Professional Documents
Culture Documents
Issue Date
02 2009-10-23
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.
Website: Email:
Copyright Huawei Technologies Co., Ltd. 2009. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided AS IS without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
Contents
About This Document.....................................................................................................................1 1 Customer Management.............................................................................................................1-1
1.1 Creating a Customer........................................................................................................................................1-3 1.2 Browsing Customer Information.....................................................................................................................1-3 1.3 Viewing Relevant Trails of a Customer..........................................................................................................1-3 1.4 Browsing Current Alarms of a Customer........................................................................................................1-4 1.5 Browsing History Alarms of a Customer........................................................................................................1-5 1.6 Modifying Customer Information...................................................................................................................1-6 1.7 Deleting a Customer........................................................................................................................................1-6 1.8 Viewing the Customers Affected by an Alarm...............................................................................................1-6 1.9 Specifying the Customer of a Service.............................................................................................................1-7
Contents
Contents
3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode.....3-41 3.1.10 Sample Application: Configuring an OCh Trail................................................................................3-45 3.2 Configuring EAPE........................................................................................................................................3-50 3.2.1 EAPE....................................................................................................................................................3-50 3.2.2 Creating an OCh Trail..........................................................................................................................3-54 3.2.3 Creating EAPE Objects........................................................................................................................3-56 3.2.4 Starting EAPE Adjustment...................................................................................................................3-57 3.2.5 Deleting EAPE Objects........................................................................................................................3-58 3.3 Managing Alarms on WDM Trails...............................................................................................................3-58 3.3.1 Viewing Current Alarms of a WDM Trail...........................................................................................3-59 3.3.2 Viewing History Alarms of a WDM Trail...........................................................................................3-59 3.3.3 Managing Networkwide WDM Alarm Trails in Real Time................................................................3-60 3.4 Managing the Performance of WDM Trails..................................................................................................3-60 3.4.1 Querying Current Performance of WDM Trails..................................................................................3-61 3.4.2 Browsing the History Performance of WDM Trails............................................................................3-61 3.4.3 Setting Performance Monitoring Parameters of an WDM Trail..........................................................3-62 3.4.4 Setting WDM Trail Performance Threshold........................................................................................3-63
Issue 02 (2009-10-23)
iii
Figures
Figures
Figure 3-1 Trail....................................................................................................................................................3-4 Figure 3-2 OSC Trail............................................................................................................................................3-4 Figure 3-3 ODUk (k = 1, 2, ...) trail.....................................................................................................................3-5 Figure 3-4 ODUk (k = 0, 1, 2, ...) trail.................................................................................................................3-5 Figure 3-5 40G inverse multiplexing trail ...........................................................................................................3-6 Figure 3-6 10G inverse multiplexing trail ...........................................................................................................3-7 Figure 3-7 A conflict trail generated because a fiber is added.............................................................................3-8 Figure 3-8 A conflict trail generated because a single station cross-connection is lost.......................................3-8 Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis........................3-8 Figure 3-10 Creating trails by trail search..........................................................................................................3-10 Figure 3-11 Creating trails in the automatic mode.............................................................................................3-11 Figure 3-12 Network Design..............................................................................................................................3-42 Figure 3-13 Station A.........................................................................................................................................3-42 Figure 3-14 Station B.........................................................................................................................................3-43 Figure 3-15 Station C.........................................................................................................................................3-43 Figure 3-16 Station D.........................................................................................................................................3-43 Figure 3-17 Network design...............................................................................................................................3-46 Figure 3-18 NE panel on station A.....................................................................................................................3-47 Figure 3-19 Signal flow of the trail from station B to station C........................................................................3-47 Figure 3-20 Signal flow of the trail from station B to station D........................................................................3-48 Figure 3-21 Signal flow of the trail from station D to station B........................................................................3-48 Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source.................................3-52 Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources .............................................................................................................................................................................3-53 Figure 3-24 Scenario of the dual VOA units with the OLP protection units.....................................................3-53
Issue 02 (2009-10-23)
Tables
Tables
Table 3-1 ODUk rate level...................................................................................................................................3-3 Table 3-2 Comparison of methods for creating trails...........................................................................................3-9 Table 3-3 Network data table.............................................................................................................................3-46 Table 3-4 The versions of the equipment and U2000 that support the EAPE function.....................................3-51
Issue 02 (2009-10-23)
vii
Related Version
The following table lists the product version related to this document. Product Name iManager U2000 Version V100R001C00
Intended Audience
The intended audiences of this document are:
l l l l
Network Monitoring Engineer Data Configuration Engineer NM Administrator System Maintenance Engineer
Organization
This document is organized as follows. Chapter 1 Customer Management 2 Managing WDM Protection Subnets Description This chapter describes how to manage and maintain the customer information. This chapter describes how to manage WDM protection subnets.
1
Issue 02 (2009-10-23)
Description This chapter describes end-to-end WDM management. This part lists the glossary and abbreviations used in the document.
Conventions
Symbol Conventions
The following symbols may be found in this document. They are defined as follows. Symbol Description
DANGER
Indicates a hazard with a high level of risk which, if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury. Indicates a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results. Provides additional information to emphasize or supplement important points of the main text. Indicates a tip that may help you solve a problem or save you time.
WARNING
CAUTION
NOTE
TIP
General Conventions
Convention Times New Roman Boldface Description Normal paragraphs are in Times New Roman. Names of files, directories, folders, and users are in boldface. For example, log in as user root. Book titles are in italics. Terminal display is in Courier New.
Issue 02 (2009-10-23)
Command Conventions
Convention Boldface Italic [] { x | y | ... } [ x | y | ... ] Description The keywords of a command line are in boldface. Command arguments are in italic. Items (keywords or arguments) in square brackets [ ] are optional. Alternative items are grouped in braces and separated by vertical bars. One is selected. Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. Optional alternative items are grouped in square brackets and separated by vertical bars. A maximum of all or none can be selected.
{ x | y | ... } *
[ x | y | ... ] *
GUI Conventions
Convention Boldface Description Buttons, menus, parameters, tabs, window, and dialog titles are in boldface. For example, click OK. Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder.
>
Keyboard Operation
Format Key Key 1+Key 2 Description Press the key. For example, press Enter and press Tab. Press the keys concurrently. For example, pressing Ctrl+Alt+A means the three keys should be pressed concurrently.
Issue 02 (2009-10-23)
Description Press the keys in turn. For example, pressing Alt, A means the two keys should be pressed in turn.
Mouse Operation
Action Click Double-click Description Select and release the primary mouse button without moving the pointer. Press the primary mouse button twice continuously and quickly without moving the pointer. Press and hold the primary mouse button and move the pointer to a certain position.
Drag
Update History
Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions.
Issue 02 (2009-10-23)
1 Customer Management
1
About This Chapter
Customer Management
By using the U2000, you can manage and maintain the customer information as required. 1.1 Creating a Customer You can create customer information as required, so that you can set a specific customer and a maintenance network for the trail. 1.2 Browsing Customer Information By browsing customer information, you can know the name, legal representative and contact modes of the relevant customer of the service. 1.3 Viewing Relevant Trails of a Customer In a normally running network, the trail is the carrier of the customer service and is the resource of the customer. In the network management, knowing the trails of different customers is very helpful to take care of the interests of different customers. 1.4 Browsing Current Alarms of a Customer Each customer has a number of services that can report alarms when they run in the network. These alarms show the current status of the service. For this reason, you must query the current alarms of the customer. 1.5 Browsing History Alarms of a Customer By querying the history alarms of a customer, you can learn about the long-term status of the services that run in the network. When maintaining the services of the customer, you can use the history alarm information for reference. 1.6 Modifying Customer Information If the customer information such as contact mode is changed, you need to modify the customer information in time. 1.7 Deleting a Customer The information of customers with whom contracts are fulfilled must be deleted. This operation ensures that the customer information is not disclosed, and decreases the redundant information in the database. 1.8 Viewing the Customers Affected by an Alarm
Issue 02 (2009-10-23)
1-1
1 Customer Management
When an alarm occurs on a service, you need to query the customers that are affected by the alarm. According to the query result, you can determine whether to notify the customer of the alarm. 1.9 Specifying the Customer of a Service When creating and modifying a service, you need to specify the customer that the service belongs to. This can facilitate the trail management.
1-2
Issue 02 (2009-10-23)
1 Customer Management
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Management window is displayed. Step 2 Click Create, the Create Customer window is displayed. Step 3 According to actual requirements, fill in the new customer information, such as Customer Name, Legal Representative, and Phone. Step 4 Click OK, the new customer information field is displayed in the customer list. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu. In the Customer Management window, all customer information is displayed. Step 2 Optional: If the customer information is changed, you can click Refresh to browse the changed customer information. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-3
1 Customer Management
Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The information of all customers is displayed in the Customer Management window. Step 2 You can view the SDH/WDM/Ethernet/ATM trails seperately. l l l l Right-click a record of customer information, and choose Browse Relevant Trails > SDH Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > WDM Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > Ethernet Trail from the shortcut menu. Right-click a record of customer information, and choose Browse Relevant Trails > ATM Trail from the shortcut menu.
The SDH/WDM/Ethernet/ATM trails of the customer are displayed in the SDH/WDM/ Ethernet/ATM Trail Management window. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Managementdialog box displays the information about all the customers. Step 2 You can view the SDH/WDM/Ethernet/ATM current alarms separately. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH Current Alarm. Right-click a customer and choose Browse Relevant Alarms > WDM Current Alarm. Right-click a customer and choose Browse Relevant Alarms > Ethernet Current Alarm. Right-click a customer and choose Browse Relevant Alarms > ATM Current Alarm.
The current SDH/WDM/Ethernet/ATM service alarms of the customer are displayed in the Current Alarms dialog box. Step 3 To display the latest alarms, select the Display latest alarms check box in the bottom-left corner.
NOTE
This check box is similar to the refresh function. After you select this check box, theRefresh button is unavailable.
Step 4 Optional: Right-click one or more alarms, and select Check from the short menu to check the selected alarms.
1-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
1 Customer Management
The check function means that one or more currently unterminated alarms on the U2000 are compared with those on the NE side. If the alarm is found among the current alarms on the NE side, it is not modified on the U2000 side. Otherwise, terminate it on the U2000 side.
Step 5 Select an alarm. The detail information and reason of the alarm are displayed in the following list. Step 6 Optional: Select one or more alarms. Click Acknowledge to display the Acknowledge Alarms dialog box. Step 7 Optional: Click Yes. The Ack Time, Ack Status and Ack User columns of the selected alarm shows the relevant values.
NOTE
Step 8 Optional: Select one or more alarms, and then click Delete. In the Delete the Alarms prompt box, click Yes. The progress bar is displayed for the operation of deleting the alarms. Step 9 Optional: Click Print or Save As to output the alarm data. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu. The Customer Management dialog box displays the information about all the customers. Step 2 You can view the SDH/WDM/Ethernet/ATM history alarms separately. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH History Alarm. Right-click a customer and choose Browse Relevant Alarms > WDM History Alarm. Right-click a customer and choose Browse Relevant Alarms > Ethernet History Alarm. Right-click a customer and choose Browse Relevant Alarms > ATM History Alarm.
The history alarms of the SDH/WDM/Ethernet/ATM service are displayed in the History Alarms dialog box. Step 3 Optional: Select an alarm. The detail information and reason of the alarm are displayed in the following list. Step 4 Optional: Click Print or Save As to output the alarm data. ----End
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-5
1 Customer Management
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. Step 2 Select a customer from the customer list, edit the customer information, and then click Apply. Step 3 The Operation Result prompt box is displayed. Click Close. ----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. Step 2 Select the customer to be deleted. Click Delete. In the Warningdialog box, select Yes.
NOTE
Deleting the customer does not affect the information of the trails and alarms that are related to the customer.
Step 3 The Operation Result prompt box is displayed. Click Close. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
1-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
1 Customer Management
Procedure
Step 1 Choose Fault > Browse Current Alarm or Fault > Browse History Alarm from the main menu. The window of viewing alarms is displayed. Step 2 Right-click an alarm and choose Alarm Affected Customers from the shortcut menu.
NOTE
You can query the customers affected by only the alarms that occur on trails.
Step 3 In the Customer Management window, view the information about the customers that are affected by the alarm. ----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Context
For WDM trails, you can not specify the customers of OTS, OMS, OSC level trails.
Procedure
Step 1 Choose Service > SDH Trail > SDH Trail Management, Service > WDM Trail > WDM Trail Management, Service > MSTP ATM Trail > ATM Trail Management, Service > MSTP Ethernet Trail > Ethernet Trail Management, Service > PTN Service > L3VPN Service Management, Service > PTN Service > L2VPN Service Management, Service > PTN Service > CES Service Management, or Service > PTN Service > ATM Service Management from the main menu. Step 2 In the trail management window, double-click a trail. In the Details window, select the required customer. Step 3 Click OK. ----End
Issue 02 (2009-10-23)
1-7
Issue 02 (2009-10-23)
2-1
The configuration is incorrect at the NE side. The fiber that should be connected to the node is not created on the U2000.
Prerequisite
l l
You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet and click Next.
NOTE
If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.
Step 3 Click Search to start the search. The Subnet Name, Consistent Status and Subnet Type parameters of the searched protection subnet are automatically displayed.
NOTE
If there are isolated nodes searched out, you can delete the nodes that do not form any protection subnet. Refer to 2.6 Deleting Isolated Nodes.
Step 4 Click Finish. The searched protection subnet is displayed in the Main Topology. ----End
Prerequisite
l l l l l
You must be an NM user with "NE operator" authority or higher. Fibers must be correctly created, and all internal and external fibers must be correctly connected. An OCP board and two or more OTU boards of same kind must be created. Applies to the OptiX BWS 1600G, OptiX BWS 320GV3, OptiX BWS 1600G OLA and OptiX BWS 1600S. Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA).
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > 1:N Optical Channel Protection from the Function Tree. Step 2 Click Query to query the information about the protection from the NE. Step 3 Click New. The Create dialog box is displayed. Step 4 Double-click the Number of Working Channels field, and choose the proper number from the drop-down list. For other parameters, refer to 1:N Optical Channel Protection. Step 5 Double-click the OTU Optical Interface Number field corresponding to the Protection Channel of the Working Channel-1. Set the optical interface number of each working channel in a similar way. Double-click Protection Priorities of Protection Channel, and set the priority based on the actual requirement.
2-4
Issue 02 (2009-10-23)
l l l
OTUs that serve as the working and protection channels must be configured on the same NE. Every board in this protection group and the OCP board must be set in the same shelf. If you need to check the consistency of the parameters, you need to set Parameter Consistency Check Flag to a proper value.
Step 6 Click OK. The created 1:N (N8) optical channel protection group is displayed. Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N8) wavelength protection group of the opposite NE. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. Applies to the OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX BWS 1600S and the OptiX BWS 320GV3. Applies to the LWF, LWFS, LWS, LWC, LWC1, LBE, LBES, LBF, LBFS boards. Fibers must be created properly. The 1:N wavelength protection group must be created. The WDM trail must be created and the bidirectional client trail must be searched out.
l l l l
Background Information
For two NEs that are preconfigured as a 1:N WDM protection subnet, the protection group IDs of the WDM protection groups on the NEs must be consistent.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 Click Next to perform the consistency check of the subnet. Step 3 Click Search to search for the protection subnet. The existing 1:N wavelength protection subnet is displayed in the Protection View.
Issue 02 (2009-10-23)
2-5
Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. Step 5 Click Finish. ----End
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection subnet must be searched out. Applies to the OptiX BWS 1600G, OptiX BWS 1600S and the OptiX BWS 320GV3.
Context
CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform this operation.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Select a protection link, right-click, and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes user interface is displayed. Click the Protection Subnet Parameters tab.
2-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Step 3 Set parameters for the protection subnet. Step 4 Click Apply. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection group must be searched out.
Context
CAUTION
Performing protection switching may interrupt services.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet.
NOTE
Step 4 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. l To perform a manual switching, click East or West and select Manual Switching from the drop-down menu. Then, select the channel that services are switched to according to the OCP optical swtich number. To perform a forced switching, click East or West and select Forced Switching from the drop-down menu. Then, select the channel that services are switched to according to the OCP optical swtich number.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.
Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-7
Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the 1:N wavelength protection subnet. Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then select Clear from the drop-down menu to clear the switching on each node. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End
Prerequisite
You must be an NM user with "NE operator" authority or higher. Currently, The ODU1/ODU2-level protection can be achieved. When configuring the ODUk SPRing protection of ODU1 or ODU2 levels, the Service Mode of the port on the line board should be set to ODU1 or ODU2.
2-8 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Background Information
l
When the protection channel forms a ring, you can search out an ODUk protection subnet at the network layer. The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the Function Tree. Step 2 Click New. The New ODUk Ring Network Protection dialog box is displayed. Step 3 Set Protection Group ID and Level as required. In the Select Mapping Direction area, set the West Working Unit, West Protection Unit, East Working Unit, and East Protection Unit. To set a unit, select one channel from the Available Channel and click .
NOTE
l l l
The services in the east and west directions must be configured on different NS2/ND2 boards. The working and protection channels in the east and west directions of an ODUk protection group can be on different NS2/ND2 boards. You can create a protection group when the Selected Channel contains at least East Protection Unit and West Protection Unit.
Step 4 Click OK. After successful operation, click Close in the Operation Result dialog box. Step 5 Select one protection group. In Channel Mapping Relation, select West Working Unit and East Working Unit. Right-click them, and select Bound Span ID.
NOTE
l l
Before binding the span IDs, ensure that a bidirectional cross-connection is created successfully between the working unit in the protection group in the corresponding direction and the add/drop board. The span IDs need be bound only on the stations that add or drop services. In the case of those stations that do not add or drop services, you need not perform such an operation.
Step 6 In the Bound Span ID window, set Span ID, and then click OK. Span ID will be updated.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-9
Step 7 Select one protection group. Right-click the Management Node, and select YES. Then click Apply. Management Node will be updated. Step 8 Select one protection group, and you can set parameters such as WTR Time(s) and Enable SD. In Channel Mapping Relation, double-click the Hold-Off Time(s) and set the hold-off time. For related parameters, refer to 2.4.5 ODUk Ring Network Protection.
NOTE
The hold-off time of the protection unit should be longer than that of the working unit.
Step 9 In the case of the NEs in other stations on the ring, start the NE Explorer. Then, refer to Steps 1 through 8 to create the ODUk SPRing protection on the local NE, to complete the creation of the protection ring.
NOTE
In a ODUk SPRing protection group, there must be only one management node.
Step 10 After the protection ring is created, select one protection group, and click Start Protocol to make the protection group take effect. Step 11 Optional: Select one protection group and click Delete. Click OK on the Confirm dialog box displayed. The protection group is deleted. ----End
Prerequisite
l l l l l
You must be an NM user with "network operator" authority or higher. Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I. Fiber connections must be created. All internal and external fibers are correctly connected. The bidirectional server trail must be searched out. An ODUk protection group must be created.
Context
NOTE
The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trail exists between the ports of adjacent protection groups.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Step 2 Click Next to check consistency of the protection subnet. Step 3 Click Search to search for the protection subnet. The ODUk SPRing protection subnet that is searched out is displayed.
2-10 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. Step 5 Click Finish. ----End
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. Applies to the OptiX OSN 3800, OptiX OSN 6800 and OptiX OSN 8800 I. The ODUk SPRing protection subnet must be searched out.
Context
CAUTION
Changing the protection mode may interrupt services. Exercise caution when you perform this operation.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click a protection link and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes user interface is displayed. Click the Protection Subnet Parameters tab. Step 3 Click Query to query the parameters of the protection subnet from the NE side. Step 4 Set the WTR Time(s), SD Condition, and Management Node as required. Step 5 Optional: Click Calculate Span ID. The calculated span ID is displayed in the Span ID field. Step 6 Click Apply. After the operation succeeds, click Close in the Operation Result dialog box. Step 7 Click Close to return to the Protection View. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The ODUk SPRing protection subnet must be searched out.
Context
CAUTION
The protection switching may affect the services or the functions that are already configured.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnet from the NE.
NOTE
Step 4 Perform the manual, forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. l l l To perform a manual switching, click East or West and select Manual Switch to Protection-Ring from the drop-down menu. To perform a forced switching, click East or West and select Forced Switch to ProtectionRing from the drop-down menu. To perform a exercise switching, click East or West and select Exercise-Ring from the drop-down menu.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.
Step 5 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the ODUk SPRing protection subnet. Step 7 Select all nodes in the protection subnet one by one. Click East or West, and then select Clear All from the drop-down menu to clear the switching on each node. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End
2-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Navigation Path
In the NE Explorer, select an NE and choose Configuration > ODUk SPRing from the Function Tree.
Buttons
Button Start Protocol Stop Protocol Query New Add Working Unit Delete Working Unit Delete Apply Description Starts the automatic protection switching protocol. Stops the automatic protection switching protocol. Queries the ODUk protection group from the NE. Creates an ODUK ring network protection. Adds working units of the ODUK ring network protection. Deletes working units of the ODUK ring network protection. Deletes the protection group. Applies the configuration of the ODUk protection group to the NE.
Manual Switching-Ring
Issue 02 (2009-10-23)
2-13
Description Simulates the switching operation. It is not a real switching. By simulating the switching, you can test the multiplex section protection function of the ring network, without interrupting services. Clears all the switching.
Clear
Parameters
Field Protection Group ID Level Switching Status Value 1-65535 ODU1, ODU2 Unknown, The protocol is not started, The protocol is to be started, Idle, East Switching, West Switching, Full Pass-Through, APS Byte Pass-Through Description Displays the ID of the protection group. Displays the level of the protection group. Displays the switching status of the protection group.
2-14
Issue 02 (2009-10-23)
Value
l l l l
Unknown Locked Protection SF SF Ring Switching Working SF Protection SF SF Ring Switching Working SD Protection SF SF Ring Switching Working SF Protection SD SF Ring Switching Working SF Protection OK Forced Switching - Ring Protection SD SD Ring Switching Working SD Protection SD SD Ring Switching Working SD Protection OK Manual Switching - Ring WTR - Ring Switching Exercise Switching - Ring No Request
l l l
l l l l
Near-End: Indicates the local node, that is, the transmit end of the service. Remote-End: Indicates the west adjacent node, that is, the respond end of the service.
Issue 02 (2009-10-23)
2-15
Near-End: Indicates the local node, that is, the transmit end of the service. Remote-End: Indicates the west adjacent node, that is, the respond end of the service.
WTR Time(s)
Indicates the time interval between the time when the working service is detected to be normal after switching and the time when the service is switched back to the working path. Click WTR Time (ODUk SPRing Protection) for more information.
Enable SD
Enabled, Disabled
Displays whether the SD enable flag is enabled. Click Enable SD (ODUk SPRing Protection) for more information.
Yes, No West Working Unit, West Protection Unit, East Working Unit, East Protection Unit For example: 12-NS2-1(IN/ OUT)-ODU1:1
Displays whether it is the management node. Displays the east working unit, west working unit, east protection unit and west protection unit. Displays the east working channel, west working channel, east protection channel and west protection channel. Displays the span ID. Displays the channel status. Displays the hold-off time.
Channel Mapping
1-31 Normal, SF, SD, Unmonitored, Unknown Working Unit: 0.0-10 Protection Unit: 0.5-10 Default value: Working Unit: 0, Protection Unit: 0.5
2-16
Issue 02 (2009-10-23)
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The protection subnet must be created.
Procedure
Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet. The Search Protection Subnet dialog box is displayed.
Issue 02 (2009-10-23)
2-17
You need to select the Protection check box on the upper right corner of the Main Topology in advance.
Step 2 Set the search condition and enter the keyword. Step 3 Click Search and the protection subnet that is searched out is highlighted in the Network View. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The protection subnet must be searched out.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click a protection link, and choose Protection Subnet Attributes from the shortcut menu. The Protection Subnet Attributes window is displayed. Click the Resource Description tab. Step 3 Click Query to query the usage of the protection subnet resources. ----End
2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet
You can run an external switching command to perform or clear the switching for a 1:N wavelength protection subnet. External switching commands include: forced switching, manual switching, and lockout. In the deployment and commissioning, you can perform switching to test whether the 1:N wavelength protection switching works properly. In the fault maintenance, you can perform this operation to locate faults.
Prerequisite
l l l l l l
You must be an NM user with "network operator" authority or higher. The 1:N wavelength protection group must be searched out. Applies to the OptiX BWS 1600G, OptiX BWS 1600S and OptiX BWS 320GV3. Applies to the LWF, LWFS, LWC1, LBE, LBES, LBF and LBFS boards. Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA). Applies to the LWF, LWFS, LWC1, LBE and LBES boards.
2-18
Issue 02 (2009-10-23)
Context
CAUTION
Force switching and manual switching may interrupt services.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet. Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the dropdown menu.
NOTE
If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu.
Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. l l To perform a manual switching, click East or West and select Manual Switching from the drop-down menu. To perform a forced switching, click East or West and select Forced Switching from the drop-down menu.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select east and west direction at the same time.
Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or Lock West, and select Lockout of Protection. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 9 Optional: To clear protection switching, select a node, click East or West, and then select Clear from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End
ring switching works properly. During the fault maintenance, you can perform this operation for fault location.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The ODUk ring protection subnet must be searched out.
Context
CAUTION
The protection switching may affect the services or the functions that are already configured.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. Step 2 The Protection Subnet Attributes window is displayed. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 3 Click Query to query the statuses of protocol controller, east, and west of the protection subnet from the NE. Step 4 To enable or disable the protocol, click Start Protocol and select Start or Stop from the dropdown menu.
NOTE
If you want to enable or disable the protocol for the entire protection subnet, select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu.
Step 5 Perform the manual, forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. l l l To perform a manual switching, click East or West and select Manual Switch to Protection-Ring from the drop-down menu. To perform a forced switching, click East or West and select Forced Switch to ProtectionRing from the drop-down menu. To perform a exercise switching, click East or West and select Exercise-Ring from the drop-down menu.
NOTE
When performing the switching, maintenance or lockout on a node, you cannot select East and West at the same time.
Step 6 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. Step 7 Optional: Perform the lockout operation. Select a desired node, click Lock East or Lock West, and select Lockout of Protection-Ring. Step 8 Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK.
2-20 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Step 9 Optional: To clear protection switching, select a node, click East or West, and then select Clear All from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. A prompt is displayed, indicating that the operation is successful. Click OK. ----End
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. One or more isolated nodes must exist. Applies to the isolated node which node type is ODUk SPRing.
Context
CAUTION
Deleting isolated nodes may interrupt services. Exercise caution when you perform this operation.
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Isolated Node Management from the Main Menu. Step 2 Select the isolated node you want to delete, right-click and choose Delete. Step 3 Click Yes in the confirmation dialog box. ----End
Prerequisite
You must be an NM user with "network maintainer" authority or higher.
Context
NOTE
The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercise caution before this operation.
Issue 02 (2009-10-23)
2-21
Procedure
Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM or Delete from the NE or Delete All from the NM from the short-cut menu.
NOTE
Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE side, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE and does not affect the services. The deleted protection subnet can be located by using the search feature. The U2000 locates it according to the NE layer protection information. Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic in the protection subnet. The deleted protection subnet cannot be restored without being created again. Delete All from the NM: Deletes data other than fibers in the network layer. The deleted protection subnet can be located by using the search feature. It is recommended that you do not select this option, as a large amount of data can be deleted.
l l
If Delete from the NE is selected, you need to confirm the operation once more.
Step 4 After completion, click Close in the dialog box displayed to complete the operation. ----End
2-22
Issue 02 (2009-10-23)
3
Prerequisite
The trail management license must be provided for the U2000. 3.1 Managing WDM Trails This section describes how to manage end-to-end WDM services based on the trail management function of the U2000. 3.2 Configuring EAPE The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. By adjusting the optical power of a WDM trail, the EAPE can reduce or even eliminate bit errors of services on the trail. 3.3 Managing Alarms on WDM Trails You can use the U2000 function of end-to-end trail management to manage the alarms generated on WDM trails at the network layer. 3.4 Managing the Performance of WDM Trails You can use the network layer function of the U2000 to perform end-to-end performance management on WDM trails.
Issue 02 (2009-10-23)
3-1
If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at the NE layer, this trail is a conflict trail. 3.1.1.3 Trail Creation Method The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. 3.1.1.4 Process for Creating a Trail The trail creation process describes a series of procedures before a trail is generated on the U2000. The detailed process varies with the creation method.
Client trail ODUk trail: optical channel data unit (ODUk) trail OTUk trail: optical channel transport (OTUk) unit trail OCh trail: optical channel trail OMS trail: optical multiplexing section trail OTS trail: optical transmission section trail OSC trail: optical supervisory channel (OSC) trail
NOTE
l l l
The first six types are related to services, and the OSC trail is related to supervisory signals. The OTS trail cannot be deleted from the U2000. You must delete the fiber connection before deleting the OTS trail. The rate level varies with the value of "k" in ODUk/OTUk. For details, see Table 3-1. ODU5G/OTU5G is a level customized by Huawei.
Table 3-1 ODUk rate level Trail Level ODU0 ODU1/OTU1 ODU5G/OTU5G ODU2/OTU2 ODU3/OTU3 Rate (bit/s) 1.25G 2.5G 5G 10G 40G
Issue 02 (2009-10-23)
3-3
Trail Module
Figure 3-1 and Figure 3-2 illustrate the relationship and location of the trails. Figure 3-1 Trail
Client ODUk OTUk OCh OMS
OTS OTS OTS
TM
RM
TM
RM
OSC
OSC
OSC
OTM
FIU
FIU
OLA
FIU
FIU
OTM
ODUk Trail
Different from other trails, an ODUk/OTUk sets the source and sink at the internal ports of an OTU board, a tributary board or a line board. Figure 3-3 displays a typical ODUk trail module whose source and sink are set on the internal ports of tributary ports or of line boards.
3-4
Issue 02 (2009-10-23)
OUT
IN
O T U 2
O D U 2
OCh Trail
In the case of the client-side service whose rate is less than 1.25 Gbit/s, an ODU0 trail is added, as shown in Figure 3-4. Figure 3-4 ODUk (k = 0, 1, 2, ...) trail
52TOM GE RX1
ODU0 LP1 O D U 1
52NS2
ODU1
52NS2
ODU1
52TOM
LP1 O D U 1 ODU0
GE TX1
O D U 2
O T U 2
OUT
IN
O T U 2
O D U 2
OCh Trail OTU2 Trail ODU2 Trail ODU1 Trail ODU0 Trail Client Trail
Issue 02 (2009-10-23)
3-5
the four ODU1 signals, the 10G service share an ODU2 trail with other ODU1 signals. This saves line resources. Figure 3-6 shows the inverse multiplexing trail model of the IP3 port on the TDX board. A 10G service is an Ethernet service for which you can dynamically adjust bandwidth. The server layer allows one, two, three or four ODU1 trails. Hence, the client trail that you search out is of different rate levels. Figure 3-6 10G inverse multiplexing trail
Cause
A trail consists of a single station cross-connection at the NE layer. If the configuration data at the NE layer changes and a complete trail cannot be formed at the network layer, the trail that exists on the U2000 is a conflict trail, and the corresponding cross-connection at the NE layer becomes a discrete service.
l
Adding a fiber leads to trail extension. Assume that a trail is NE A-> NE B. Create a fiber from NE B to NE C, and create a service on NE C. As a result, the trail is extended as NE A->NE C. The trail NE A-> NE B that exists on the U2000 becomes a conflict trail. See Figure 3-7.
Issue 02 (2009-10-23)
3-7
NE A
NE B
NE C
The single station cross-connection is lost. The original trail is NE A-> NE C. The cross-connection of the trail on NE B is deleted. On the U2000, the original trail of NE A-> NE C becomes a conflict trail and services on NE A and NE C become discrete services. See Figure 3-8. Figure 3-8 A conflict trail generated because a single station cross-connection is lost
NE A
NE B
NE C
Delete a protection service on a per-NE basis. NE 1 and NE 2 comprises a 1+1 linear protection and the original trail is NE 1-> NE 2. If cross-connection D of NE 2 is deleted, the original trail of NE 1-> NE 2 becomes a conflict trail. See Figure 3-9. Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis
Cross-Connection A Working Trail Cross-Connection C
Cross-Connection B NE1
Protection Trail
Cross-Connection D NE2
Handling Method
During trail search, if the U2000 searches out a conflict trail, the U2000 stops the searching and asks you to confirm the conflict trail. There are the following two handling methods:
l
Stop searching. If you fail to verify that the conflict trail is correct, you can choose to stop searching. The conflict trail remains, but the U2000 does not generate a new trail.
3-8
Issue 02 (2009-10-23)
Continue to search. The system deletes the conflict trail from the network layer. This operation does not delete the cross-connection on a per-NE basis, and does not affect services on the NE.
NOTE
After the conflict trail is deleted, its customized information, including the trail name, user, and remarks, is permanently lost and cannot be restored.
All the NEs that the trail passes through must have enough idle resources. The data on the U2000 must be consistent with the data on the NE. The fibers on the U2000 are correctly connected.
Table 3-2 shows the methods, features, and application scenarios of the trail creation. Table 3-2 Comparison of methods for creating trails Trail Creation Method Feature Application Scenario This method is applicable to the scenario that the service is already configured on a perNE basis. This method requires better technical knowledge of users. During the search, users may need to handle conflict trails and discrete services. This method is applicable to the creation of a majority of normal trails.
Creating trails by trail search On a per-NE basis, configure all nodes that a service passes through. Then, by using the network-layer trail search function, combine crossconnections of each node to form end-to-end trails.
The service is configured directly at the network layer. After the activation of the trail, the U2000 deliver the crossconnections related to the trail to all NEs involved. The route can be computed automatically. If multiple routes exist between the selected source and sink, you can set the compulsory link, the prohibited node to select a route.
Issue 02 (2009-10-23)
3-9
Search out trails at the server layer and then the client layer
Check whether discrete services that do not form trails exist Y N The information about discrete services is displayed
End
3-10
Issue 02 (2009-10-23)
Check whether the server trail for the trail to be created exists Y Set trail attributes, such as the direction, level, and rate
Set route restriction conditions related to the node, link, and timeslot (optional)
Whether to set the trail as an SNCP trail N Set basic attributes for the trail
End
to search for the data of cross-connections and fiber connections over the network to generate end-to-end WDM trails at the network layer of the U2000. 3.1.2.2 Discrete Service Causes and Handling Measures After trail search, discrete services are usually caused by the following factors, which are unsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrong configuration of cross-connections.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. Fiber connections must be created correctly for the WDM equipment.
Context
l
Among the five types of trails, only the OTS trail can be managed directly without being searched, because the data is stored at the network layer when fibers are created. The networking in which no fiber connection exists between cross-connections of the same level is not supported. The U2000 supports the ability to search for an unterminated trail. The U2000 supports the ability to search for a WDM trail that has multiple sources and sinks. The U2000 supports the ability to restore the user-defined information. When the you delete a trail from the network layer of the U2000, the user-defined information of the trail is saved in the system. Hence, when you search for a trail that has the same source or sink and direction as the deleted trail, you can restore the user-defined information. You can only search for an inverse multilplexing client trail.
l l
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Step 2 Under Advanced settings, set the search policies.
3-12
Issue 02 (2009-10-23)
NOTE
In the mode of searching by subnet, the selected subnet range should be independent from the networking aspect. That is, no fiber connection exists between the selected subnet range and the area that beyond the selected subnet range.
Step 3 Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services.
NOTE
l l
If there are cross-connections that are collisions and these cross-connections cannot form end to end trails, the U2000 shows the conflicting trails after you perform the search operation. The principles of verifying a conflict trail are as follows: The networking changes. The trail may cause interruption of service flow. For example, the key information of the trail, including deleting a crossconnection or fiber, is verified.
Step 4 Optional: Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE
Skip this step if the Automatically create trails after searching policy is selected in Step 2.
If Step 4 is executed, the U2000 deletes trails that do not have the management flag from the network layer. This does not affect services of the actual NE or the data of an individual NE on the U2000.
The data on the U2000 is inconsistent with those on NEs. The fibers created on the U2000 do not match actual fiber connections. Protection subnets are not created or cannot be searched. The NE data configuration is incorrect. For example, a non-protection chain service is created on the protection ring, the NE logic system of the service does not belong to any protection subnet, or the protection subnet configuration is wrong. The timeslot for the protection route is not configured. The timeslot configured for the protection route is wrong. The SNCP service configuration is wrong, which results in an incomplete protection route. The service configuration is incomplete. Check whether incomplete services are configured in the station-by-station mode, for example, pass-through services may not be configured on pass-through NEs. You should complete this service configuration and search for the trails again.
2.
equipment with the dynamic optical cross-connection boards, you can create OCh trails manually by using the trail management function of the U2000. 3.1.3.2 Creating an ODUk Trail The U2000 supports creating ODUk trails in an end-to-end mode. After you specify the source and the sink of a service, the U2000 automatically searches for the server trail and creates the ODUk trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. 3.1.3.3 Creating Client Trails The U2000 supports creating client trails in an end-to-end mode. After you specify the source and sink of a service, the U2000 generates a client trail based on the searched or created server trail. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In addition, you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The OMS server trail must be searched out.
Background Information
The U2000 does not support the ability to reuse discrete cross-connections. The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows:
l l l
For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9. For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4. For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9, RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9, 13WSD9, RDU6, WSM6. The typical scenario of non-protected OCh networking is as follows:
Issue 02 (2009-10-23)
3-15
O T U
OCh
M40 WSM FIU
ONE3
FIU
FIU
WSD
FIU
OT U
OSC
OSC
OSC
OCh
fiber oxc
ONE2
OSC OSC
ONE4
F I U O T U O L P
F I U
WSD
WSM
F I U
F I U
ONE3
F I U F I U WSD WSM F I U F I U
O L P
O T U
OSC
OSC
OSC
OCh
fiber oxc
NOTE
Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level and direction of the service. Set the level to OCh and set the direction according to the specific networking. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
TIP
l l
During the selection of source or sink in the NE Panel, when you move the cursor to a board, the wavelength information of the board port is displayed. By default, if you already select one end (source or sink) of a trail and open the NE Panel to select another end, the U2000 uses the board and port that have the same band and wavelength with priority.
Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed.
3-16 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. The sign is displayed on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 8 Optional: Check the Activate the trail check box. Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and click OK. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End
Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP
You can filter other trails according to the source and sink of the new trail.
2.
In the WDM Trail Management user interface, find out that the trail is correctly created.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The OTU1 ODU1, ODU2, ODU3 or OTU2 server trail must be searched out.
Context
The configuration principles are as follows:
l
The source and sink of an ODUk (k = 0, 1, 2, 3, 5G) trail are LP ports of the TDG, TQM, or TQS boards. The source and sink of an ODU0 trail are the LP ports of the tributary boards, such as the 52TOM boards. The line boards that support the grooming of ODU0 services are as follows: 52NS3, 52NQ2, 52ND2, and 52NS2. The boards support the grooming of ODU0 services only in the synchronous mode. The boards, however, do not support the grooming of ODU0 services in the asynchronous mode.
Issue 02 (2009-10-23)
3-17
In the synchronous mode, the boards (including tributary and line boards) that support the grooming of ODU0 services work with synchronous cross-connect boards. The cross-connect board can be the 52XCH boards.
l
Only ODU0, ODU1 and ODU2 trails can be created. ODU5G and ODU3 trails cannot be created, but can be searched. If no cross-connect board (for example, XCS board) is available, the tributary board and line board must be installed in paired slots of the same subrack. During the installation of cross-connect board (for example, XCS board), the tributary board and line board must be installed on the same subrack. An ODU1 trail cannot be created on an OTU1 server trail formed by the networking of the TQS boards. Currently, two types of boards support the inverse multiplexing trail. The TSXL board supports the inverse multiplexing of the 40 Gbit/s service and the TDX board supports the inverse multiplexing of the 10 Gbit/s service The U2000 supports the ability to reuse discrete cross-connections. The U2000 does not support the ability to create a trail whose source and sink use the same subrack. The U2000 does not support the ability to create a trail that is terminated at one end.
l l
OUT
IN
O T U 2
O D U 2
OCh Trail
Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level, rate and direction of the service. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
3-18 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. The sign is shown on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 9 Optional: Check the Activate the trail check box. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End
Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP
You can filter other trails according to the source and sink of the new trail.
2.
In the WDM Trail Management user interface, find out that the trail is correctly created.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. An OCh or ODUk server trail is correctly searched out or created.
Background Information
The restrictions for configuring cross-connections and networking are as follows:
l
The working route and protection route of WXCP/SNCP trails must be different server trails. Currently, the U2000 only supports the Client trails created based on the ODUk server trails in a network composed all by NG WDM equipment. The server trail can be ODU1 trail, ODU5G trail and ODU2 trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-19
Issue 02 (2009-10-23)
The U2000 supports the creation and search for the Client trails using the SW SNCP scheme. For the dual-fed OTU, if services are configured at only one port, the client trail cannot be created even if the OCh trail is searched out. The U2000 supports the ability to create a mono nodal trail.
Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level, rate and direction of the service. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port. Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. The sign is shown on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Optional: Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Step 8 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 9 Optional: Check the Activate the trail check box. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End
Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP
You can filter other trails according to the source and sink of the new trail.
2.
In the WDM Trail Management user interface, find out that the trail is correctly created.
The U2000 provides the signal flow diagram for trails of an optical NE. In the signal flow diagram, you can view fiber connections between boards on optical NEs. The signal flow diagram visually display the flow direction of optical signals, and facilitates operation and maintenance. 3.1.4.3 Viewing Relevant Client Trails At a level higher than sever trails, client trails are used to carry services. By using the U2000, you can view the client trail information of a specified trail. 3.1.4.4 Browsing Related Server Trails The U2000 supports querying related server trails. By using this function, you can learn about the information including status and attributes of a server trail related to the desired trail. 3.1.4.5 Viewing the Optical Power for the Trails You can query the optical power for trails. The U2000 provides a way to manage the optical power that is related to the NE layout, topology structure and routing. 3.1.4.6 Analyzing the WDM Trail Fault This section describes how to query relevant information about the WDM trail status. 3.1.4.7 Viewing the Connectivity of WDM Services Networkwide The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. For example, the alarm that causes service interruption is handled with priority. 3.1.4.8 Browsing Associated Working and Protection Trails U2000 supports the function of displaying associated working and protection trails of an optical NE on an optical layer trail. Through the function of querying a WDM trail, you can view the other associated working and protection trails of a trail in the trail list.
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The WDM trails must be created.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Choose a trail and click Transmission Media Layer Route in the bottom portion of the window. The transmission media is displayed in the bottom window.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-21
Hover the cursor over the trail and the source and sink port information of this route is displayed.
----End
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. There must be correct WDM trails.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a trail, and select the Signal Flow Diagram tab in the bottom portion of the window. The signal flow direction of the entire trail is shown.
NOTE
Hover the cursor on a trail to display the source and sink port information of that section of the route.
Step 4 Optional: Right-click on the view of signal flow diagram, and choose Legend from the shortcut menu. The fibers related to the trail are displayed in the signal flow diagram. Dotted lines represents intra-station fibers and real lines represents inter-station fibers. Step 5 Optional: When an alarm is generated in the case of fiber cut, you can refresh the signal flow diagram manually. Right-click on the view of signal flow diagram, and choose Refresh. Then, the broken fiber is highlighted in red, so that you can easily view the alarm status and start initial fault location. Step 6 Optional: To query the current working route of a trail, select the trail, right-click on the view of signal flow diagram, and then choose Display valid routes from the shortcut menu. The valid positive working route is highlighted in green, while the valid negative working route is highlighted in orange.
NOTE
l l
The auto-refresh function of the valid routes is not supported. This function does to support trail groups.
----End
3-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The WDM trail must be created or serached out.
Context
In the network models specified in the ITU-T G.872 and G.805, the OTN transport network is divided.That is, each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server. A connection of the client layer is carried by an adjacent server trail for transmission. For example, the link connection of a OCh trail is provided by a OMS trail, while the link connection of a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of the OCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is the server trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail. For details of the trail models, refer to 3.1.1.1 WDM Trail.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.
Step 3 Right-click a trail and choose Browse Relevant Client Trails from the shortcut menu. The corresponding client trail information is displayed in the trail list. ----End
Prerequisite
l l l
You must be an NM user with "network monitor" authority or higher. A WDM trail must be searched out or created. OTS trails do not support querying related server trails.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-23
Issue 02 (2009-10-23)
Context
In the network models specified in the ITU-T G.872 and G.805, the OTN transport network is divided.That is, each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server. A connection of the client layer is carried by an adjacent server trail for transmission. For example, the link connection of a OCh trail is provided by a OMS trail, while the link connection of a Client trail is provided by an OCh or ODUk trail. The OMS layer is the server layer of the OCh layer, and the OCh trail is the client trail of the OMS layer. The OCh or ODUk layer is the server trail of the Client layer, and the Client trail is the client trail of the OCh or ODUk trail. For details of the trail models, refer to 3.1.1.1 WDM Trail.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Right-click a trail and choose Browse Related Server Layer Trails from the shortcut menu. This trail and the related server trails are displayed in the user interface. Step 4 You can select another trail to continue the query. ----End
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The WDM trails must be correctly created.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.
3-24
Issue 02 (2009-10-23)
Step 3 Right-click a trail and choose Query Relevant Optical Power from the shortcut menu. Step 4 In the Optical Power Management window displayed, click the Table tab. Click Query to query the optical power information of ports from the NE. In the Operation Result dialog box displayed, click Close.
NOTE
In the View tab, move the cursor on a link. The U2000 shows the optical power information of all fibres in the link.
Step 5 Click the Graphic tab to query the graphic interface of the port optical power.
NOTE
l l l
Green indicates that the current optical power is in the normal range. Orange indicates that the current power exceeds the reference deviation and there is an exception. Black "E" shape in the histogram indicates the allowable deviation range of the optical power.
----End
Prerequisite
l l l
You must be an NM user with "network monitor" authority or higher. WDM trails must be created and in the active state. Client trails, ODUk (k =0, 1, 2, 3, and 5G) trails, and OTUk (k =1, 2, 3, and 5G) trails are supported. Trails that have multiple sources and sinks are not supported.
Issue 02 (2009-10-23)
3-25
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. Then, the desired trails are displayed in the trail list.
NOTE
l l l
To filter all the trails on the U2000, click Filter All. To add trails that meet the new criteria based on the existing trails, click Incremental Filter. To filter the trails again according to the new criteria based on the existing trails, click Secondary Filter.
Step 3 Select an WDM trail in the trail list, right-click the trail, and then choose Analyse Trail Status. Step 4 In the Operation Result dialog box displayed, click Close. Step 5 In the WDM Trail Status dialog box displayed, view Trail Status. ----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Context
In the case of the trails that reports the alarms, certain services of the trails are interrupted while other services of the trails are not interrupted. The services that are interrupted cannot be identified when you view alarms. You can only handle those alarms one by one. The alarm that causes service interruption, however, is not handled in time. After the service interruption is detected, the U2000 automatically generates a service-level alarm that is displayed in the Browse Current Alarm window.
Procedure
Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list. Step 3 View Connection Status. The connectivity of the service is refreshed in real time. ----End
3-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. There must be created or searched WDM trails.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a trail, right click and select the Browse Associated Working/Protection Trails.
NOTE
If there are associated working and protection trails, they are displayed with the selected trail on the trail management interface. If there are no associated working and protection trails, only the selected trail is displayed.
----End
3.1.5.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail The U2000 supports performing the WXCP or SNCP protection switching for the trails in the end-to-end mode. Performing the WXCP or SNCP protection switching for the trails in the endto-end mode is more direct and easier than that on the per-NE basis. 3.1.5.7 Querying the DPPS Protection of a WDM Trail This section describes how to query the DPPS protection state of a WDM trail from the network layer.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The Client, ODUk, OTUk or OCh trail must be created.
Context
CAUTION
Deactivating WDM trails may interrupt the services.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Optional: Select one or more trails, right-click and choose Deactivate. Step 4 Optional: Select one or more trails, right-click and choose Activate.
NOTE
If a certain server trail carries an active client trail or a partially active client trail, you need to deactivate the client trail and then the server trail.
Step 5 Click OK in the Confirm window and the Reconfirm window displayed. A prompt appears telling you that the operation was successful. Step 6 Click Close. ----End
3-28 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The OCh trail must be searched, and the source and sink OTU boards must support overhead management.
Context
CAUTION
You need to configure OTU overheads correctly. Otherwise, services may be interrupted.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select an OCh trail, click Maintenance, and select Overhead Management. The OTU Overhead window is displayed. Step 4 Select a port from the object list. Right-click on the TTI to be Received or TTI to be Sent column. Select the overhead bytes input mode.
Issue 02 (2009-10-23)
3-29
NOTE
l l
Choose Copy All Form Received to automatically copy the contents of current overhead bytes received to the table. Choose Manual Input to customize the contents of the overhead bytes.
Option
Description
Copy All Form Received Click Copy All Form Received. Manual Input Click Manual Input, and the Please input the overhead byte dialog box is displayed. Enter the information about Source Flag, Sink Flag and User Tag. Click OK.
Step 5 Click Apply. The Confirm dialog box is displayed. Step 6 Click OK. A prompt appears telling you that the operation was successful. Step 7 Click Close. ----End
Prerequisite
l l l l
You must be an NM user with "network monitor" authority or higher. The optical line protection or 1+1 protection groups must be configured. Trail search must be performed properly. Applies to Client, OCh, and OMS trails.
Context
You can query the status and parameters of inter-board 1+1 protection, intra board 1+1 protection, client-side 1+1 protection, optical line protection, 1+1 optical path protection, and inter-subrack 1+1 protection for a trail.
3-30 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methods as needed. Click Filter All. Step 3 In the WDM Trail Management view, select a trail that is configured with the 1+1 protection. Click Maintenance and choose WDM Trail 1+1 Parameter Settings from the drop-down menu. The WDM Trail 1+1 Parameter Settings window is displayed. The 1+1 protection information of the WDM trail is shown in the window. Step 4 Select a protection group of WDM trails. Click Function and select Query Switching Status. The Operation Result dialog box is displayed indicating that the operation is successful. Step 5 Click Close. ----End
Prerequisite
l l l l
You must be an NM user with "network operator" authority or higher. The 1+1 protection status of the WDM trail is queried. A trail search must be performed properly. Applies to OCh client, OCh or OMS trails.
Context
CAUTION
Services may be interrupted when performing 1+1 protection switching for a WDM trail.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set filter criteria and methods as needed. Click Filter All. Step 3 Select a client trail that has WDM 1+1 protection, click Maintenance and select WDM Trail 1+1 Parameter Settings. Step 4 Select a trail in the WDM Trail 1+1 Parameter Settings window. Right-click in the Current Status field and choose Force to Working or any of the other switching operations. In the Confirm dialog box, confirm the operation. The Operation Result dialog box is displayed, indicating that the operation is successful.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-31
You need to confirm the operation only when performing the forced switching and trail locking.
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. A trail with the WXCP or SNCP protection must be configured.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 Select a trail with WXCP or SNCP in the WDM Trail Management window. Click the Maintenance button and select WXCP/SNCP Service Control from the drop-down list. The WXCP/SNCP Service Control window is displayed, indicating the WXCP or SNCP information of the WDM trail. Step 4 Select the protection group of this WDM trail and click Query. The Operation Result dialog box is displayed, indicating that the operation is successful. Step 5 Click Close. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. A trail with the WXCP or SNCP protection must be configured.
Context
CAUTION
Services may be interrupted when performing the WXCP/SNCP protection switching for a WDM trail.
3-32 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 In the WDM Trail Management view, select a trail with the WXCP or SNCP protection. Click Maintenance and select WXCP/SNCP Service Control from the drop-down list. The WXCP/ SNCP Service Control window is displayed, indicating the WXCP or SNCP information of the WDM trail. Step 4 Select the protection group of this WDM trail. Click Function and select the forced or manual switching from the drop-down list. The Operation Result dialog box is displayed, indicating that the operation is successful. Step 5 Click Close. ----End
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. A trail with the DPPS protection must be configured.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and methods as needed. Click Filter All. Step 3 Select a trail with DPPS in the WDM Trail Management window. Click the Maintenance button and select DPPS Query from the drop-down list. The DPPS Protection window is displayed, indicating the DPPS information of the WDM trail. Step 4 Select the protection group of this WDM trail and click Query, the DPPS information of the WDM trail is displayed. ----End
3.1.6.2 Collecting Statistics on Inter-Station Wavelength Resources The statistics report of inter-station wavelength resources shows the usage of the wavelength resources of one or more trails between the selected stations. This provides reference for service planning and increases the service availability ratio. 3.1.6.3 Collecting Statistics on WDM Link Resources By using this function, you can learn about the usage of the WDM link resources between the specific stations. This provides reference for service planning and increases the service availability ratio.
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red). Step 3 Click Statistics to query the resource information of the WDM client-side ports.
Step 4 Click Used Port, Unused Port or Dynamic Port tab to query details of the ports.
3-34
Issue 02 (2009-10-23)
l l
If a client-side port is not used by a trail, this port is idle. Otherwise, this port is used. Discrete services are taken as idle resources.
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. You cannot collect statistics on the wavelengths that are used by WDM ASON trails at the OCh level. You cannot collect statistics if the trail to be counted is bidirectional, and the source and sink ends of the trail use the optical multiplexer/demultiplexer board or optical add/drop multiplexing board.
Context
To ensure that statistics are correct, it is recommended that you search for WDM trails before you collect statistics on wavelength resources.
Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of Inter-Station Wavelength Resources from the Main Menu. Step 2 Set the Level and Direction of the trail to be counted.
NOTE
Step 3 Click Browse to select the source end and click the button again to select the sink end. Click OK in the Search NE dialog box.
NOTE
The source and sink ends can be optical NEs, NEs or boards.
l l
The intermediate NE can only be an optical NE. You can select multiple intermediate NEs to determine the trail to be counted out of multiple trails between the source and sink ends.
Step 5 Click Count. The Confirm dialog box is displayed prompting you to search for trails before collecting statistics.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-35
Step 6 Click OK. The Operation Result dialog box is displayed indicating that the operation was successful. Click Close. You can view the created report in the right-hand pane.
NOTE
If there is a large number of network data, it takes a long time to create the report.
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Link Resources from the main menu. Step 2 In the left-hand pane, select an NE and click the double-right-arrow button (red). Step 3 In the Inter-Station Link Resource Statistics pane, view the link resources among stations.
Step 4 In the Inter-Station Link Resource Statistics pane, select a record. Then, in the Link List pane, view the details of all the links between the two stations.
3-36
Issue 02 (2009-10-23)
Step 5 Optional: Right-click one or more links in the Link List pane and choose Browse Relevant Client Trails from the shortcut menu to view the client trail of this link. ----End
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. Idle ports must be available at the source and sink ends.
Context
The configuration principles are as follows:
l
The OTU boards at the source and sink ends, such as the L4G, LOG, and LQG boards, must support configuring cross-connections and must be installed on different NEs. Applies to a trail with only one source and one sink. The source and sink of a trail represent specific service ports. The U2000 supports the ability to modify the source and sink ends of a client trail that is in service. The U2000 does not support the ability to modify a cross-subrack WDM trail. If you want to modify the sink end of a WDM trail, the sink end before modification and the sink end after modification must reside in the same subrack.
l l l
CAUTION
Modifying the source or sink of a trail interrupts services.
Issue 02 (2009-10-23)
3-37
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Condition dialog box is displayed. Set filter criteria and methods as needed.
NOTE
l l l
To filter all trails on the U2000, click Filter All. Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.
Step 3 Select a desired trail, click Create/Modify, and choose Modify Trail from the drop-down menu. The Modify WDM Trail window is displayed. Step 4 Click Browse corresponding to Source to select a source port. Step 5 Click Browse corresponding to Sink to select a sink port. Step 6 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed. Step 7 Click Finish, and if the modified trail is an activated trail, the Confirm dialog box is displayed, click Yes. Step 8 The Operation Result dialog box is displayed. Click Close. ----End
Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP
You can filter other trails according to the source and sink of the new trail.
2.
In the WDM Trail Management user interface, find out that the trail is correctly modified.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. Support the function of modifying the WXCP/SNCP protection for Client, ODU0, ODU1, and ODU2 trails.
Context
CAUTION
This operation may cause short interruption of the services.
3-38
Issue 02 (2009-10-23)
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.
Step 3 Select a trail and click Create/Modify and choose Modify Trail. Step 4 Click the Protection Setting tab. l Add WXCP/SNCP protection.
Right-click the dual-fed point and choose Set Dual-Fed Point from the shortcut menu, and the node is displayed as . Right-click the selective-receiving point and choose Set Selective-Receiving Point from the shortcut menu, and the node is displayed as .
Right-click the blank area in the Node List frame and choose Add from the shortcut menu. The Add the dual-fed and selective-receiving node is displayed, select DualFed Point and Selective-Receiving Point. Click OK. Right-click the dual-fed point and choose Cancel Dual-Fed Point from the shortcut menu, right-click the selective-receiving point and choose Cancel Selective-Receiving Point from the shortcut menu. Right-click a record in the Node List frame and choose Delete from the shortcut menu. Click OK. Click Delete Protection.
Modify WXCP/SNCP protection. Click Protection Setting. In the Specify Route Channel window, sets the Server Layer Trail and Channel of the protection route .
Step 5 Click Finish. In the Confirm dialog box, click Yes. In the Operation Result dialog box, click Close. ----End
Prerequisite
l l
You must be an NM user with "network maintainer" authority or higher. The trail naming rules must be set on the U2000.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-39
Issue 02 (2009-10-23)
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.
Step 3 Right-click one or more trails from the list, and choose Name from the shortcut menu. For the naming rules, refer to Customizing Naming Rule. Step 4 In the Confirm dialog box displayed, click OK. ----End
Prerequisite
l l l l
You must be an NM user with "network operator" authority or higher. The trail is not the OTS trail. The trail must have the highest priority. The trails that contain dynamic cross-connections must be deactivated before deleted. Other trails can be directly deleted.
Context
A WDM trail can be deleted from the network side or the NE side.
l
If a trail is deleted from the network side, only the WDM trail at the network layer is deleted on the U2000 side. The deleted trail is not delivered to the NE. Moreover, the service is not affected. Generally, this method is adopted to synchronize the trail information on the U2000 side and the trail information at the network layer. After the trail is deleted from the network layer, you can search for and find it again based on the service information at the NE layer. If a trail is deleted at the NE layer, the trail on the NE side is deleted accordingly. After the trail is deleted, the service is interrupted. If the service configuration of the trail is incorrect or needs to be modified, you can delete the trail at the NE layer and then create another trail. The U2000 supports the ability to delete a WDM trail and to delete a dynamic crossconnection related to the trail. The U2000 does not support the ability to delete the WDM trail that has a client trail. The U2000 does not support the ability to delete an OTS trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
l l
3-40
Before you delete a WDM trail, the dynamic cross-connection related to the trail must be inactive. If active, an error is displayed during the deletion.
CAUTION
Deleting the trails from NE layer will affect service.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l 1. 2. If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter. Select the WDM trail that you want to delete, right-click it and choose Delete. In the Confirm and Reconfirm dialog boxes displayed, click OK. The operation is complete. Select the WDM trail that you want to delete, right-click it and choose Delete from Network Layer. In the Operation Result dialog boxes displayed, click Close.
----End
3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode
This sample describes how to configure GE Services with the WXCP protection in the end-toend mode.
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. The Optical NE must be created as shown in Figure 3-12. The NEs and boards must be created as shown in NE Panel.
Context
Network Design The Project T constructs a ring network with station A, station B, station C and station D. All the equipments are OptiX Metro 6100V1E. Station A is an Optical Terminal Multiplexer (OTM) station. The station A has two back-to-back OTMs including two NEs. Station B, station C and
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-41
station D are Optical Add/Drop Multiplexer (OADM) stations. Each station has one NEs. The network design is shown in Figure 3-12. Figure 3-12 Network Design
OADM OTM
3-42
Issue 02 (2009-10-23)
Service Requirements In the network management center, the maintenance engineer is responsible for the service deployment and adjustment. Suppose that the engineer is familiar with all the services carried by the WDM network. One of the routine tasks of this engineer is to deploy the GE level service to a wavelength. After receiving a request, the engineer must follow the request to configure a GE level service with WXCP from station A to station C.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-43
Procedure 1. 2. 3. Query the available resources of the WDM side. Search for WDM trails. Create a GE trail with the WXCP protection.
Procedure
Step 1 Query the available resources of the WDM side. 1. 2. Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Select the optical NE A and the optical NE C from the Navigation Tree. Click the double arrow button to add the port resources of the two NEs to the statistics area at the right-hand side. Click Used Port and Unused Port to view the using status of each port. Record all the available resources.
3. 4.
Step 2 Search for WDM trails. 1. 2. 3. Connect fibers on the U2000 according to the actual networking diagram. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Under Advanced settings, set the search policies.
4. 5.
Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services. Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE
If no trails conflict, no window about conflicting trails is displayed. After you click Next, the U2000 displays the window about discrete services.
6.
3-44
7. 1. 2. 3.
After the search is complete, click Finish. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level, rate and direction of the service. Set the service level as GE, and set the service direction as Unidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port. Set the source port as No.3 port of the No.1 timeslot LQG on NE331. Set the sink port as No.3 port of the No.1 timeslot LQG on NE333.
4.
Click the Protection Setting tab, and set the SNCP protection route. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. In the upper left corner of the NE icon, is displayed. Set optical NE A as the dual transmitting node and optical NE C as the receiving node.
5. 6. 7.
Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.
----End
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. The optical NE as shown in Figure 3-17 must be created. The NEs and boards as shown in NE Panel must be created.
Context
Project network design Project T is a ring network that consists of stations A, B, C, and D. The network uses the OptiX Metro 6100 equipment. Stations A, B, C, and D are optical add/drop multiplexer (OADM) stations. Each station has only one NE. Figure 3-17 shows the network design, and Table 3-3 lists the network configuration data.
Issue 02 (2009-10-23)
3-45
OADM
Table 3-3 Network data table Station A B C D NE Type OADM OADM OADM OADM NE Name NE403 NE430 NE401 NE402 IP Address 129.9.1.174 129.9.1.145 129.9.1.146 129.9.1.147 Remarks Gateway NE Non-gateway NE Non-gateway NE Non-gateway NE
NE Panel In the project, the configurations for NEs on stations A, B, C, and D are the same.
3-46
Issue 02 (2009-10-23)
LL 44 GG
F S SF W W P I C CI S S M U 2 CU D M U 9 9
Service demand A main responsibility of the transmission equipment maintenance engineers in the transmission maintenance department of the network management center is to provision and groom services in the WDM network. An engineer receives a grooming order for provisioning two services. One is a unidirectional service from station B to station C. The other is a bidirectional service from station B to station D. Based on the services, the planned OCh trails are as follows:
l
There is a unidirectional trail from station B to station C. The route is B->C. The wavelength of the service is wavelength 1. Figure 3-19 shows the trail signal flow.
There is a bidirectional trail from station B to station D. The route from station B to station D is B->C->D. This route passes through station C. The wavelength of the service is wavelength 2. The route from station D to station B is D->A->B. This route passes through station A. The wavelength of the service is wavelength 2. Figure 3-20 and Figure 3-21 show the trail signal flows.
Issue 02 (2009-10-23)
3-47
Configuration procedure 1. 2. 3. Search for WDM server trails. Create an OCh trail from station B to station C. Create an OCh trail between station B and station D.
Procedure
Step 1 Search for WDM server trails. 1. 2. 3.
3-48
Connect fibers on the U2000 according to the actual networking and signal flow diagrams. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Under Advanced settings, set the search policies.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
4. 5.
Click Next to begin to search for trails. The U2000 takes some time to return the results, depending on the number of services. Click Next to view the conflicting trail information . If you want to set a trail management flag, check the Management Flag check box or right-click it and select the management flag.
NOTE
If no conflict trail exists, the window of conflict trails is not displayed. Click Next. The U2000 displays a window that displays discrete services.
6. 7. 1. 2. 3.
Click Next to view all discrete services in the network. After the search is complete, click Finish. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level and direction of the service. Set the service level to OCh, and set the service direction to Unidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, port and wavelength. Set the source port to port 1 of the L4G in slot 1 on NE430 and the sink port to port 1 of the L4G in slot 1 on NE401.
4. 5. 6.
Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level, rate and direction of the service. Set the service level to OCh, and set the service direction to Bidirectional. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-49
Issue 02 (2009-10-23)
Set the source port to port 1 of the L4G in slot 2 on NE430 and the sink port to port 1 of the L4G in slot 2 on NE402. 4. 5. 6. Click the General Attributes, set the basic trail attributes, including the name and ID. Check the Activate the trail check box. Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close.
----End
3.2.1 EAPE
The U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. The EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available.
3-50
Issue 02 (2009-10-23)
Function Description
In practice of WDM system operation, the optical power flatness of each channel, compared with that during deployment commissioning, greatly changes due to fiber condition variation. As a result, the quality of received signals does not meet the requirement. In this case, EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available.
Function Implementation
The procedure to implement the EAPE function is as follows: 1. During deployment commissioning, manually adjust the optical power of each channel to obtain signal quality that meet the requirement. This ensures that each channel normally operates. During system operation, the OTU at the receive end detects the signal quality of each channel. When the OTU at the receive end detects an alarm, if the optical power of the OTU at the receive end does not cross the threshold, adjust the optical power attenuation ratio of the corresponding channel according to the actual situation. This ensures that the receive-end signal quality of each channel meets the preset requirement and that the services are available.
2. 3.
Involved Units
The Table 3-4 lists the equipment and U2000 versions that support the EAPE function and their relations. Table 3-4 The versions of the equipment and U2000 that support the EAPE function Equipment Version OptiX OSN 6800/3800 V100R003 or later versions OptiX OSN 3800A/6800A V100R001C01 or later versions OptiX OSN 1600A/G(NA) V100R003C02 or later versions U2000 Version V100R001 or later versions V100R001 or later versions V100R001 or later versions
The service board and the SCC board are jointly used to achieve the EAPE function. This function involves the following types of boards and ports:
l
Detects the receive-end signal quality of each channel and reports any EAPE unbalance event detected. The boards that support this function include the OTUs and line boards with the FEC function.
Issue 02 (2009-10-23)
3-51
Adjustment unit: It is the EAPE adjustment entity that adjusts the optical attenuation of each channel. The boards that support this function include ROAM, WSM9, WSD9, WSM5, WSD5, WSMD4, DWC, EDWC, V40, M40V, D40V, V48, VA2, VA1 and VA4. Received signal selection unit
The system locates the point to be adjusted according to the current protection state of the OLP or DCP board. The boards that support this function include the OLP and DCP. It is the system entity that carries out the EAPE function. The boards that support this function include the SCC.
NOTE
For the EAPE function, EAPE protocol frames can be sent to each node as long as the physical communication route is reachable. The EAPE protocol frames can be sent in modes such as the OSC and ESC.
Networking Scenarios
The EAPE function can be applied in three typical scenarios. EAPE application scenario 1 is with the basic configuration that only a trail with VOA unit exists. Figure 3-22 shows the networking diagram of this application mode. The figure illustrates only the unidirectional EAPE pair. Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source
EAPE application scenario 2 is applicable to the dual fed and selective receiving OTU board. Each of the two receive optical interfaces of the dual fed and selective receiving OTU has an FEC module. Two trails with VOA units exist. Hence, in this networking mode, you need to configure two EAPE pairs.Figure 3-23 shows the networking diagram of this application mode. The figure illustrates only the unidirectional EAPE pair.
3-52
Issue 02 (2009-10-23)
Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources
EAPE application scenario 3 is applicable to the 5 Gbit/s, 10 Gbit/s and 40 Gbit/s OTUs. In this networking mode, the intra-board 1+1 protection needs to be configured. Only one EAPE pair needs to be configured. When the sink OTU detects an anomaly, the system locates the VOA to be adjusted according to the current services operating channel. Figure 3-24 shows the networking diagram of this application mode. The figure considers the OLP board as an example to illustrate only the unidirectional EAPE pair. Figure 3-24 Scenario of the dual VOA units with the OLP protection units
Configuration Principle
The EAPE configuration principles are as follows:
l l
When creating the EAPE, you must create the corresponding OCh trail firstly. Based on the basic application scenario, you just need to specify the source OTU, sink OTU and adjustment unit. When the OTU is jointly used with the OLP or DCP board for networking, besides specifying the source OTU and sink OTU, you also need to specify the OLP or DCP board and the active and standby adjustment units. In this networking mode, the sink OLP or DCP board and the sink OTU must be configured on one NE; the adjustment unit and the source OTU must be configured on another NE. The FEC type of the source and sink OTU must keep consistent. After EAPE is configured, the FEC working mode of the OTU must not be changed; the FEC function of the OTU must be enabled. EAPE requires that the monitored path is a complete end-to-end wavelength without any intermediate add or drop wavelength.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-53
Issue 02 (2009-10-23)
An OCh trail with regenerating stations equals to two independent wavelengths and thus need be configured with two EAPE pairs. EAPE requires that the adjustment unit is configured in the transmit-end station and the OTU detection unit is configured in the receive-end station. An OCh trail with multiple sources and sinks does not support the EAPE function. The uploading function is not supported, but the script importing and exporting function is supported. If the EAPE ID on the U2000 is inconsistent with that on the NE, you need to delete the trail on the U2000 from the network layer, search for a new trail, and then query or create EAPE objects. In this way, you can obtain the EAPE objects with consistent data between the U2000 and the NE. When an OCh trail has the corresponding EAPE objects, you cannot modify or deactivate the trail. The adjustment board cannot be on the sink NE, and the selective receiving board cannot be on the source NE. The FEC mode of the source OTU and sink OTU should be the same.
l l
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The OMS server trail must be searched out.
Background Information
The U2000 does not support the ability to reuse discrete cross-connections. The source and sink of an OCh trail are the ports at the line side of the OTU boards. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows:
l l l
For the OptiX BWS 1600G: WSM9, WSD9, WSM5, WSD5 and RMU9. For the OptiX Metro 6100V1E: WSM9, WSD9, RMU9, and WSMD4. For the OptiX OSN 3800, the OptiX OSN 6800, and the OptiX OSN 8800 I: WSM9, WSD9, RMU9, ROAM, WSMD4, 11RDU9, 11WSMD2, 12WSM9, 12WSD9, 13WSM9, 13WSD9, RDU6, WSM6.
3-54
OCh
M40 WSM FIU
ONE3
FIU
FIU
WSD
FIU
OT U
OSC
OSC
OSC
OCh
fiber oxc
ONE2
OSC OSC
ONE4
F I U O T U O L P
F I U
WSD
WSM
F I U
F I U
ONE3
F I U F I U WSD WSM F I U F I U
O L P
O T U
OSC
OSC
OSC
OCh
fiber oxc
NOTE
Procedure
Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 2 Set the level and direction of the service. Set the level to OCh and set the direction according to the specific networking. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Select the NE, board, and port.
TIP
l l
During the selection of source or sink in the NE Panel, when you move the cursor to a board, the wavelength information of the board port is displayed. By default, if you already select one end (source or sink) of a trail and open the NE Panel to select another end, the U2000 uses the board and port that have the same band and wavelength with priority.
Step 4 Optional: Click a server tail between the source and sink NEs, and select the included server trail in the dialog box displayed. You can click the trail again, and cancel the selected server trail in the dialog box displayed.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-55
Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. The sign is displayed on the NE. Double-click the NE again to cancel your selection. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. Select a path and click OK. Step 7 Click the General Attributes, set the basic trail attributes, including the name and ID. Step 8 Optional: Check the Activate the trail check box. Step 9 Optional: Click Port Attribute, set the OPA Mode in the dialog box displayed and click OK. Step 10 Click Apply. A prompt is displayed, indicating that the operation was successful. Click Close. ----End
Result
1. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.
TIP
You can filter other trails according to the source and sink of the new trail.
2.
In the WDM Trail Management user interface, find out that the trail is correctly created.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. An OCh trail must be created or searched out.
Procedure
Step 1 Choose Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select a desired OCh trail, click Maintenance, and select EAPE Management from the dropdown menu. The EAPE Management dialog box is displayed.
3-56
Issue 02 (2009-10-23)
NOTE
You need not configure the data of the EAPE objects. The U2000 automatically calculates and then applies the data to the sink NE. The data of the EAPE objects is not displayed in the user interface. By default, the adjustment board nearest to the source is used. If the OLP dual fed board is available, a power adjustment board for the protection trail is required.
----End
Issue 02 (2009-10-23)
3-57
Prerequisite
l l l
You must be an NM user with "network operator" authority or higher. The EAPE must be created. The 15-min performance monitoring must be started on the sink NE.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select a desired OCh trail, click Maintenance , and select EAPE Management from the dropdown menu. The EAPE Management dialog box is displayed. Step 3 If the Status is Can Be Adjusted, click Start Adjustment to start adjusting the EAPE.
NOTE
l l
When the adjustment is finished, Status changes to Adjustment Not Required. Status indicates the current adjustment status of the EAPE. The status can be Adjustment Not Required, Can Be Adjusted, Being Adjusted, Unequalized, or Not Specified. Unequalized indicates that the optical power received by the sink end exceeds the threshold or the received signal degrades.
Prerequisite
l l
You must be an NM user with "network operator" authority or higher. The EAPE must be created.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Select filter criteria according to requirements. Step 2 Select an OCh trail whose EAPE that you want to delete, click Maintenance, and select EAPE Management from the drop-down menu. The EAPE Management dialog box is displayed. Step 3 Click Delete to delete the EAPE objects on the trail. ----End
3-58
Issue 02 (2009-10-23)
3.3.1 Viewing Current Alarms of a WDM Trail By querying current alarms of a WDM trail, you can learn about faults on this trail to perform maintenance in a timely and effective manner. 3.3.2 Viewing History Alarms of a WDM Trail By querying history alarms of a WDM trail, you can learn about history faults on this trail and provide reference for maintenance of current faults. 3.3.3 Managing Networkwide WDM Alarm Trails in Real Time The U2000 can manage the networkwide WDM alarm trails in real time. It manages all the WDM trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Alarm, and choose Current Alarm from the drop-down menu. The current alarms on this trail are displayed in the window. Step 4 Perform maintenance according to the current alarms reported on this trail. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-59
l l l
If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Alarm, and choose History Alarm from the drop-down menu. The history alarms on this trail are displayed in the window. Step 4 Learn about the history alarms reported on this trail to provide reference for maintenance of current faults. ----End
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The license for trail management must be available.
Procedure
Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu. Step 2 Set the trail filter criteria and click Filter All. Step 3 In the Alarm Affected WDM Trails window displayed, the alarm affected WDM trails that meet the criteria are displayed. Step 4 Optional: Right-click the title of a parameter column and set the trail attributes to be displayed. Step 5 Choose Alarm. Select the corresponding command from the drop-down menu to query or set the alarm data of each trail. Step 6 Optional: To query the performance data of a trail, click Performance > Browse Performance. Step 7 Optional: To print the trail information, click Print. To save the trail information, click Save As. ----End
3.4.2 Browsing the History Performance of WDM Trails By querying the history performance data of a WDM trail, you can learn about the running status of the services carried on the trail in a specific period in the past and provide reference for analyzing the current performance of this trail. 3.4.3 Setting Performance Monitoring Parameters of an WDM Trail Performance monitoring keeps a detailed record of the performance of services over a trail, helping the maintenance engineer to monitor and analyze the states of services. 3.4.4 Setting WDM Trail Performance Threshold In this user interface, you can set performance thresholds based on a trail. Specifically, you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail.
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a trail, click Performance and select Browse Performance from the drop-down list. Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and query the latest 15-minute or 24-hour performance data of the trail. Perform the maintenance operation according to the current performance events. Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End
Prerequisite
You must be an NM user with "network monitor" authority or higher.
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-61
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.
Step 3 Select a desired trail, click Performance and select Browse Performance from the drop-down list. Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view the history performance data. Step 5 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.
Step 3 Select a trail. Click Performance and choose from the drop-down menu. Step 4 In the dialog box displayed, select an monitored object, and set the monitor status and auto reporting status. Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End
3-62 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
Prerequisite
l l
You must be an NM user with "network monitor" authority or higher. The trail must be created.
Procedure
Step 1 Select Service > WDM Trail > WDM Trail Management from the main menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All.
NOTE
l l l
Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.
Step 3 Select one or more trails. Click Performance and choose Performance Threshold from the drop-down menu. Step 4 In the Performance Threshold window, double-click Threshold Value to change the performance threshold value. ----End
Issue 02 (2009-10-23)
3-63
Issue 02 (2009-10-23)
A-1
A.1 Numerics
2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit 2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit
40-channel 40-channel Multiplexing Unit With VOA Multiplexing Unit With VOA 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board
A.2 A
Access Control List Access Control List (ACL) is a list of IP address. The addresses listed in the ACL are used for authentication. If the ACL for the user is not null, it indicates that the address where the user logged in is contained in the list. Adaptive Communication Environment. See Access Control List If there are two cross-connect boards on the SDH equipment, which are in hot back-up relation of each other, the operation reliability is improved. When both the cross-connect boards are in position, the one inserted first is in the working status. Unplug the active board, the standby one will run in the working status automatically. When the active cross-connect board fails in self-test, the board is pulled out, the board power supply fails or the board hardware operation fails, the standby cross-connect board can automatically take the place of the active one. XC1, XC4, GTC, X16, X64, XCS, TXC, DTD, AXCS and STG boards all support active/standby switching. A board like MB2 divides the wavelength resources into such fixed wavelength groups as 1 - 4, 5 - 8 and 9 - 12, etc. A wavelength group is called a wave band, and a wave band bearing the added/dropped services is called add/drop wave band. In the OADM equipment, the boards MR2, MR3, MR4, MR8 and MB2 bear the wavelength directly adding/dropping services. Add/Drop Multiplexer.
A-2
Issue 02 (2009-10-23)
Alarm Indication Signal. If there are excessive errors in a channel, AIS is inserted in this channel to indicate it is unavailable. For a line board, it can be set whether to insert AIS when there are excessive errors in the B1, B2 and B3 bytes. For tributary board at the E1/T1 level, it can be set whether to insert AIS when there are excessive errors in BIP-2. For tributary board at the E3 level or higher, it can be set whether to insert AIS when there are excessive errors in the B3 byte. A message reported when a fault is detected by a device or by the network management system during the process of polling devices. Each alarm corresponds to a recovery alarm. After a recovery alarm is received, the status of the corresponding alarm changes to cleared. In case alarm2 is generated within five seconds after alarm1 is generated, and it complies with the conditions defined in the alarm correlation analysis rule, you can either mask the alarm or raise the level of alarm2 according to the behavior defined in the alarm correlation rule. Such a process is called alarm correlation analysis.
Alarm
Alarm correlation rules It refers to the rule of processing alarm1 and alarm2 under certain conditions. Such conditions are supported as follows:(1) Alarm1 and alarm2 occur on the same object;? (2) Alarm1 occurs in the service upstream of alarm2;? (3) Alarm1 occurs at the opposite service end of alarm2.? The following actions are supported at present:(1) Alarm1 masks alarm2;? (2) Raise the level of alarm2The alarm correlation rule is the basis for alarm correlation analysis, which affects the result of alarm correlation analysis. Set it with caution. Alarm filtering Alarms are detected and reported to the NMS system, and whether the alarm information is displayed and saved is decided by the status of the alarm filter. An alarm with the filtering status set to "Filter" is not displayed and saved on the NMS, but is monitored on the NE. Alarm delay includes starting delay and stopping delay. An alarm is not regarded as being generated until the NE has been detecting it for a period of time, and this period of time is the alarm start hold-off time; An alarm is not regarded as being ended until the NE has been detecting the ending of it for a period of time, and this period of time is the alarm end hold-off time; Setting the hold-off time can avoid the generation of unnecessary alarms due to misreport or jitter. On the cabinet of an NE, there are three indicators with different colors indicating the current status of the NE: Green indicator on: The NE is powered on; Red indicator on: A critical alarm is generated; Orange indicator on: A general alarm is generated. You can stop the NE alarm indication through the NMS.
Alarm indication
Issue 02 (2009-10-23)
A-3
Alarm inversion
For the port that has already been configured but has no service, this function can be used to avoid generating relevant alarm information, thus preventing alarm interference. The alarm report condition of the NE port is related to the alarm inverse mode (not inverse, automatic recovery and manual recovery) setting of the NE and the alarm inversion status (Enable and Disable) setting of the port. When the alarm inversion mode of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever the inversion status of the port is.? When the alarm inversion mode of the NE is set to automatic recovery, and the alarm inversion state of the port is set to Enabled, then the alarm of the port will be suppressed. The alarm inversion status of the port will automatically recover to "not inverse" after the alarm ends. For the port that has already been configured but not actually loaded with services, this function can be used to avoid generating relevant alarm information, thus preventing alarm interference.? When the alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion status of the port is set as Enable, the alarm of the port will be reported. After the service is accessed or the fault is removed, whether the port is automatically restored to the normal status depends on the alarm inversion mode of this NE. There are three alarm inversion modes: normal, revertible and non-revertible.? (1) Automatic restoration mode: If the NE alarm inversion mode is set to automatic restoration, after the NE port set to the inversion status accesses services or the fault is removed, it will be restored to the normal status automatically and an event is reported;? (2) Manual restoration mode: If the NE alarm inversion mode is set to manual restoration, after the NE port set to the inversion status accesses services or the fault is removed, it will not be restored to the normal status automatically and manual restoration is required;? (3) Not-to-invert mode: If the NE alarm inversion mode is set to not-to-invert, how the inversion status of the NE port is set will not affect alarm reporting of this port. Alarm mask means not monitoring the alarm event of a specific object.? The object here may be the networkwide equipment, a specific NE, a specific board and even a specific functional module of a specific board. Alarm severity is to identify the severity of an alarm or event. It is divided up into four levels: critical, major, minor, and warning alarm. There are two modes for saving alarms: stop and wrap.? Under stop mode, new alarms will be discarded when the alarm register in NE is full.? Under wrap mode, the earliest alarms will be deleted and new alarms will always be saved when the alarm register in NE is full. When the bit error reaches a specific limit, the equipment will report an alarm. This limit is the bit error alarm threshold. The threshold can be divided into crossing threshold and defect threshold. Classification of alarms with different attributes. There are six alarm types as following: Communication: alarm indication related with information transfer. Processing: alarm indication related with software or information processing Equipment: alarm indication related with equipment fault Service: alarm indication related with QoS of the equipment Environment: alarm related with the environment where the equipment resides, usually generated by a sensor Security: alarm indication related with security See Automatic Level Control The ALC link is a piece of end-to-end configuration information, which exists in the equipment (single station) as an ALC link node. Via the ALC function of each node, it fulfills optical power control on the line that contains the link.
Alarm mask
alarm threshold
Alarm type
A-4
Issue 02 (2009-10-23)
ALC node ALS AMI AMI code APE APS ASN.1 ASON
ALC functional unit, which corresponds to the equipment, achieves the ALC function through the coordination among the VOA, WBA, SC1/SC2 and MS2 boards. See Automatic laser shutdown Alternate Mark Inversion. Alternate Mark Inversion code. Automatic Optical Power Equalization Automatic Protection Switching. Abstract Syntax Notation One. Automatically Switched Optical Network
Asynchronous transfer An electronic digital data transmission technology. In June 1992, ATM is designated by mode the ITU-T as the transfer and switching mode for B-ISDNs. Because of its high flexibility and support for multimedia services, ATM is considered as the key to implementing broadband communications. ATM See Asynchronous transfer mode ATM protection group It refers to the logically bound ATM VP network/sub-network connections that share the same physical transmission channel. In the VP Group (VPG), a pair of VP connections (working connection and its protective connection) is used for monitoring the automatic protection switching, called monitoring connections (APS VPCs). If the monitoring connections switch over, the whole VPG will switch over to quicken the ATM protection switching (as quick as the protection switching of the SDH layer. Auto-negotiation Automatic alarm report Automatic alarm synchronization The rate/work mode of the communication party set as self-negotiation is specified through negotiation according to the transmission rate of the opposite party. Report the alarm to the NMS as soon as it is generated at the equipment side. The NMS pops up the alarm panel. The user can view this alarm information in the alarm panel without active query. The NMS can automatically acknowledge all unacknowledged alarms before the specified days at 3:00 AM every day.? The ended alarm that has been acknowledged will become the history alarm. The user in the acknowledgement information is "Automatic Acknowledgment". Automatic laser shutdown means that automatic laser shutdown is permitted when the optical interface board does not bear services or the optical fiber is faulty. Its service life can be prolonged by decreasing the on time of the laser. In shutdown period, the laser will start automatically every other a period of time (off time) to test whether the line is normal. In the laser shutdown period, the test function can be manually started immediately (by clicking ) without the off time. The NMS will test whether the service over the fiber is restored to normal. If yes, the laser will be turned on again and starts working normally. If no, the laser will be shut down again after continuous light emitting after a certain period of time (continuously on time). The on and off time of the laser during automatic test can be set on the NMS . Automatic Level Control. A technique (procedure) to automatically reduce the output power of optical amplifiers to avoid exposure to hazardous levels.
Issue 02 (2009-10-23)
A-5
Automatic switching
When a fault occurs to the line, the line board will detect SD (signal deterioration) or SF (signal failure) condition and then report it to the SCC board that will generate K byte and send it out via the line board according to APS protocol. The line boards of other nodes will report it to the SCC board after receiving K byte. Finally SCC board will specify the switching status of the node according to protocol, and send command to XCS board to perform the switching of payloads. Fault restoration. After switching restoration time, this protection sub-network will switch to the working route and resume normal working status. Auxiliary Equipment
AUX
A.3 B
BER Binding Basic Encoding Rules In virtual cascaded payload configuration, designating one bind number to identify the VC4s of the same virtual cascaded payload is called "bind". If a fault occurs to one of the bound services, all bound services will switch as a whole. The bind ID is of 1-24 characters. On the same NE, the bind ID is unique. However, the bind IDs of the same virtual cascaded payload on the passed NE can be different. Basic Input/Output System Bit error means that an error occurs to some bits in the digital code stream after being received, judged, and regenerated, thus damaging the quality of the transmitted information. Building Integrated Timing Supply System Business Management Layer The VC Trunk refers to the 2M paths which are bound together to transmit the Ethernet data. The VC Trunk is an entity between the Ethernet port and the 2M path. It is introduced for the use of the routing and convergence functions in the future. Each ET1 has eight Ethernet ports and each ET1 board can be configured with up to 16 VC Trunks. The number of VC12s assigned to each VC Trunk are configurable. As in the networking application one ET1 board can provide 48 VC12s at most, one VC Trunk can be configured with up to 48 VC12s, with the corresponding bandwidth as 100M, of which the payload bandwidth is 90M. The specific configuration is dependent on the bandwidth that users need. On the same ET1 board, one VC12 can be assigned to only one VC Trunk. The unidirectional services from one service source to multiple service sinks are called the broadcast service. Since the tone interface provided by the TDA board does not contain such call and control signals as ringing current and signaling, it is only applicable to the semi-permanent connection between the equipment with the tone interface, either point-to-point private line connection or point-to-multipoint broadcast connection. Broadcast service is a wide application of the TDA board. For example, in a paging center, the TDA board is adopted to sent the signals to the TDA boards of other stations via fibers, and send the received signals to the wireless paging transmitters for further transmission. Backbone WDM System
Broadcast service
BWS
A-6
Issue 02 (2009-10-23)
A.4 C
CAR CC CDE Charging zone Class of Service Committed Access Rate Continuity Check Common Desktop Environment The time zone between the start time and end time of charging. Class of Service. CoS keeps the priority mapping rules. It works in internal ports, especially when there is congestion, CoS is even more important. The services at different levels are processed according to the corresponding priorities. The service with higher priority is processed first and the service with lower priority is discarded when the bandwidth is insufficient. The login mode of a client, which includes the single-user mode and multi-user mode. By default, the login mode is the multi-user mode. It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc) transporting Ethernet services have the same server trail. It refers to the data that configures the NE hardware for coordination between this NE and other NEs in the entire network and operation of specified services. Configuration data is the instruction file of NEs, and it is the key for efficient network running.? The typical configuration data includes board configuration, clock configuration and protection relationship. Common Object Request Broker Architecture. See Class of Service Cyclic Redundancy Check. Cyclic Redundancy Code. An alarm that is uncleared and unacknowledged, uncleared but acknowledged, or cleared but unacknowledged. For each performance parameter of each performance monitoring entity, the NE provides two types of registers:(1) 15-minute register: Accumulates the performance event data within 15 minutes;? (2)24-hour register: Accumulates the performance event data within 24 hours Each type of register can be further divided as follows:(1) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changed within the monitor period.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full, the register storing the earliest history data will be overwritten.? The performance data stored in the current register is called current performance data. A subset of the main topology view, which contains network entities such as NEs, the NMS or submaps. The network administrator needs to customize custom views and select managed network entities from the main topology view. Coarse Wavelength Division Multiplexing
Custom View
CWDM
Issue 02 (2009-10-23)
A-7
A.5 D
D32 D40 Data Communication Channel 32-channel Demultiplex Unit 40-channel Demultiplexing Unit Data Communications Channel. The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to transmit information on operation, management, maintenance and provision (OAM&P) between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the 192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12 is referred to as the 576 kbit/s DCCM channel. The data interface service works in point-to-point mode. The service that uses the F1 byte or some undefined bytes to transmit information such as call charge, network management system information and power supply monitoring. It is the NE configuration data saved on the SCC board of the OptiX equipment, which can be uploaded on the NMS and then saved in the NMS. See Data Communication Channel Data Communication Network. Digital Distribution Frame Digital Data Network. Delete the association between the logical systems of the protection sub-network and the NE . After deletion, such functions as deleting optical fiber and re-uploading NE data are available. The command is not sent to NE and has no effect on the service. After configuring, search the protection sub-network again, and then search the trail in the trail view to create the original service. Delete the logical systems of the protection sub-network and the NE and delete all the related services.? A deleted protection sub-network cannot be restored but can be reestablished. After successfully deleting it, the SDH NNI becomes an isolated node and has no effect on service. After creating the isolated node as SDH NNI again, the SDH NNI can be found again in the trail view.
Data on NE DCC DCN DDF DDN Delete protection subnetwork at network layer
Delete SDH NNI on NE Delete the SDH NNI and all its service directly, and can not resume them later. side Device set It is an aggregate of multiple managed equipments.? Device set facilitates the authority management on devices in the management domain of the NMS. If some operation authorities over one device set are assigned to a user (user group), these operation authorities over all devices of the device set are assigned to the user (user group), thus eliminating the need to set the operation authorities over these devices respectively. It is suggested to design device set according to such criteria as geographical region, network level, device type, etc. Dynamic Gain Equalizer The cross-connection that exists on an NE but cannot form trails on the network management system.
A-8
Issue 02 (2009-10-23)
Disk Mirroring
A procedure that involves duplicating data from a NetWare partition on one hard disk to the NetWare partition on another disk. Disk mirroring pairs multiple hard disks on the same channel, and like disk duplexing, writes data to both the original and secondary disk. If the original disk fails, the secondary disk automatically takes over. Disk mirroring cannot protect against failures that occur along the channel between the disks and the NetWare server, because the duplicate disks exist on the same channel. It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc) transporting the Ethernet service have different server trails. Division as per VC4 means that different timeslots in a fiber belong to different protection sub-networks. Assign timeslots, as per VC4, into different protection sub-networks. It functions to implement virtual optical path protection. It means that some of the VC4s over the fiber can be put into one protection sub-network.? For example, in an STM-16 fiber, the 1st to 4th VC4s belong to an STM-4 unprotected ring, while the 5th to 8th VC4s belong to another unprotected link. Dual Node Interconnection Dual node interconnection is an architecture between two rings where two nodes in each ring are interconnected. The two interconnections between the two rings can be arranged to provide protection of the traffic crossing from one ring to the other. The service between ring networks can be classified into the Single Node Interconnection (SNI) mode and the dual node interconnection (DNI) mode. The former can be protected in line protection mode. However, in this mode, protection is only valid for fiber and optical transmitting/receiving ports, and protection fails in the case of interconnection node failure. In the latter mode, specific regulations on the protection mode for the inter-ring service are made in G.? 842 Recommendation. It regulates the protection modes of the two interconnection nodes both on a MSP ring or a PP ring, therefore, by adopting the recommended protection modes, the protection of the interconnecting service between two ring networks composed of the devices of different manufacturers and in different protection modes can be realized. Moreover, in case of fiber failure or node failure, services can also be protected Destination (signalling) Point Code Dynamic Random Database Digital Signal, Level n Dispersion Slope Equalizer Dense Wavelength Division Multiplexing
DNI DNI
A.6 E
EGT EML EMS Environment Monitor Unit Gigabit Ethernet Transparent Transmission Board Element Management Layer. Element Management System. As one type of power and environment monitoring unit, EMU is installed on the top of the equipment cabinet to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, etc. can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately.
Issue 02 (2009-10-23)
A-9
Ethernet Private Line Ethernet Private LAN Enterprise System Connection The ET1 (Ethernet Transparent Transmission Unit) has eight 10M/100M standard Ethernet interfaces (in compliance with the IEEE 802.? 3 recommendation). Its applications are as follows:(1) The ET1 board can map the Ethernet frames of 1 to 8 10/100Base-T ports into 1 to 48 2Ms.? Where, each network port can also be mapped into 1 to 48 2Ms.? The ET1 board can perform bandwidth separation and management for users in VLAN mode. In this way, different users can be differentiated in the same 10M/100M signal so as to manage the bandwidth. Besides, the VLAN-based port bandwidth sharing and statistical multiplexing can be realized.? (3) As the Ethernet frames are mapped into N 2Ms (N=<48) and transmitted in the same point-to-point mode as the SDH, the protection capability of the SDH can be fully used. The board attributes include tributary loopback, path protection, path impedance, retiming work mode, SXT work mode, path service type, code pattern, path phase lock, input type equalization, tobe-sent J2, to-be-received J2, ser It is the MAC port to MAC port Ethernet service transparent transport trail provided by multiple SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc). The processing board and wire led-out board are separated in the Ethernet interface unit. Therefore, when different interfaces are needed, if the 100M optical interface is to be used or more network interfaces are to be added for example , now it only needs to replace or add the corresponding wire led-out board. It not only saves costs for users but also facilitates the upgrade and maintenance.? The ET1 board has two types of interface boards: ETF4 and EFF4. As the Ethernet service outlet board of the Ethernet transparent transmission interface unit, they have the following functions: 1. Support the access of four 10/100Base-T Ethernet services (ETF4 board); Support the port self-adaptation function; Support port full duplex and half duplex; 2. Support the access of four 100BaseFX Ethernet services (EFF4 board); Provides the single-mode/multimode optical interface; Support the automatic shutdown function of multimode optical interface. Ethernet Virtual Private Line Ethernet Virtual Private LAN Exercise switching is used to test whether a switching protocol can work normally and no switching operation is really conducted. This command exercises ring protection switching of the requested channel without completing the actual bridge and switch. The command is issued and the responses are checked, but no working traffic is affected. This command exercises span protection of the requested channel without completing the actual bridge and switch. The command is issued and the responses are checked, but no working traffic is affected.
Exerciser - Span
Extended IP address of It is the serial number of a sub-network where an NE resides, which is usually used to NE distinguish different network segments in a WAN. An extended ID and an ID form the physical ID of an NE.
A-10
Issue 02 (2009-10-23)
An unprotected chain like ADM-ADM-TM or ADM-ADM-ADM. The end-point NEs of a link is of the ADM type. As this type of protection subnetwork can be extended, we name it extended protection subnetwork. For a chain protection sub-network, the logical systems at the two ends should be configured as TM, with only the one in the middle configured as ADM. But in the process of practical engineering installation, the networking equipments at the bottom layer may arrive in different batches. Thus the part of no protection line is not available, but the service on it needs activating gradually during project building.? Then, another protection sub-network is needed to support the incomplete protection sub-network. As it is can be extended, we name it extended protection sub-network. The NMS can support searching for it, deleting it and deleting it from network layer but creating it. When the new equipment arrive, the user should delete it from network level and search for protection sub-network and trail once more.
A.7 F
F1 byte It is the user path byte, which is reserved for the user but usually it is special for network providers. It is mainly used to provide the temporary data/voice path for special maintenance Objectives. It belongs to the regenerator section overhead byte. They are the path user channel bytes. These two bytes provide the user with the communication between path units related to payload. They belong to the higher order path overhead byte. Fault Management,Configuration Management,Accounting Management,Performance Management,Security Management Frequency Diversity Flash Database Forward Error Correction Fiber & Cable is the general name of optical fiber and cable. It refers to the physical entities that connect the transmission equipment, carry transmission objects (user information and network management information) and perform transmission function in the transmission network. The optical fiber transmits optical signal, while the cable transmits electrical signal.? The fiber/cable between NEs represents the optical fiber connection or cable connection between NEs. The fiber/cable between SDH NEs represents the connection relation between NEs. At this time, the fiber/cable is of optical fiber type. A very common method of moving files between two Internet sites. FTP is a special way to log in to another Internet site for the purposes of retrieving or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP. This function forces the service to switch from the working channel to the protection channel, with the service not to be restored automatically. This switch occurs regardless of the state of the protection channels or boards, unless the protection channels or boards are satisfying a higher priority bridge request.
F2, F3 bytes
Forced switch
Issue 02 (2009-10-23)
A-11
It is to forecast the laser performance within a certain period of time on the basis of the collected laser performance data and according to a certain performance model so that you can replace the laser in time if necessary.? The forecast can be roughly divided into two types: 1. Forecast the bias current, input optical power and output optical power at a moment in future; 2. Forecast the period of time which is taken for the bias current, input optical power and output optical power to reach the specified value. See File Transfer Protocol The system that can transmit information in both directions on a communication link.On the communication link, both parties can send and receive data at the same time. In the full searching mode, all the trail information at the NM side will be deleted first (but the service configuration information of respective NEs is saved at the NM side). Then the service configuration information of respective NEs at the NM side is researched to form the trail information in the network. In the full search mode, all the trail information on the NM side will be deleted first (Only the trail information at the network layer on the NM side are deleted, while the service configuration information of NE in NE layer on the NM side and on the NE side still remain). Then the service configuration information of respective NEs in the NE layer on the NM side is re-searched to form the trail information in the network layer on the NM side.
Full search
A.8 G
Gateway ID Gateway NE A gateway ID refers to the ID of an NES serving as a gateway. Gateway NE refers to the NE that communicates with the NMS via Ethernet or serial port line. The non-gateway NE communicates with the gateway NE via ECC and communicates with the NMS via the gateway NE. The gateway NE is a communication route that the NMS must pass through when managing the entire network. The communication status between the gateway NE and the NMS can be:(1) Normal: The current communication is efficient;? (2) Connecting: The destination gateway responds, and the communication is interrupted but is being connected;? (3) Disconnected: The destination gateway does not respond (Maybe the network cable is disconnected or not within the same network segment), and the communication is unreachable or the gateway is disabled manually. Global Cluster Manager Gigabit Ethernet. Gate Network Element Graphical User Interface.
A.9 H
HA Half duplex History Alarm High Availability. On the communication link, only one party can send data, while the other party can only receive data. An alarm that is acknowledged and cleared.
A-12
Issue 02 (2009-10-23)
For each performance parameter of each performance monitoring entity, the NE provides two types of registers:(1) 15-minute register: accumulating the performance event data within 15 minutes;? (2) 24-hour register: accumulating the performance event data within 24 hours.? Each type of register can be further divided as follows:(2) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changes within the monitor period.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full, the register storing the earliest history data will be overwritten.? The performance data stored in the history register and the auto-report performance data saved on the NM are called history performance data in a unified way. The hotline phone number can be called immediately by picking up only, but not by dialing. Hot-Standby Hyper-Text Transmission Protocol
A.10 I
Idle resource optical NE When the NMS is started successfully, an NE icon called "Idle ONE" will be displayed on the topological view.? In this NE, the subracks and boards that are not divided to other optical NEs (such as OTM, OADM and other NEs) are retained. In this NE, idle DWDM subracks and boards are reserved, which can be distributed to other ONEs. Double-click the NE icon to view all the currently idle DWDM subracks or boards in the network. Internet Group Management Protocol. Inverse Multiplexing for ATM. Integrated Management Application Platform. In this search mode, the network management system first reserves the trail data of the current client and then re-searches the service configuration data of respective NEs on the network management system according to the newly given search condition to form the new trail data and combine it with the original trail data to get the result. The incremental mode means to compare the trail information of the NM side with the service configuration information of respective NEs at the NMS side. If inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information of the NMS side which has not formed the trail information. The increment search mode means to compare the trail information in network layer on the NMS side with the service configuration information of respective NEs on the NMS side. If they are inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information that has not formed the trail in the NE layer on the NMS side.
Incremental mode
Incremental search
Issue 02 (2009-10-23)
A-13
The optical wavelength inter-board channel protection is mainly implemented by the SCC judging the alarm report in the line of the wavelength conversion board to turn off the laser in the tributary of the board. The dual fed is implemented by adding a passive optical splitter to the tributary. The signal selection is implemented by the SCC turning off the laser in the tributary with poorer signal quality according to the signal quality of the lines of two wavelength conversion boards, and letting the channel of light with higher quality pass through the coupler. The coupler is also a passive device and only one channel of light can pass through it. If there are two channels of light passing through the coupler, they will interfere each other that would cause bit error to the service. Therefore, it is necessary to ensure that only the channel of light with higher quality pass through the coupler at a destined time. It refers to the equipment used for optical fiber management and dispatch in the metropolitan area. It has multiple pairs of interfaces for the optical fiber connection. Every two interfaces in a pair are connected with each other to form a longer physical optical fiber path. The physical optical fiber path connecting the transmission equipment can comprise two or more sections of optical fiber cascaded via the intermediate office. There is an intermediate office information list for some fiber & cable connections, which shows the section information about the fiber & cable. The intra-board optical wavelength path protection is mainly implemented by the wavelength conversion board with dual fed and signal selection function. The dual fed is implemented by the optical divider inside the board, while the signal selection is implemented by the board turning off the laser of one of the receiving optical interfaces. Therefore, this protection mode is also called optical wavelength intra-board channel protection. The switching in this protection mode can be completed within a short time, but the services must be interrupted during the maintenance of the damaged boards or devices. Therefore this protection mode will have a relatively lower reliability. Intelligent Optical Network Internet Protocol. In the TCP/IP protocol, it is used to uniquely identify the 32-bit address of the communication port, An IP address consists of a network ID and a unique host ID. An IP address consists of the decimal values of its eight bytes, separated with periods; for example,192.168.7.27. Intelligent Power Adjustment Integrated Services Digital Network. A type of special NE or an optical port on an NE. An isolated node does not refer to an isolated NE, instead, it refers to a type of special logical system which does not belong to any protection sub-network or SDH NNI.? It is the node that has been configured on the NE side but cannot form (or has not formed) a corresponding protection sub-network with other nodes. This node may be either an NE or a logical system on the NE.? An isolated node may be formed when:(1) There is something wrong with the configuration information of the NE side;? (2) The fiber/cable connected to this node has not been created on the NMS.? The sub-network where this node resides is of unprotected type. Interleaver Unit International Telecommunication Union-Telecommunication Standardization Sector
Intermediate office
ION IP IP address
ITL ITU-T
A-14
Issue 02 (2009-10-23)
A.11 L
LAN LCAS LCD LCT LDG LLID Lock NE login Lock NE setting Local Area Network. Link Capacity Adjustment Scheme Liquid Crystal Display Local Craft Terminal 2xGigabit Ethernet Unit Locate Loopback ID This function prohibits the users at lower levels from logging in NE and forces logged NE users with lower level to log out. It is to divide the NE into the configuration module, alarm module, performance module and other modules.? You can lock the setting function of these modules, disabling other NM clients from setting the locked modules. Services are not switched to the protection board or channel when a fault occurs, if currently no switching takes place. If currently the switching takes place, after the working board or channel recovers to normal, the services are not switched back to the working board or channel. When the switching condition is satisfied, this function disables the service from being switched from the working channel to the protection channel. When the service has been switched, the function enables the service to be restored from the protection channel to the working channel.
Lock status
Lock Switching
Logical system relation It is to set the logical protection relation of two linear multiplex section types. NE logical systems and their logical protection relation will be generated when defining the NE logical system relation LOS LPT LQS LSP LWC LWF LWM LWS LWX Loss Of Signal Link-state Pass Through 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board Label Switching Path STM-16 Line Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Multirate Optical Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Arbitrary Bit Rate Wavelength Conversion Unit
A.12 M
M32 M40 MAC port
Issue 02 (2009-10-23)
32-channel Multiplex Unit 40-channel Multiplexing Unit Media Access Control, that is a media access control port, such as the 8 ports of ET1.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. A-15
Manual switching
When the protection channel is efficient and there is no higher-level switching request, services are manually switched from the working channel to the protection channel, thus testing whether the network still has the protection capability. Under suppression status, NE will not monitor the corresponding alarm conditions and the alarm will not occur even when the alarm conditions are met. Bandpass Filter Expandable 2-Channel Optical Add/Drop Multiplexing Board Multi-channel Spectrum Analyzer Unit Memory Database Medium Dependent Interface Message Dispatch Process Manager Management Information Base. Man-Machine Language. Managed Object. MOdulator-DEModulator. Managed Object Instance Tree. Monitor A logical port which achieves transparent transmission of the MAC service over SDH, for example, the 16 ports of the ET1. Multi-Protocol Label Switching 2-channel Add/Drop Unit Multiplex Section The WDM network node that has the spectrum analysis unit in the link for which the ALC function is configured. The node is unique on the ALC link. See Multiplex section protection Mean Time Between Failures. Mean Time to Recovery. It is a protection mode in which multiple services with different trails but with the same sink protect an important service with the same sink.? This protection mode supports protecting important services through non-optical network trails, such as microwave. It presently supports that three protection trails protect one service trail.? At the trail sink, it monitors the quality of protection trail signals and protects important services according to the priority and the signal quality.? The most significant characteristic of the multi-service protection trail is: Flexible networking. It supports either the protection trail passing the line board or the protection trail passing the tributary board.? It supports the trails other than the optical ones, for example, a microwave trail, to provide protection. The nodes online achieve protection switching through the K1 and K2 bytes in the multiplex section,? including linear 1+1 MS protection switching link, linear 1:n MS protection switching link, dedicated MS protection ring and shared MS protection ring.
Masking status MB2 MCA MDB MDI MDP Mgr MIB MML MO MODEM MOIT MON MP port MPLS MR2 MS MS node MSP MTBF MTTR Multi-trail protection service
A-16
Issue 02 (2009-10-23)
A.13 N
NE NE database See Network Element There are three types of database on NE SCC board as following:(1) DRDB: a dynamic database in a dynamic RAM, powered by battery;? (2) SDB: a static database in a powerdown RAM;? (3) FDB0, FDB0: permanently saved databases in a Flash ROM.? In efficient operation, the NE configuration data is saved in DRDB and SDB at the same time.? Backing up an NE database means backing up the NE configuration data from SDB to FDB0 and FDB1.? When an NE is restarted after power-down, the NE database is restored in the following procedures: As the SDB data is lost due to power-down, the main control restores the data first from DRDB.? If the data in DRDB is also lost due to the exhaustion of the battery, the data is restored from FDB0 or FDB1. In a network, each NE corresponds to a unique identifier, The NM uses NE ID, in an interface or a database, to identify various NEs in a network. It is the NE configuration data saved in the NM database. Consistency between the data on the NM side and that on the NE side is the precondition of efficient running of the transmission equipment.? If there is any data on the NE side, the NMS can save such data in the NE layer on the NM side through the upload function, thus forming the NE layer data on the NM side.? If there is no data on the NE side, the NMS can send the NE layer data on the NM side through the upload function, thus forming the data on the NE side.? Meanwhile, the NE layer data on the NM side is one of the important data sources of the network layer data on the NM side. The NE configuration data saved on the SCC board of the equipment, which can be uploaded to the network management system and then stored in databases on the network management system NE side. Network Element Level It is the network element, including the hardware unit and the software running on it. Usually, one NE has at least SCC (System Control & Communication Unit) board which responsible for the management and monitoring of the NE. The host software runs on the SCC board. Network entity refers to the universal basic devices used to describe the functions and structure of the transmission network, which considerably facilitates the description of the network. The network entities include transmission object and sub-network.
NE ID NE layer data on NM
NE side
Network entity
Network layer data on It is the network configuration data saved in the NM database and is the data source for NM the network function of the NMS.? The network layer data on the NM side includes three parts: fiber connection data, protection sub-network and SDH NNI data and trail information. Network Node Interface NM NML NMS NNI NSAP
Issue 02 (2009-10-23)
Network Node Interface. The interface at a network node which is used to interconnect with another network node. See also NNI. Network Management Network Management Layer Network Management System. See Network Node Interface Network Service Access Point
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. A-17
Network Time Protocol Usually,the NMS can work out multiple trails which comply with the requirements according to the route restriction. The user can select one of them. The number selected here is the maximum number of optional routes which is worked out by the NMS .
A.14 O
OA OADM OAM OAMS OAU OBU OCH OCP OD ODU ODUk OEQ Office OIF OLA OLP OM OMS OMU ONE Operation set Optical Amplifier Optical Add/Drop Multiplexer Operations, Administration, and Maintenance Optical fiber line Automatic Monitoring System Optical Amplifier Unit Optical Booster Board Optical Channel Optical Channel Protection Optical Demultiplexing Optical Demultiplexing Unit Optical Channel Data Unit-k Optical Equalizer To facilitate management and show the actual physical relation of the equipment, all the NEs in respective actual transmission equipment rooms are grouped into offices. Optical Internetworking Forum Optical Line Amplifier Optical Line Protection Optical Multiplexing Optical Multiplexing Section Optical Multiplexer Unit Optical Network Element A collection of multiple client operations. Operation set facilitates authority management in the NMS system. Since different client operations have different influences on system security, the operations with similar influence on system security are added in an operation set. In this way, if the authority in this operation set is assigned to a user (user group), the user (user group) will have the authority of all operations in the operation set.? The NMS has a default operation set. If the default operation can not meet the requirement for authority assignment, the user can create a new one.
A-18
Issue 02 (2009-10-23)
Optical NE
Optical Network Element (ONE) is the transport entity that implements the NE functions (terminal multiplexing, add/drop multiplexing, cross-connection and regeneration) in a DWDM layer network. The types of ONEs include OTM, OADM, OLA, REG and OXC. The locating of an ONE is equivalent to that of a common NE.? In a view, an ONE is displayed with an icon, like a common NE and its alarm status can be displayed with colors. Logically, an ONE consists of different subracks.? Like a common NE, an ONE cannot be expanded or entered like a sub-network.? Similar to a common NE, an ONE provides a list of the subracks that form the NE to display the board layout. Optical Supervision Channel is an independent optical channel in the DWDM system, which achieves the management function similar to the frame overhead bytes in the SDH system.? Optical monitor channel features independence of traffic channel.? In the optical signal transmission direction, the optical signals of the supervisory channel and the multiplexed and amplified optical signals of the service channel are converged to the backbone transmission fiber. In the optical signal receiving direction, the optical signals of the supervisory channel are split first and then the service channel is preamplified and demultiplexed.? Therefore, in DWDM transmission system the monitor channel optical signals are not amplified, but they are terminated and regenerated at each site. However the service channel optical signals are on the contrary. They are amplified many times during the transmission, but they are not terminated or regenerated. It is the end-to-end optical wavelength. After creating the fiber/cable among the DWDM equipments, the optical trails OCH, OTS and OMS are available at the same time, so you do not need to create/search for any more optical trail. Optical Channel Payload Unit-k The called party in communication receives the call prompt (BB tone) of the third party, he can directly press the "#" key to clear the line currently in communication and then establish the communication with the break-in party. The phone with the forced breakin authority can be used to break in the phone forcedly by dialing "# + phone number". Orderwire authorized break-in cannot be done unless no hotline or private telephone is set on the corresponding Phone port. Optical Supervisory Channel The SC1 or SC2 board, which is responsible for ALC protocol byte processing. Operation System Function Open Systems Interconnection. Optical Switch Node Optical Signal to Noise Ratio Optical Time-Domain Reflectometer Optical Terminal Multiplexer Optical Trassmission Network Optical Transmission Section Optical Transponder Unit Optical Channel Transport Unit-k
Optical trail
OSC OSC board OSF OSI OSN OSNR OTDR OTM OTN OTS OTU OTUk
Issue 02 (2009-10-23)
A-19
A.15 P
P2P PC PDH PE Performance register Point To Point Personal Computer Plesiochronous Digital Hierarchy Provider Edge. Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history performance register, 24-hour history performance register, UAT register and CSES register. The object of performance event monitoring is the board functional module, so every board functional module has a performance register. A performance register is used to count the performance events taking place within a period of operation time, so as to evaluate the quality of operation from the angle of statistics.
Performance threshold Performance events usually have upper and lower thresholds. When the performance event count value exceeds the upper threshold, a performance threshold-crossing event is generated; when the performance event count value is below the upper threshold for a period of time, the performance threshold-crossing event is ended. In this way, performance jitter caused by some sudden events can be shielded. A few performance events only have one threshold, which is the special case that upper threshold and lower threshold are equal. PM PMU Port inversion Performance Monitoring See Power Monitor Unit It is to set port alarm monitoring as contrary to the practical situation. If an alarm is raised, it is reported normally. This function applies to a port configured with but not loaded with services to prevent the generation of any meaningless alarm that will interfere with alarm analysis. The power and environment monitoring unit is installed at the top of the cabinet of the SDH equipment and is used to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, etc. can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately. For the equipment installed with a power & environment monitoring board, the following parameters can be set: relay switch output control, temperature alarm threshold, relay usage and alarm setting, query of DIP switch status, etc. As one type of power and environment monitoring unit, PMU (short for Power Monitoring Unit) is installed on the OptiX 155/622B, the OptiX 155/622, the OptiX 2500, the OptiX 2500+, the OptiX BWS 320G NE, and the OptiX 10G(Metro 5000). Both communication parties are connected permanently. In case the service route provides multiple service protections, different protection strategies can be selected as required. Protection strategy refers to the protection mode given the priority in use for the trail: protection, no protection, and extra traffic. Of the above, the protection preference is divided into trail protection and sub-network connection protection.
A-20
Issue 02 (2009-10-23)
Protection sub-network In the NMS, the protection sub-network becomes a concept of network level other than multiplex section rings or path protection ringsin the original NES or RMS+ NMS. The protection sub-network involves NEs and fiber/cable connections. In other words, the resources that form a protection sub-network include NEs and fiber/cable. Only after the NE is created, the basic configurations for the NE is done and the fiber & cable connections among NEs are correctly set up, enough resources can be available for the creation of a protection sub-network. These are the preconditions for creating a protection sub-network. From the viewpoint of logical system, the creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection sub-network, the optical interfaces (or VC4) of each board are mapped into the logical system, and then these independent logical systems are connected with one another to form a complete network structure. Protocol controller status Prototype trail Start or stop status of the protocol controller of the protection sub-network, including such statuses as not started, protocol start, protocol is starting, part start. The prototype trail is the server layer trail, and those listed are all server layer trails that satisfy the source/sink and board conditions. If the centralized route has been selected in the first step, only one prototype trail needs to be selected here. The system will automatically find out other trails whose routes are consistent with the selected prototype trail, and If the amount found can not meet the bandwidth requirement, the system will automatically copy the prototype trail. If the separated route has been selected in the first step, prototype trails as many as the number of bandwidths should be selected. Public Switched Telephone Network. Permanent Virtual Path. Pseudo Wire Pseudo-Wire Edge-to-Edge
A.16 Q
QoS Quality of Service.
A.17 R
RAS RDMS Remote Network Monitoring (RMON) RES Resource sharing Remote Access Server Relational Database Management System A manage information base (MIB) defined by the Internet Engineering Task Force (IETF). RMON is mainly used to monitor the data flow of one network segment or the entire network. Resume Resource sharing means that a physical resource may belong to two protection subnetworks.
Issue 02 (2009-10-23)
A-21
Route
The IP route selection is in table driving mode. In each host and each router of the Internet, there is a routing table that contains information about how the service is transmitted from the source to the sink, providing a basis for route selection.? Ethernet static routing in ET1 refers to the mapping relationship between the Ethernet port and the bound path.? Its routing type includes port routing and VLAN routing.? Port routing: It means configuring a route between the Ethernet port and the bound path port, which is usually used for point-to-point networking communication;? VLAN routing: It means configuring a route between the Ethernet port and the bound path port based on the VLAN service. It can be used flexibly in point-to-point, point-to-multipoint or multipoint-tomultipoint communication. The implementation is to divide and converge the data stream according to the VLAN flag of the packet. As a VLAN flag can be added to the Ethernet port, the equipment can be applied more flexibly. The constraint conditions for calculating a route. When creating a trail, the user can specify the explicit route and the NEs that the trail cannot pass. The explicit route and the NEs are the constraints for calculating the route. The inevitable trail only functions when the number of routes is calculated as 1. Double-click the NE icon can set the NE as an NE that cannot be passed, and double-clicking it again can cancel the setting. Resilient Packet Ring. Regenerator Section The 25-pin interface standard that is defined by EIA. In the asynchronous transfer mode and there is no hand-shaking signal. It can communicate with RS232 and RS422 of other stations in point-to-point mode and the transmission is transparent. Its highest speed is 19. 2 kbit/s. The specification that defines the electrical characteristics of balanced voltage digital interface circuits. The interface can change to RS232 via the hardware jumper and others are the same as RS232. Rapid Spanning Tree Protocol Resource Reservation Protocol. Radio Transmission Node Rational Unified Process
Route restriction
RPR RS RS232
RS422
A.18 S
S1 byte In an SDH network, each network element traces step by step to the same clock reference source through a specific clock synchronization path, thus realizing the synchronization of the whole network. If a clock reference source traced by the NE is lost, the clock of this NE will trace another clock reference source of lower level. To implement protection switching of clocks in the whole network, the NE must learn about the clock quality information of the clock reference source it traces. Therefore, ITU-T defines S1 byte to transmit the network synchronization status information. It uses the lower four bits of the multiplex section overhead S1 byte to indicate 16 types of synchronization quality grades. The specific coding information is shown in the following table. Auto protection switching of clocks in the synchronous network can be implemented by using S1 byte and following the certain switching protocol.
A-22
Issue 02 (2009-10-23)
The APR/IPA safe switch is set in consideration of the long-span networking requirement, which cannot allow too low output optical power. If the safe control switch is turned off, APR/IPA restarting optical power is the specified output power of the OAU. Otherwise, the APR restarting optical power is restricted to less than 10dBm. Storage Area Network Single Directional Optical Supervising Channel Unit Dual Directional Optical Supervising Channel Unit System Control & Communication Unit System control & Communication Unit for Extended Subrack It is the text file describing the physical information and configuration information of the entire network, including the NE configuration file, port naming file, end-to-end configuration file, NE physical view script file, NMS information file and service implementation data script file. Sync Optical Channel Separator Board SD refers to signal degradation.? The multiplex section protocol defaults to start switching in case of signal loss.? In practice, signal degradation severely affects some services, so protection switching is needed. Or, you can turn off this trigger condition through the switch to avoid MS switching when the signal degrades. Synchronous Digital Hierarchy. SDH Network Node Interface. It is applied to build communications connection with the equipment beyond the NMS management area.? Usually, the NMS creates a protection sub-network by creating a logical system on the port of an idle line board, and the NE must be a TM without protection and fiber connection.? Though both the SDH NNI and the isolated node are implemented via the logical system, the isolated node is a logical system not belonging to any protection sub-network or SDH NNI. An isolated node satisfying specified conditions can be used to create an SDH NNI, and a node is independent when the SDH NNI is deleted from the network layer. SDH NNI is widely used in the 10GV2, because no tributary board is available. An SDH NNI should usually be created to support the E4 service. As no logical system is available in the 10GV2, the SDH NNI is fulfilled only on the NMS side, without providing the searching function. Search field refers to the range of IP addresses being searched. In the TCP/IP, the IP addresses include:Category A address (1.0.0.0---126.255.255.255). For example, 10.*.*.*, whose search field is 10.255.255.255, all 10.*.*.* to be searched. Category B address (128.0.0.0---191. 255. 255. 255). For example, 129.9.*.*, whose search field is 129.9.255.255, all 129.9.*.* to be searched.Category C address (192.0.0.0---223. 255. 255. 255). For example, 192.224.9.*, whose search field is 192.224.9.255, all 192.224.9.* to be searched.Category D address (224.0.0.0---230.255.255.255), which is reserved.Category E address (240.0.0.0---247.255.255.255), which is reserved.Net-id 127.*.*.*, in which .*.*.* can be any number. This net-ID is a local address. In this search mode, the NMS re-searches the trail data displayed by the current client according to the given search conditions, helping the customer find the trail data which interests him the most. Serial Line Interface Protocol, defines the framing mode over the serial line to implement transmission of messages over the serial line and provide the remote host interconnection function with a known IP address.
Search domain
Issue 02 (2009-10-23)
A-23
Serial port extended ECC Server layer trail and client layer trail
The ECC channel realized by means of serial port. There is an inclusion relation between the trails of different levels, e. g. a trail of a certain level contains multiple trails of lower levels. In such a structure, the upper level trail bearing another trail of lower level is called the server layer trail, while the lower level trail is called the client trail. In the 1600G system, it is the route of a service clock from the source to the sink.? The working route can be in the form of point-to-point or broadcast (That is, an input clock source corresponds to multiple output clock sources). When pass-through services are configured on the newly added nodes, the mode of highorder or low-order to pass through can be selected.? When the VC12 service over a VC4 exceeds a preset threshold, higher order cross-connect is selected, otherwise lower order cross-connect is selected. When the services are not VC12 ones, they shall be converted into VC12 equivalents. For example: if there are 2 VC3 and 4 VC12 services on a VC4, there should be 21*2+4 = 46 VC12 services. If the threshold value is 42, pass-through of this VC4 shall be made through higher order cross-connect. The payload loading indication is used to set the path of the tributary board. Usually it is used for path alarm suppression. When the tributary payload loading indication of this path is set as "Unloaded", alarms of this path related to the service can be suppressed. See Serial Line Interface Protocol Optical Supervisory Channel Unit Service Management Layer Secondary Metro Node Service Management System Simple Mail Transfer Protocol. Sub-Network Connection Multiple Protection See Sub-network connection protection Set the SNC node on the protection sub-network to support sub-network connection protection that spans protection sub-networks. The SNCP node of the ring sub-network can support electric circuit dually feed and selectively receive a timeslot out of the ring, thus implementing sub-network connection protection. The SNCP node is generally set on the node on the line board with the path protection type of the dual fed and selectively received. Sub-Network Management Layer Subnetwork Management System Synchronous Optical Network
Service loading indication SLIP SMC SML SMN SMS SMTP SNCMP SNCP SNCP node
A-24
Issue 02 (2009-10-23)
Spread type
The spread type of ATM service includes point-to-point (p2p) and point-to-multipoint (including p2mpRoot and p2mpLeaf). The p2p spread type supports real-time bidirectional communication service. The two communication parties are in the same status and participate the session actively. p2mpRoot and p2mpLeaf belong to the point-tomultipoint spread type. It supports point-to-multipoint multicast service. During the creation of a point-to-multipoint (multicast) connection, a connection to identify this group of connections is necessary. This connection is a p2mpRoot connection, while other connections are p2mpLeaf connections. If there is a p2mpLeaf connection in a group of connections, the p2mpRoot cannot be deleted. To create a multicast connection, the p2mpRoot connection must be created before the creation of p2mpLeaf connection. Shared Risk Link Group Synchronization Status Message Synchronous Transport Signal Sub-network is the logical entity in the transmission network and comprises a group of network management objects.? The network that consists of a group of interconnected or correlated NEs, according to different functions. For example, protection subnet, clock subnet and so on. A sub-network can contain NEs and other sub-networks.? Generally, a sub-network is used to contain the equipments which are located in adjacent regions and closely related with one another, and it is indicated with a sub-network icon on a topological view.? The NMS supports multilevels of sub-networks.? A sub-network planning can better the organization of a network view. On the one hand, the view space can be saved, on the other hand, it helps the network management personnel focus on the equipments under their management. Sub-network connection protection uses the 1+1 mode. SNCP is of 1+1 protection mode. Payloads are transmitted simultaneously on both the working and the protection subnetwork connections. When the working sub-network connection fails, or when its performance deteriorates to a certain level, at the receiving end of the sub-network connection, the signal from the protection sub-network connection is selected according to the preference rule. Switching usually takes the single-end switching mode, thus no protocol is needed It is used to differentiate the different network sections in the sub-network conference. Actually it is the first several digits (one or two) of the user phone number. An orderwire phone number is composed of the sub-network number and the user number. A type of topology object, which contains child submaps, nodes and connections. It is displayed in the topology view as the subnet icon. The number of bits in a network prefix, also called network mask. The subnet mask is used to divide a network into different network segments, so that communication can be done only within the same network segment. In this manner, broadcast storms are suppressed. According to the subnet mask and IP address, the IP network can be classified into three commonly used classes of subnets: class A subnets with 256*256*256 IP address resources subnetted by the mask 255.0.0.0, class B subnets with 256*256 IP address resources subnetted by the mask 255.255.0.0, and class C subnets with 256 IP address resources subnetted by the mask 255.255.255.0. SERVICE VLAN
Sub-network number
SVLAN
Issue 02 (2009-10-23)
A-25
Switching priority
There may be the case that several protected boards need to be switched; thus the tributary board switching priority should be set. If the switching priority of each board is set the same, the tributary board that fails later cannot be switched. The board with higher priority can preempt the switching of that with lower priority. For the OptiX 155/622 and the OptiX 2500 equipment, there are three switching priorities: "Priority 1", "Priority 2", and "Priority 3". For the OptiX 2500+ equipment, the switching priority is classified into priorities 1 - 8, where priority 1 is the highest one, and priority 8 is the lowest one. For the OptiX 10G(Metro 5000), the highest switching priority is priority 1 and the lowest one is priority 5. It refers to the period of time between the start of detecting and the moment when the line is switched back to the original status after protection switching occurs in the MSP sub-network. Send the system time of the NMS server to NEs so as to synchronize all NEs with the server.
A.19 T
Tag/UnTag The Ethernet port that can recognize and send the packet with a 802.? 1Q tag header is called a Tag port; otherwise it is called an UnTag port. The port set as Tag can only recognize the packet with a 802.? 1Q tab header and will discard the packet without a 802.? 1Q tag header. The port set as UnTag processes the packet as an ordinary packet. Packets either with or without a 802.? 1Q tag headerscan pass through the port. For the packet with a 802.? 1Q tag header sent from the port, the UnTag port will remove its 802.? 1Q tag header, thus the packet with a 802.? 1Q tag header is converted into an ordinary packet. Unidirectional Optical Supervisory Channel And Timing Transporting Unit Bidirectional Optical Supervisory Channel and Timing Transmission Unit Time Compressed Multiplex Transmission Control Protocol/Internet Protocol Tone & Data Access Unit The TDA board can be configured with 1 - 12 two/four-wire audio interfaces (the rate is 64 kbit/s), or with 4 RS-232 and 4 RS-422 data interfaces (the maximum rate is 19.? 2kbit/s). The service added/dropped to/from these interfaces correspond to the time slots 1 - 20 of the NMS "Local 2M" (12 audio interfaces correspond to time slots 1 - 12 respectively, 4 RS-232s correspond to time slots 13 - 16 respectively and 4 RS-422s correspond to time slots 17 - 20). The TDA board occupies at least one 1 2Mbit/s, or at most 4 2Mbit/s (corresponding to 2M-1, 2M-2, 2M-3 and 2M-4 in the NMS). The corresponding time slot range of each 2M-1, 2M-2, 2M-3 and 2M-4 is 1-31. All TDA boards in the whole network can share 1 - 4 2Mbit/s, i.? e. the whole network occupies 1 - 4 2Mbit/s altogether. In order to send these tone signals and digital signals to the SDH network for transmission, it is necessary to cross-connect the local 2M (20 64 kbit/s payloads) and four 2M signals (2M-1, 2M-2, 2M-3 and 2M-4) added/dropped from the XCS- board. TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installed with the external TDA board for which the clock source must be set so that the TDA board can switch according to the set clock source sequence when clock source switching occurs.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)
A-26
It can be selected whether the audio port of the SS42TDA board is in feeding mode or non-feeding mode. When the feeding mode is selected, two lines have -48V DC feeding. After the telephone set is connected and the audio service configured, the user can make a phone call without dialing. Generally, the feeding mode is configured during test so as to connect the telephone set for test. When the non-feeding mode is selected, the nonfeeding terminal (MODEM, for example) can be connected to transmit services. Tunable Dispersion Compensator See Traffic Engineering Trail trace Identifier Mismatch If the circuit is active at the moment when the charging time zone ends, this moment is the time of deactivating the charging data circuit. Otherwise, it is the general time of circuit deactivation. TeleManagement Forum. Telecommunications Management Network. The NMS topology is a basic component of the man-machine interactive interface. The topology clearly shows the structure of the network, the alarms of different NEs, subnetworks in the network, the communication status as well as the basic network operation status. Tributary Protection Switching The network congestion is a main factor that affects the backbone network performance. It may be caused by the insufficiency of network resource or the imbalanced load of network resource. Traffic engineering is a remedy to the congestion that results from imbalanced load. It monitors the network traffic and the load of network unit dynamically, modify the traffic management parameters, routing parameters and resource constraint on a realtime basis, optimizes the usage of network resource and avoid the congestion caused by the load imbalance.
TDC TE TIM Time of charging data circuit deactivation TMF TMN Topology
It is the traffic frame discard control. Two options are provided: enable and disable. It indicates the means by which the NE discards cells when the network is congested. When the frame discard mark is closed, the cells will be discarded at the cell level; when it is opened, they will be discarded at the frame level. Here, "frame" refers to the AAL protocol data unit. A trail is a kind of transport entity, mainly engaged in transferring messages from the input of the trail source to the output of the trail sink, and monitoring the integrality of the transferred messages. According to the different levels of the trail, the trail includes various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12). Among them, OTS, OCH and OMS represent the trails in a DWDM layer network. For the ADM and TM equipment in the SDH network, each optical fiber connection corresponds to an SPI, RS or MS trail, and a trail is the general name for service carriers, including SDH and PDH services.
Trail
Trail consistency check Check whether the circuit route and the activation status of the NMS side and NE side are the same, clear the superfluous MOs and combine some of the circuits.? During network expansion, such an operation as adding fibers to the SDH NNI or configuring/ deleting services through the configuration layer will result in circuit inconsistency.
Issue 02 (2009-10-23)
A-27
It refers to the physical media such as optical fibers and NEs passed by the trail. A fault can be located for each service path by performing loopback to each path of the tributary board.? There are three kinds of loopback modes. 1. No loopback: It is the normal status. No loopback is needed when the equipment runs efficiently; 2. Outloop: When arriving at the line board after passing the input port in the local NE, the input signal is directly looped back to the service output end; 3. Inloop: The input signal is returned along the original trail from the tributary board of the target NE. Tributary Unit TU protection is of the equipment level and it uses one standby TU to protect n TUs. When the working protected board is faulty, e.? g. when board self-test fails, the board is pulled out, and the board power supply fails, etc.? , the SCC will send switching command, and the payload of the protected board can be automatically switched over to the specified protection board and the work will be accomplished by the protection board. After the fault is cleared, the service will be automatically switched to the original board. Switching priority can be set for each protected board to make the switching setting more flexible. Some operations in the tributary board protection switching will trigger some abnormal events.
TU TU 1: N protection
A.20 U
UAT UML Unavailable Time. Unified Modeling Language.
Unavailable time event It is also called Unavailable Time (UAT). A UAT event is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds. UNI Unprotected subnetwork UPC/NPC Upload UPS UPSR Usage Parameter Control/Network Parameter Control See User Network Interface It refers to a sub-network without any protection mechanism. The purpose of such configuration is to provide the basic data of trail protection for the subsequent trail management. See Usage Parameter Control/Network Parameter Control Report all or part of the configuration data of the NE to the NMS and overwrite the configuration data saved in the NE layer on the NMS side. Uninterrupted Power Supply. Unidirectional Path Switched Ring Usage Parameter Control/Network Parameter Control.During the communication, the UPC is implemented to monitor the actual traffic on each virtual circuit that is input to the network. Once the specified parameter is exceeded, measures will be taken to control. NPC is similar to the UPC in function. The difference is that the incoming traffic monitoring function is divided into UPC and NPC according to their positions. The UPC locates at the user/network interface, while the NPC at the network interface. A client user of the NMS. The user name and password uniquely identifies the operation rights of a user in the NMS.
User
A-28
Issue 02 (2009-10-23)
User group
User set refers to the set of NMS users with the same management authorities. The default user group includes: system administrator, system maintainer, system operator and system supervisor. The attributes of user set include name and detailed description.
User Network Interface UNI is the abbreviation for User Network Interface. It identifies the interface between the user and the ATM network node.
A.21 V
V40 VB VC12, VC3 trail 40-channel Multiplexing Unit With VOA Virtual Bridge The channel rates of the VC12 trail and VC3 trail are respectively 2.048Mbit/s and 34.368Mbit/s.? The VC12 and VC3 trails are transparent channels (i.? e. circuit group) provided for circuit-layer network nodes (e.? g. a switch) in a path-layer network, and act as the basic unit of transport capacity among circuit-layer network node channels. Its server layer trail is VC4 server trail. The VC12 or VC3 trail is established on the basis of VC4 server trail, which can only be created after the VC4 server trail.? If the VC12 and VC3 trails only pass one VC4 server trail, lower order cross-connect is performed over the NEs at the two ends during the creation, the VC4 pass-through is configured over the intermediate NE. If the VC12 and VC3 trails pass multiple VC4 server trails, in addition to that mentioned above, lower order cross-connect is configured over the NE at the crosspoint of two VC4 server trails during the creation, thus making the VC12 and VC3 trails pass through. The fault of each VC4 path on the optical fiber can be located by setting loopback for each VC4 path of the line.? There are three kinds of loopback modes. 1. No loopback: It is the normal status. No loopback is needed when the equipment runs efficiently; 2. Outloop: When arriving at the line board after passing the input port in the local NE, the input signal is directly looped back to the service output end; 3. Inloop: The output signal is directly returned after passing the line board. The path rate of the VC4 server trail is 150.? 336Mbit/s.? The VC4 server trail provides transparent channels (i.? e. circuit group) for circuit-layer network nodes (e.? g. a switch) in a path-layer network, and acts as the basic unit of inter-office communication path. The VC4 server trail is the basis of the VC3 and VC12 trails. When the VC4 server trail is configured, only the higher order cross-connection of VC4 is generated in the intermediate NE, but no cross-connection is generated at the two ends, that is, no service is added/dropped. Therefore, the VC4 server trail is not a traditional service. It is only the basis for VC3 and VC12 trail creation. The created VC4 is a point-to-point service trail, only the source/sink NE can be specified instead of the source/sink port. See Virtual Chanel Connection Virtual Concatenation Group See Virtual Channel Identifier Veritas Cluster Server. Virtual Channel Connection. The VC logical trail that carries data between two end points in an ATM network.
VC4 loopback
Issue 02 (2009-10-23)
A-29
The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell or UNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicate a virtual connection. The identifier in the ATM (Asynchronous Transfer Mode) cell header that identifies to which virtual channel the cell belongs. When the standard virtual containers (including VC4/VC3/VC12/VC11) are incapable of carrying the volume of a SDH signal, the containers can be concatenated to function as a larger container. An emulation of the traditional leased line service. By emulating the leased line through the IP network, it provides asymmetric and low-cost "DDN" service. For end users of the VLL, it is similar to the traditional leased line. A technology used to realize the virtual work group by logically classifying the devices on a LAN into multiple network segments. Like a common NE, a virtual NE is also displayed with an icon on a view, but it is only an NE simulated according to the practical situation, which does not represents an actual NE. Therefore, the actual status of this NE cannot be queried and its alarm status cannot be displayed with colors.? Usually, when the trail management function is used for the NEs or sub-networks the NMS cannot manage, or the equipment is interconnected with other vendors NEs for service configuration, the end-to-end service configuration method and the trail management capability are provided. The VPC is shorted for Virtual Path Connection. The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bits in the UNI cell.The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which VP (Virtual Path) the cell belongs. An extension of the private network. A VPN contains shared links or encapsulated, encrypted, and authenticated links on the public network. A VPN can connect users or sites over the Internet. See Virtual Local Area Network Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes, and one NE can support up to 8K VLAN routes. See Virtual leased line Variable Optical Attenuator Unit. See Virtual Path Indentifier Virtual Private LAN Service. See Virtual private network Virtual Tributary Veritas Volume Replicator Veritas Volume Manager.
Virtual concatenation
Virtual Path Connection Virtual Path Indentifier Virtual private network VLAN VLAN ID VLL VOA VPI VPLS VPN VT VVR VxVM
A.22 W
WAN Wide Area Network.
A-30
Issue 02 (2009-10-23)
The wavelength path protection ring comprises the working ring and the protection ring. Service signals are transmitted in the two rings in opposite directions. In the wavelength path protection ring, service signals from one node (such as node A) to another node (such as node C) are transmitted via the working ring and the protection ring at one time. Node C receives the signals from the two rings at the same time and selects the signal with higher quality. Similarly, the signals from Node C to Node A are transmitted along both the working ring and protective ring, and Node A selects the signal with higher quality. Wavelength path protection can protect optical fibers and equipments. It provides protection against optical fiber damages, wavelength conversion board failure, optical module failure, and optical amplifier failure. The restore time is less than 50ms.
Wavelength protection The wavelength protection group is important to describe the wavelength protection structure. Its function is similar to that of the protection sub-network in the SDH NE. group The wavelength path protection can only work with the correct configuration of the wavelength protection group. Wavelength protection A wavelength protection sub-network is a ring-chain structure used to describe sub-network wavelength protection, it is the basic network-level information. With the function similar to that of the protection sub-network in an SDH network, it is the basic networklevel data oriented to the user.? Create or delete a protection sub-network as required and set the parameters of the protection sub-network for the purpose of management on the network hierarchy. WBA WDM WDM path protection WDM Optical Booster Amplifier Unit Wavelength Division Multiplexing At the place where the signals are input to the DWDM equipment, the same channel of optical signals are input to two boards/ports of the WDM equipment respectively via two optical fibers. The two boards/ports are backed up mutually. When faults occur to the active path, the input terminal of the DWDM equipment will switch over to the standby path. This is the path protection switching function. If the detection shows that the active path signal recovers, the input terminal of the DWDM equipment will switch back to the active path when it meets the setting requirement. This is the path protection switching recovery function. WDM Access Node Work Station Function Wait-to-Restore Wavelength Cross Connection Protection
A.23 X
XCS Cross-connect and Synchronous Timing Board
Issue 02 (2009-10-23)
A-31