Area Network. Link Capacity Adjustment Scheme Liquid Crystal Display Local Craft Terminal 2xGigabit Ethernet Unit Locate Loopback ID This function prohibits the users at lower levels from logging in NE and forces logged NE users with lower level to log out. It is to divide the NE into the configuration module, alarm module, performance module and other modules.? You can lock the setting function of these modules, disabling other NM clients from setting the locked modules. Services are not switched to the protection board or channel when a fault occurs, if currently no switching takes place. If currently the switching takes place, after the working board or channel recovers to normal, the services are not switched back to the working board or channel. When the switching condition is satisfied, this function disables the service from being switched from the working channel to the protection channel. When the service has been switched, the function enables the service to be restored from the protection channel to the working channel.

Lock status

Lock Switching

Logical system relation It is to set the logical protection relation of two linear multiplex section types. NE logical systems and their logical protection relation will be generated when defining the NE logical system relation LOS LPT LQS LSP LWC LWF LWM LWS LWX Loss Of Signal Link-state Pass Through 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board Label Switching Path STM-16 Line Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Multirate Optical Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Arbitrary Bit Rate Wavelength Conversion Unit

A.12 M
M32 M40 MAC port
Issue 02 (2009-10-23)

32-channel Multiplex Unit 40-channel Multiplexing Unit Media Access Control, that is a media access control port, such as the 8 ports of ET1.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. A-15

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Manual switching

When the protection channel is efficient and there is no higher-level switching request, services are manually switched from the working channel to the protection channel, thus testing whether the network still has the protection capability. Under suppression status, NE will not monitor the corresponding alarm conditions and the alarm will not occur even when the alarm conditions are met. Bandpass Filter Expandable 2-Channel Optical Add/Drop Multiplexing Board Multi-channel Spectrum Analyzer Unit Memory Database Medium Dependent Interface Message Dispatch Process Manager Management Information Base. Man-Machine Language. Managed Object. MOdulator-DEModulator. Managed Object Instance Tree. Monitor A logical port which achieves transparent transmission of the MAC service over SDH, for example, the 16 ports of the ET1. Multi-Protocol Label Switching 2-channel Add/Drop Unit Multiplex Section The WDM network node that has the spectrum analysis unit in the link for which the ALC function is configured. The node is unique on the ALC link. See Multiplex section protection Mean Time Between Failures. Mean Time to Recovery. It is a protection mode in which multiple services with different trails but with the same sink protect an important service with the same sink.? This protection mode supports protecting important services through non-optical network trails, such as microwave. It presently supports that three protection trails protect one service trail.? At the trail sink, it monitors the quality of protection trail signals and protects important services according to the priority and the signal quality.? The most significant characteristic of the multi-service protection trail is: Flexible networking. It supports either the protection trail passing the line board or the protection trail passing the tributary board.? It supports the trails other than the optical ones, for example, a microwave trail, to provide protection. The nodes online achieve protection switching through the K1 and K2 bytes in the multiplex section,? including linear 1+1 MS protection switching link, linear 1:n MS protection switching link, dedicated MS protection ring and shared MS protection ring.

Masking status MB2 MCA MDB MDI MDP Mgr MIB MML MO MODEM MOIT MON MP port MPLS MR2 MS MS node MSP MTBF MTTR Multi-trail protection service

Multiplex section protection

A-16

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

A.13 N
NE NE database See Network Element There are three types of database on NE SCC board as following:(1) DRDB: a dynamic database in a dynamic RAM, powered by battery;? (2) SDB: a static database in a powerdown RAM;? (3) FDB0, FDB0: permanently saved databases in a Flash ROM.? In efficient operation, the NE configuration data is saved in DRDB and SDB at the same time.? Backing up an NE database means backing up the NE configuration data from SDB to FDB0 and FDB1.? When an NE is restarted after power-down, the NE database is restored in the following procedures: As the SDB data is lost due to power-down, the main control restores the data first from DRDB.? If the data in DRDB is also lost due to the exhaustion of the battery, the data is restored from FDB0 or FDB1. In a network, each NE corresponds to a unique identifier, The NM uses NE ID, in an interface or a database, to identify various NEs in a network. It is the NE configuration data saved in the NM database. Consistency between the data on the NM side and that on the NE side is the precondition of efficient running of the transmission equipment.? If there is any data on the NE side, the NMS can save such data in the NE layer on the NM side through the upload function, thus forming the NE layer data on the NM side.? If there is no data on the NE side, the NMS can send the NE layer data on the NM side through the upload function, thus forming the data on the NE side.? Meanwhile, the NE layer data on the NM side is one of the important data sources of the network layer data on the NM side. The NE configuration data saved on the SCC board of the equipment, which can be uploaded to the network management system and then stored in databases on the network management system NE side. Network Element Level It is the network element, including the hardware unit and the software running on it. Usually, one NE has at least SCC (System Control & Communication Unit) board which responsible for the management and monitoring of the NE. The host software runs on the SCC board. Network entity refers to the universal basic devices used to describe the functions and structure of the transmission network, which considerably facilitates the description of the network. The network entities include transmission object and sub-network.

NE ID NE layer data on NM

NE side

NEL Network Element

Network entity

Network layer data on It is the network configuration data saved in the NM database and is the data source for NM the network function of the NMS.? The network layer data on the NM side includes three parts: fiber connection data, protection sub-network and SDH NNI data and trail information. Network Node Interface NM NML NMS NNI NSAP
Issue 02 (2009-10-23)

Network Node Interface. The interface at a network node which is used to interconnect with another network node. See also NNI. Network Management Network Management Layer Network Management System. See Network Node Interface Network Service Access Point
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. A-17

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

NTP Number of routes calculating

Network Time Protocol Usually,the NMS can work out multiple trails which comply with the requirements according to the route restriction. The user can select one of them. The number selected here is the maximum number of optional routes which is worked out by the NMS .

A.14 O
OA OADM OAM OAMS OAU OBU OCH OCP OD ODU ODUk OEQ Office OIF OLA OLP OM OMS OMU ONE Operation set Optical Amplifier Optical Add/Drop Multiplexer Operations, Administration, and Maintenance Optical fiber line Automatic Monitoring System Optical Amplifier Unit Optical Booster Board Optical Channel Optical Channel Protection Optical Demultiplexing Optical Demultiplexing Unit Optical Channel Data Unit-k Optical Equalizer To facilitate management and show the actual physical relation of the equipment, all the NEs in respective actual transmission equipment rooms are grouped into offices. Optical Internetworking Forum Optical Line Amplifier Optical Line Protection Optical Multiplexing Optical Multiplexing Section Optical Multiplexer Unit Optical Network Element A collection of multiple client operations. Operation set facilitates authority management in the NMS system. Since different client operations have different influences on system security, the operations with similar influence on system security are added in an operation set. In this way, if the authority in this operation set is assigned to a user (user group), the user (user group) will have the authority of all operations in the operation set.? The NMS has a default operation set. If the default operation can not meet the requirement for authority assignment, the user can create a new one.

A-18

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Optical NE

Optical Network Element (ONE) is the transport entity that implements the NE functions (terminal multiplexing, add/drop multiplexing, cross-connection and regeneration) in a DWDM layer network. The types of ONEs include OTM, OADM, OLA, REG and OXC. The locating of an ONE is equivalent to that of a common NE.? In a view, an ONE is displayed with an icon, like a common NE and its alarm status can be displayed with colors. Logically, an ONE consists of different subracks.? Like a common NE, an ONE cannot be expanded or entered like a sub-network.? Similar to a common NE, an ONE provides a list of the subracks that form the NE to display the board layout. Optical Supervision Channel is an independent optical channel in the DWDM system, which achieves the management function similar to the frame overhead bytes in the SDH system.? Optical monitor channel features independence of traffic channel.? In the optical signal transmission direction, the optical signals of the supervisory channel and the multiplexed and amplified optical signals of the service channel are converged to the backbone transmission fiber. In the optical signal receiving direction, the optical signals of the supervisory channel are split first and then the service channel is preamplified and demultiplexed.? Therefore, in DWDM transmission system the monitor channel optical signals are not amplified, but they are terminated and regenerated at each site. However the service channel optical signals are on the contrary. They are amplified many times during the transmission, but they are not terminated or regenerated. It is the end-to-end optical wavelength. After creating the fiber/cable among the DWDM equipments, the optical trails OCH, OTS and OMS are available at the same time, so you do not need to create/search for any more optical trail. Optical Channel Payload Unit-k The called party in communication receives the call prompt (BB tone) of the third party, he can directly press the "#" key to clear the line currently in communication and then establish the communication with the break-in party. The phone with the forced breakin authority can be used to break in the phone forcedly by dialing "# + phone number". Orderwire authorized break-in cannot be done unless no hotline or private telephone is set on the corresponding Phone port. Optical Supervisory Channel The SC1 or SC2 board, which is responsible for ALC protocol byte processing. Operation System Function Open Systems Interconnection. Optical Switch Node Optical Signal to Noise Ratio Optical Time-Domain Reflectometer Optical Terminal Multiplexer Optical Trassmission Network Optical Transmission Section Optical Transponder Unit Optical Channel Transport Unit-k

Optical supervisory channel

Optical trail

OPUk Orderwire break-in

OSC OSC board OSF OSI OSN OSNR OTDR OTM OTN OTS OTU OTUk

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-19

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

A.15 P
P2P PC PDH PE Performance register Point To Point Personal Computer Plesiochronous Digital Hierarchy Provider Edge. Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history performance register, 24-hour history performance register, UAT register and CSES register. The object of performance event monitoring is the board functional module, so every board functional module has a performance register. A performance register is used to count the performance events taking place within a period of operation time, so as to evaluate the quality of operation from the angle of statistics.

Performance threshold Performance events usually have upper and lower thresholds. When the performance event count value exceeds the upper threshold, a performance threshold-crossing event is generated; when the performance event count value is below the upper threshold for a period of time, the performance threshold-crossing event is ended. In this way, performance jitter caused by some sudden events can be shielded. A few performance events only have one threshold, which is the special case that upper threshold and lower threshold are equal. PM PMU Port inversion Performance Monitoring See Power Monitor Unit It is to set port alarm monitoring as contrary to the practical situation. If an alarm is raised, it is reported normally. This function applies to a port configured with but not loaded with services to prevent the generation of any meaningless alarm that will interfere with alarm analysis. The power and environment monitoring unit is installed at the top of the cabinet of the SDH equipment and is used to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, etc. can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately. For the equipment installed with a power & environment monitoring board, the following parameters can be set: relay switch output control, temperature alarm threshold, relay usage and alarm setting, query of DIP switch status, etc. As one type of power and environment monitoring unit, PMU (short for Power Monitoring Unit) is installed on the OptiX 155/622B, the OptiX 155/622, the OptiX 2500, the OptiX 2500+, the OptiX BWS 320G NE, and the OptiX 10G(Metro 5000). Both communication parties are connected permanently. In case the service route provides multiple service protections, different protection strategies can be selected as required. Protection strategy refers to the protection mode given the priority in use for the trail: protection, no protection, and extra traffic. Of the above, the protection preference is divided into trail protection and sub-network connection protection.

Power and environment monitoring unit

Power Monitor Unit

Private line Protection strategy

A-20

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Protection sub-network In the NMS, the protection sub-network becomes a concept of network level other than multiplex section rings or path protection ringsin the original NES or RMS+ NMS. The protection sub-network involves NEs and fiber/cable connections. In other words, the resources that form a protection sub-network include NEs and fiber/cable. Only after the NE is created, the basic configurations for the NE is done and the fiber & cable connections among NEs are correctly set up, enough resources can be available for the creation of a protection sub-network. These are the preconditions for creating a protection sub-network. From the viewpoint of logical system, the creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection sub-network, the optical interfaces (or VC4) of each board are mapped into the logical system, and then these independent logical systems are connected with one another to form a complete network structure. Protocol controller status Prototype trail Start or stop status of the protocol controller of the protection sub-network, including such statuses as not started, protocol start, protocol is starting, part start. The prototype trail is the server layer trail, and those listed are all server layer trails that satisfy the source/sink and board conditions. If the centralized route has been selected in the first step, only one prototype trail needs to be selected here. The system will automatically find out other trails whose routes are consistent with the selected prototype trail, and If the amount found can not meet the bandwidth requirement, the system will automatically copy the prototype trail. If the separated route has been selected in the first step, prototype trails as many as the number of bandwidths should be selected. Public Switched Telephone Network. Permanent Virtual Path. Pseudo Wire Pseudo-Wire Edge-to-Edge

PSTN PVP PW PWE3

A.16 Q
QoS Quality of Service.

A.17 R
RAS RDMS Remote Network Monitoring (RMON) RES Resource sharing Remote Access Server Relational Database Management System A manage information base (MIB) defined by the Internet Engineering Task Force (IETF). RMON is mainly used to monitor the data flow of one network segment or the entire network. Resume Resource sharing means that a physical resource may belong to two protection subnetworks.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-21

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Route

The IP route selection is in table driving mode. In each host and each router of the Internet, there is a routing table that contains information about how the service is transmitted from the source to the sink, providing a basis for route selection.? Ethernet static routing in ET1 refers to the mapping relationship between the Ethernet port and the bound path.? Its routing type includes port routing and VLAN routing.? Port routing: It means configuring a route between the Ethernet port and the bound path port, which is usually used for point-to-point networking communication;? VLAN routing: It means configuring a route between the Ethernet port and the bound path port based on the VLAN service. It can be used flexibly in point-to-point, point-to-multipoint or multipoint-tomultipoint communication. The implementation is to divide and converge the data stream according to the VLAN flag of the packet. As a VLAN flag can be added to the Ethernet port, the equipment can be applied more flexibly. The constraint conditions for calculating a route. When creating a trail, the user can specify the explicit route and the NEs that the trail cannot pass. The explicit route and the NEs are the constraints for calculating the route. The inevitable trail only functions when the number of routes is calculated as 1. Double-click the NE icon can set the NE as an NE that cannot be passed, and double-clicking it again can cancel the setting. Resilient Packet Ring. Regenerator Section The 25-pin interface standard that is defined by EIA. In the asynchronous transfer mode and there is no hand-shaking signal. It can communicate with RS232 and RS422 of other stations in point-to-point mode and the transmission is transparent. Its highest speed is 19. 2 kbit/s. The specification that defines the electrical characteristics of balanced voltage digital interface circuits. The interface can change to RS232 via the hardware jumper and others are the same as RS232. Rapid Spanning Tree Protocol Resource Reservation Protocol. Radio Transmission Node Rational Unified Process

Route restriction

RPR RS RS232

RS422

RSTP RSVP RTN RUP

A.18 S
S1 byte In an SDH network, each network element traces step by step to the same clock reference source through a specific clock synchronization path, thus realizing the synchronization of the whole network. If a clock reference source traced by the NE is lost, the clock of this NE will trace another clock reference source of lower level. To implement protection switching of clocks in the whole network, the NE must learn about the clock quality information of the clock reference source it traces. Therefore, ITU-T defines S1 byte to transmit the network synchronization status information. It uses the lower four bits of the multiplex section overhead S1 byte to indicate 16 types of synchronization quality grades. The specific coding information is shown in the following table. Auto protection switching of clocks in the synchronous network can be implemented by using S1 byte and following the certain switching protocol.

A-22

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Safe control switch

The APR/IPA safe switch is set in consideration of the long-span networking requirement, which cannot allow too low output optical power. If the safe control switch is turned off, APR/IPA restarting optical power is the specified output power of the OAU. Otherwise, the APR restarting optical power is restricted to less than 10dBm. Storage Area Network Single Directional Optical Supervising Channel Unit Dual Directional Optical Supervising Channel Unit System Control & Communication Unit System control & Communication Unit for Extended Subrack It is the text file describing the physical information and configuration information of the entire network, including the NE configuration file, port naming file, end-to-end configuration file, NE physical view script file, NMS information file and service implementation data script file. Sync Optical Channel Separator Board SD refers to signal degradation.? The multiplex section protocol defaults to start switching in case of signal loss.? In practice, signal degradation severely affects some services, so protection switching is needed. Or, you can turn off this trigger condition through the switch to avoid MS switching when the signal degrades. Synchronous Digital Hierarchy. SDH Network Node Interface. It is applied to build communications connection with the equipment beyond the NMS management area.? Usually, the NMS creates a protection sub-network by creating a logical system on the port of an idle line board, and the NE must be a TM without protection and fiber connection.? Though both the SDH NNI and the isolated node are implemented via the logical system, the isolated node is a logical system not belonging to any protection sub-network or SDH NNI. An isolated node satisfying specified conditions can be used to create an SDH NNI, and a node is independent when the SDH NNI is deleted from the network layer. SDH NNI is widely used in the 10GV2, because no tributary board is available. An SDH NNI should usually be created to support the E4 service. As no logical system is available in the 10GV2, the SDH NNI is fulfilled only on the NMS side, without providing the searching function. Search field refers to the range of IP addresses being searched. In the TCP/IP, the IP addresses include:Category A address (1.0.0.0---126.255.255.255). For example, 10.*.*.*, whose search field is 10.255.255.255, all 10.*.*.* to be searched. Category B address (128.0.0.0---191. 255. 255. 255). For example, 129.9.*.*, whose search field is 129.9.255.255, all 129.9.*.* to be searched.Category C address (192.0.0.0---223. 255. 255. 255). For example, 192.224.9.*, whose search field is 192.224.9.255, all 192.224.9.* to be searched.Category D address (224.0.0.0---230.255.255.255), which is reserved.Category E address (240.0.0.0---247.255.255.255), which is reserved.Net-id 127.*.*.*, in which .*.*.* can be any number. This net-ID is a local address. In this search mode, the NMS re-searches the trail data displayed by the current client according to the given search conditions, helping the customer find the trail data which interests him the most. Serial Line Interface Protocol, defines the framing mode over the serial line to implement transmission of messages over the serial line and provide the remote host interconnection function with a known IP address.

SAN SC1 SC2 SCC SCE Script file

SCS SD trigger condition

SDH SDH NNI

Search domain

Secondary filter trail

Serial Line Interface Protocol

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-23

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Serial port extended ECC Server layer trail and client layer trail

The ECC channel realized by means of serial port. There is an inclusion relation between the trails of different levels, e. g. a trail of a certain level contains multiple trails of lower levels. In such a structure, the upper level trail bearing another trail of lower level is called the server layer trail, while the lower level trail is called the client trail. In the 1600G system, it is the route of a service clock from the source to the sink.? The working route can be in the form of point-to-point or broadcast (That is, an input clock source corresponds to multiple output clock sources). When pass-through services are configured on the newly added nodes, the mode of highorder or low-order to pass through can be selected.? When the VC12 service over a VC4 exceeds a preset threshold, higher order cross-connect is selected, otherwise lower order cross-connect is selected. When the services are not VC12 ones, they shall be converted into VC12 equivalents. For example: if there are 2 VC3 and 4 VC12 services on a VC4, there should be 21*2+4 = 46 VC12 services. If the threshold value is 42, pass-through of this VC4 shall be made through higher order cross-connect. The payload loading indication is used to set the path of the tributary board. Usually it is used for path alarm suppression. When the tributary payload loading indication of this path is set as "Unloaded", alarms of this path related to the service can be suppressed. See Serial Line Interface Protocol Optical Supervisory Channel Unit Service Management Layer Secondary Metro Node Service Management System Simple Mail Transfer Protocol. Sub-Network Connection Multiple Protection See Sub-network connection protection Set the SNC node on the protection sub-network to support sub-network connection protection that spans protection sub-networks. The SNCP node of the ring sub-network can support electric circuit dually feed and selectively receive a timeslot out of the ring, thus implementing sub-network connection protection. The SNCP node is generally set on the node on the line board with the path protection type of the dual fed and selectively received. Sub-Network Management Layer Subnetwork Management System Synchronous Optical Network

Service clock working route Service configuration strategy

Service loading indication SLIP SMC SML SMN SMS SMTP SNCMP SNCP SNCP node

SNML SNMS SONET

A-24

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Spread type

The spread type of ATM service includes point-to-point (p2p) and point-to-multipoint (including p2mpRoot and p2mpLeaf). The p2p spread type supports real-time bidirectional communication service. The two communication parties are in the same status and participate the session actively. p2mpRoot and p2mpLeaf belong to the point-tomultipoint spread type. It supports point-to-multipoint multicast service. During the creation of a point-to-multipoint (multicast) connection, a connection to identify this group of connections is necessary. This connection is a p2mpRoot connection, while other connections are p2mpLeaf connections. If there is a p2mpLeaf connection in a group of connections, the p2mpRoot cannot be deleted. To create a multicast connection, the p2mpRoot connection must be created before the creation of p2mpLeaf connection. Shared Risk Link Group Synchronization Status Message Synchronous Transport Signal Sub-network is the logical entity in the transmission network and comprises a group of network management objects.? The network that consists of a group of interconnected or correlated NEs, according to different functions. For example, protection subnet, clock subnet and so on. A sub-network can contain NEs and other sub-networks.? Generally, a sub-network is used to contain the equipments which are located in adjacent regions and closely related with one another, and it is indicated with a sub-network icon on a topological view.? The NMS supports multilevels of sub-networks.? A sub-network planning can better the organization of a network view. On the one hand, the view space can be saved, on the other hand, it helps the network management personnel focus on the equipments under their management. Sub-network connection protection uses the 1+1 mode. SNCP is of 1+1 protection mode. Payloads are transmitted simultaneously on both the working and the protection subnetwork connections. When the working sub-network connection fails, or when its performance deteriorates to a certain level, at the receiving end of the sub-network connection, the signal from the protection sub-network connection is selected according to the preference rule. Switching usually takes the single-end switching mode, thus no protocol is needed It is used to differentiate the different network sections in the sub-network conference. Actually it is the first several digits (one or two) of the user phone number. An orderwire phone number is composed of the sub-network number and the user number. A type of topology object, which contains child submaps, nodes and connections. It is displayed in the topology view as the subnet icon. The number of bits in a network prefix, also called network mask. The subnet mask is used to divide a network into different network segments, so that communication can be done only within the same network segment. In this manner, broadcast storms are suppressed. According to the subnet mask and IP address, the IP network can be classified into three commonly used classes of subnets: class A subnets with 256*256*256 IP address resources subnetted by the mask 255.0.0.0, class B subnets with 256*256 IP address resources subnetted by the mask 255.255.0.0, and class C subnets with 256 IP address resources subnetted by the mask 255.255.255.0. SERVICE VLAN

SRLG SSM STS Sub-network

Sub-network connection protection

Sub-network number

subnet Subnet mask

SVLAN

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-25

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Switching priority

There may be the case that several protected boards need to be switched; thus the tributary board switching priority should be set. If the switching priority of each board is set the same, the tributary board that fails later cannot be switched. The board with higher priority can preempt the switching of that with lower priority. For the OptiX 155/622 and the OptiX 2500 equipment, there are three switching priorities: "Priority 1", "Priority 2", and "Priority 3". For the OptiX 2500+ equipment, the switching priority is classified into priorities 1 - 8, where priority 1 is the highest one, and priority 8 is the lowest one. For the OptiX 10G(Metro 5000), the highest switching priority is priority 1 and the lowest one is priority 5. It refers to the period of time between the start of detecting and the moment when the line is switched back to the original status after protection switching occurs in the MSP sub-network. Send the system time of the NMS server to NEs so as to synchronize all NEs with the server.

Switching restoration time Synchronize NE time

A.19 T
Tag/UnTag The Ethernet port that can recognize and send the packet with a 802.? 1Q tag header is called a Tag port; otherwise it is called an UnTag port. The port set as Tag can only recognize the packet with a 802.? 1Q tab header and will discard the packet without a 802.? 1Q tag header. The port set as UnTag processes the packet as an ordinary packet. Packets either with or without a 802.? 1Q tag headerscan pass through the port. For the packet with a 802.? 1Q tag header sent from the port, the UnTag port will remove its 802.? 1Q tag header, thus the packet with a 802.? 1Q tag header is converted into an ordinary packet. Unidirectional Optical Supervisory Channel And Timing Transporting Unit Bidirectional Optical Supervisory Channel and Timing Transmission Unit Time Compressed Multiplex Transmission Control Protocol/Internet Protocol Tone & Data Access Unit The TDA board can be configured with 1 - 12 two/four-wire audio interfaces (the rate is 64 kbit/s), or with 4 RS-232 and 4 RS-422 data interfaces (the maximum rate is 19.? 2kbit/s). The service added/dropped to/from these interfaces correspond to the time slots 1 - 20 of the NMS "Local 2M" (12 audio interfaces correspond to time slots 1 - 12 respectively, 4 RS-232s correspond to time slots 13 - 16 respectively and 4 RS-422s correspond to time slots 17 - 20). The TDA board occupies at least one 1 2Mbit/s, or at most 4 2Mbit/s (corresponding to 2M-1, 2M-2, 2M-3 and 2M-4 in the NMS). The corresponding time slot range of each 2M-1, 2M-2, 2M-3 and 2M-4 is 1-31. All TDA boards in the whole network can share 1 - 4 2Mbit/s, i.? e. the whole network occupies 1 - 4 2Mbit/s altogether. In order to send these tone signals and digital signals to the SDH network for transmission, it is necessary to cross-connect the local 2M (20 64 kbit/s payloads) and four 2M signals (2M-1, 2M-2, 2M-3 and 2M-4) added/dropped from the XCS- board. TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installed with the external TDA board for which the clock source must be set so that the TDA board can switch according to the set clock source sequence when clock source switching occurs.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

TC1 TC2 TCM TCP/IP TDA TDA board service

TDA clock source

A-26

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

TDA feeding selection

It can be selected whether the audio port of the SS42TDA board is in feeding mode or non-feeding mode. When the feeding mode is selected, two lines have -48V DC feeding. After the telephone set is connected and the audio service configured, the user can make a phone call without dialing. Generally, the feeding mode is configured during test so as to connect the telephone set for test. When the non-feeding mode is selected, the nonfeeding terminal (MODEM, for example) can be connected to transmit services. Tunable Dispersion Compensator See Traffic Engineering Trail trace Identifier Mismatch If the circuit is active at the moment when the charging time zone ends, this moment is the time of deactivating the charging data circuit. Otherwise, it is the general time of circuit deactivation. TeleManagement Forum. Telecommunications Management Network. The NMS topology is a basic component of the man-machine interactive interface. The topology clearly shows the structure of the network, the alarms of different NEs, subnetworks in the network, the communication status as well as the basic network operation status. Tributary Protection Switching The network congestion is a main factor that affects the backbone network performance. It may be caused by the insufficiency of network resource or the imbalanced load of network resource. Traffic engineering is a remedy to the congestion that results from imbalanced load. It monitors the network traffic and the load of network unit dynamically, modify the traffic management parameters, routing parameters and resource constraint on a realtime basis, optimizes the usage of network resource and avoid the congestion caused by the load imbalance.

TDC TE TIM Time of charging data circuit deactivation TMF TMN Topology

TPS Traffic Engineering

Traffic frame discard flag

It is the traffic frame discard control. Two options are provided: enable and disable. It indicates the means by which the NE discards cells when the network is congested. When the frame discard mark is closed, the cells will be discarded at the cell level; when it is opened, they will be discarded at the frame level. Here, "frame" refers to the AAL protocol data unit. A trail is a kind of transport entity, mainly engaged in transferring messages from the input of the trail source to the output of the trail sink, and monitoring the integrality of the transferred messages. According to the different levels of the trail, the trail includes various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12). Among them, OTS, OCH and OMS represent the trails in a DWDM layer network. For the ADM and TM equipment in the SDH network, each optical fiber connection corresponds to an SPI, RS or MS trail, and a trail is the general name for service carriers, including SDH and PDH services.

Trail

Trail consistency check Check whether the circuit route and the activation status of the NMS side and NE side are the same, clear the superfluous MOs and combine some of the circuits.? During network expansion, such an operation as adding fibers to the SDH NNI or configuring/ deleting services through the configuration layer will result in circuit inconsistency.

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-27

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Transmission media layer route Tributary loopback

It refers to the physical media such as optical fibers and NEs passed by the trail. A fault can be located for each service path by performing loopback to each path of the tributary board.? There are three kinds of loopback modes. 1. No loopback: It is the normal status. No loopback is needed when the equipment runs efficiently; 2. Outloop: When arriving at the line board after passing the input port in the local NE, the input signal is directly looped back to the service output end; 3. Inloop: The input signal is returned along the original trail from the tributary board of the target NE. Tributary Unit TU protection is of the equipment level and it uses one standby TU to protect n TUs. When the working protected board is faulty, e.? g. when board self-test fails, the board is pulled out, and the board power supply fails, etc.? , the SCC will send switching command, and the payload of the protected board can be automatically switched over to the specified protection board and the work will be accomplished by the protection board. After the fault is cleared, the service will be automatically switched to the original board. Switching priority can be set for each protected board to make the switching setting more flexible. Some operations in the tributary board protection switching will trigger some abnormal events.

TU TU 1: N protection

A.20 U
UAT UML Unavailable Time. Unified Modeling Language.

Unavailable time event It is also called Unavailable Time (UAT). A UAT event is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds. UNI Unprotected subnetwork UPC/NPC Upload UPS UPSR Usage Parameter Control/Network Parameter Control See User Network Interface It refers to a sub-network without any protection mechanism. The purpose of such configuration is to provide the basic data of trail protection for the subsequent trail management. See Usage Parameter Control/Network Parameter Control Report all or part of the configuration data of the NE to the NMS and overwrite the configuration data saved in the NE layer on the NMS side. Uninterrupted Power Supply. Unidirectional Path Switched Ring Usage Parameter Control/Network Parameter Control.During the communication, the UPC is implemented to monitor the actual traffic on each virtual circuit that is input to the network. Once the specified parameter is exceeded, measures will be taken to control. NPC is similar to the UPC in function. The difference is that the incoming traffic monitoring function is divided into UPC and NPC according to their positions. The UPC locates at the user/network interface, while the NPC at the network interface. A client user of the NMS. The user name and password uniquely identifies the operation rights of a user in the NMS.

User

A-28

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

User group

User set refers to the set of NMS users with the same management authorities. The default user group includes: system administrator, system maintainer, system operator and system supervisor. The attributes of user set include name and detailed description.

User Network Interface UNI is the abbreviation for User Network Interface. It identifies the interface between the user and the ATM network node.

A.21 V
V40 VB VC12, VC3 trail 40-channel Multiplexing Unit With VOA Virtual Bridge The channel rates of the VC12 trail and VC3 trail are respectively 2.048Mbit/s and 34.368Mbit/s.? The VC12 and VC3 trails are transparent channels (i.? e. circuit group) provided for circuit-layer network nodes (e.? g. a switch) in a path-layer network, and act as the basic unit of transport capacity among circuit-layer network node channels. Its server layer trail is VC4 server trail. The VC12 or VC3 trail is established on the basis of VC4 server trail, which can only be created after the VC4 server trail.? If the VC12 and VC3 trails only pass one VC4 server trail, lower order cross-connect is performed over the NEs at the two ends during the creation, the VC4 pass-through is configured over the intermediate NE. If the VC12 and VC3 trails pass multiple VC4 server trails, in addition to that mentioned above, lower order cross-connect is configured over the NE at the crosspoint of two VC4 server trails during the creation, thus making the VC12 and VC3 trails pass through. The fault of each VC4 path on the optical fiber can be located by setting loopback for each VC4 path of the line.? There are three kinds of loopback modes. 1. No loopback: It is the normal status. No loopback is needed when the equipment runs efficiently; 2. Outloop: When arriving at the line board after passing the input port in the local NE, the input signal is directly looped back to the service output end; 3. Inloop: The output signal is directly returned after passing the line board. The path rate of the VC4 server trail is 150.? 336Mbit/s.? The VC4 server trail provides transparent channels (i.? e. circuit group) for circuit-layer network nodes (e.? g. a switch) in a path-layer network, and acts as the basic unit of inter-office communication path. The VC4 server trail is the basis of the VC3 and VC12 trails. When the VC4 server trail is configured, only the higher order cross-connection of VC4 is generated in the intermediate NE, but no cross-connection is generated at the two ends, that is, no service is added/dropped. Therefore, the VC4 server trail is not a traditional service. It is only the basis for VC3 and VC12 trail creation. The created VC4 is a point-to-point service trail, only the source/sink NE can be specified instead of the source/sink port. See Virtual Chanel Connection Virtual Concatenation Group See Virtual Channel Identifier Veritas Cluster Server. Virtual Channel Connection. The VC logical trail that carries data between two end points in an ATM network.

VC4 loopback

VC4 Server Trail

VCC VCG VCI VCS Virtual Chanel Connection

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-29

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Virtual Channel Identifier

The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell or UNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicate a virtual connection. The identifier in the ATM (Asynchronous Transfer Mode) cell header that identifies to which virtual channel the cell belongs. When the standard virtual containers (including VC4/VC3/VC12/VC11) are incapable of carrying the volume of a SDH signal, the containers can be concatenated to function as a larger container. An emulation of the traditional leased line service. By emulating the leased line through the IP network, it provides asymmetric and low-cost "DDN" service. For end users of the VLL, it is similar to the traditional leased line. A technology used to realize the virtual work group by logically classifying the devices on a LAN into multiple network segments. Like a common NE, a virtual NE is also displayed with an icon on a view, but it is only an NE simulated according to the practical situation, which does not represents an actual NE. Therefore, the actual status of this NE cannot be queried and its alarm status cannot be displayed with colors.? Usually, when the trail management function is used for the NEs or sub-networks the NMS cannot manage, or the equipment is interconnected with other vendors NEs for service configuration, the end-to-end service configuration method and the trail management capability are provided. The VPC is shorted for Virtual Path Connection. The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bits in the UNI cell.The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which VP (Virtual Path) the cell belongs. An extension of the private network. A VPN contains shared links or encapsulated, encrypted, and authenticated links on the public network. A VPN can connect users or sites over the Internet. See Virtual Local Area Network Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes, and one NE can support up to 8K VLAN routes. See Virtual leased line Variable Optical Attenuator Unit. See Virtual Path Indentifier Virtual Private LAN Service. See Virtual private network Virtual Tributary Veritas Volume Replicator Veritas Volume Manager.

Virtual concatenation

Virtual leased line

Virtual Local Area Network Virtual NE

Virtual Path Connection Virtual Path Indentifier Virtual private network VLAN VLAN ID VLL VOA VPI VPLS VPN VT VVR VxVM

A.22 W
WAN Wide Area Network.

A-30

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

Wavelength path protection ring

The wavelength path protection ring comprises the working ring and the protection ring. Service signals are transmitted in the two rings in opposite directions. In the wavelength path protection ring, service signals from one node (such as node A) to another node (such as node C) are transmitted via the working ring and the protection ring at one time. Node C receives the signals from the two rings at the same time and selects the signal with higher quality. Similarly, the signals from Node C to Node A are transmitted along both the working ring and protective ring, and Node A selects the signal with higher quality. Wavelength path protection can protect optical fibers and equipments. It provides protection against optical fiber damages, wavelength conversion board failure, optical module failure, and optical amplifier failure. The restore time is less than 50ms.

Wavelength protection The wavelength protection group is important to describe the wavelength protection structure. Its function is similar to that of the protection sub-network in the SDH NE. group The wavelength path protection can only work with the correct configuration of the wavelength protection group. Wavelength protection A wavelength protection sub-network is a ring-chain structure used to describe sub-network wavelength protection, it is the basic network-level information. With the function similar to that of the protection sub-network in an SDH network, it is the basic networklevel data oriented to the user.? Create or delete a protection sub-network as required and set the parameters of the protection sub-network for the purpose of management on the network hierarchy. WBA WDM WDM path protection WDM Optical Booster Amplifier Unit Wavelength Division Multiplexing At the place where the signals are input to the DWDM equipment, the same channel of optical signals are input to two boards/ports of the WDM equipment respectively via two optical fibers. The two boards/ports are backed up mutually. When faults occur to the active path, the input terminal of the DWDM equipment will switch over to the standby path. This is the path protection switching function. If the detection shows that the active path signal recovers, the input terminal of the DWDM equipment will switch back to the active path when it meets the setting requirement. This is the path protection switching recovery function. WDM Access Node Work Station Function Wait-to-Restore Wavelength Cross Connection Protection

WMASN WSF WTR WXCP

A.23 X
XCS Cross-connect and Synchronous Timing Board

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

A-31

You might also like