Professional Documents
Culture Documents
com
RCMS2903-4E1-4GE (A)
Configuration Guide
(Rel_02)
Raisecom Technology Co., Ltd. provides customers with comprehensive technical support and services. For any
assistance, please contact our local office or company headquarters.
Website: http://www.raisecom.com
Tel: 8610-82883305
Fax: 8610-82883056
Email: export@raisecom.com
Address: Building 2, No. 28, Shangdi 6th Street, Haidian District, Beijing, P.R.China
Postal code: 100085
-----------------------------------------------------------------------------------------------------------------------------------------
Notice
Copyright © 2013
Raisecom
All rights reserved.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in Writing from Raisecom
Technology Co., Ltd.
Preface
Objectives
This document describes basic configurations, system management, SNMP, Ethernet access,
E1 access, and alarm management. Moreover, it provides some related configuration
examples.
Versions
The following table lists the product versions related to this document.
Conventions
Symbol conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazard with a medium or low level of risk which, if
not avoided, could result in minor or moderate injury.
Indicates a tip that may help you solve a problem or save time.
General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman.
Arial Paragraphs in Warning, Caution, Notes, and Tip are in Arial.
Boldface Names of files, directories, folders, and users are in boldface.
For example, log in as user root.
Italic Book titles are in italics.
Lucida Console Terminal display is in Lucida Console.
Command conventions
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[] Items (keywords or arguments) in square brackets [ ] are
optional.
{ x | y | ... } Alternative items are grouped in braces and separated by
vertical bars. Only one is selected.
[ x | y | ... ] Optional alternative items are grouped in square brackets and
separated by vertical bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and separated by
vertical bars. A minimum of one or a maximum of all can be
selected.
[ x | y | ... ] * Optional alternative items are grouped in square brackets and
separated by vertical bars. A minimum of none or a maximum
of all can be selected.
Change history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Issue 02 (2013-06-20)
Initial commercial release
Added the description of the device_role { master | slave } command. The RCMS2903-
4E1-4GE can be configured with the master/slave mode. In master mode, the fourth
Ethernet interface of the device supports SNMP.
Issue 01 (2012-12-20)
Initial commercial release
Contents
6 Alarm management..................................................................................................................... 48
6.1 Introduction .................................................................................................................................................... 48
6.2 Configuring alarm inhibition .......................................................................................................................... 51
6.3 Configuring alarm delay................................................................................................................................. 51
6.4 Configuring alarm saving ............................................................................................................................... 52
6.5 Configuring alarm auto-report........................................................................................................................ 52
6.6 Configuring alarm inverse reporting .............................................................................................................. 53
7 Appendix ...................................................................................................................................... 56
7.1 Terms .............................................................................................................................................................. 56
7.2 Acronyms and abbreviations .......................................................................................................................... 57
Figures
Tables
1 Basic configurations
1.1 CLI
1.1.1 Overview
Command Line Interface (CLI) is a way of interaction between you and the RCMS2903-4E1-
4GE. You can complete device configuration, monitoring and management by executing
related commands.
The features of CLI:
Local configuration via the Console interface is available.
Remote configuration via Telnet is available.
Different command types belong to different command modes. You can only execute a
type of configuration in its related command mode.
You can operate the commands by shortcut keys.
You can view or execute a history command by transferring history record.
You can seek online help is available by inputting "?" at any time.
CLI provides smart analysis methods, such as incomplete matching and context
association, etc. to facilitate users' input.
1.1.3 Shortcuts
The RCMS2903-4E1-4GE supports the following command line shortcuts:
Shortcut Description
Up cursor key (↑) Show previous command if there is any command input
earlier; the display has no change if the current command is
the earliest one in history records.
Down cursor key (↓) Show next command if there is any newer command; the
display has no change if the current command is the newest
one in history records.
Left cursor key (←) Move the cursor one character to left; the display has no
change if the cursor is at the beginning of command.
Right cursor key (→) Move the cursor one character to right; the display has no
change if the cursor is at the end of command.
Backspace Delete the character before the cursor; the display has no
change if the cursor is at the beginning of command.
Tab Click Tab after inputting a complete keyword, cursor will
automatically appear a space to the end; click Tab again, the
system will show the follow-up inputting keywords.
Click Tab after inputting an incomplete keyword, system
automatically executes partial helps:
System take the complete keyword to replace input if the
matched keyword is the one and only, and leave one word
space between the cursor and end of keyword;
In case of mismatch or matched keyword is not the one and
line and prompt error, the input keyword will not change.
Ctrl+A Move the cursor to the head of line.
Ctrl+D or Delete Delete the cursor location characters
Ctrl+E Move the cursor to the end of line.
Ctrl+K Delete all characters behind the cursor (including cursor
location).
Shortcut Description
Ctrl+X Delete all characters before the cursor (except cursor
location).
Ctrl+Z Return to privileged EXEC mode from other modes (except
for user EXEC mode).
Complete help
You can get complete help in the below three conditions:
Click "?" in any command mode to get all commands and their brief description under
the command view.
Raisecom> ?
Display as below:
Raisecom>
chinese Help message in chinese.
clear Clear screen
enable Turn on privileged mode command
english Help message in english
exit Exit current mode and down to previous mode
help Message about help
history Show most recent history command
list List command
no Negate a command or set its defaults
quit Exit current system
show Show running system information
terminal Configuration of terminal
trace-dest trace destination
Input a keyword followed by a "?" after one character space, if the position of "?" is
keyword, list all keyword and brief description.
Raisecom(config)# interface ?
Display as below:
Raisecom(config)# interface
e1 E1 interface mode
fx-ge fx-ge interface mode
ge ge interface mode
pdh-opt Optical inetrface
sfp sfp interface mode
snmp Interface type
switchport esw interface mode
Input a keyword followed by a "?" after one character space, if the position of "?" is a
parameter, list the range and brief description.
Raisecom(config)# interface e1 ?
Display as below:
Raisecom(config)# interface e1
<1-4> ID
Partial help
You can get partial help in the below three conditions:
Input a character string and start with a "?", the RCMS2903-4E1-4GE will list all
keywords starting with the character string under current mode.
Raisecom(config)#a?
Display as below:
Raisecom(config)# a
als Config OPT ALS
arp ARP command
assert-dest assert destination
Input a command followed by a character string with "?", the RCMS2903-4E1-4GE will
list all keywords start with the character string in the command of current mode.
Display as below:
Raisecom(config)# show in
info Device information
interface Interface information
Shortcut Description
% " * " Incomplete command. Command line is incomplete.
% Invalid input at '^' marked. Keyword marked with "^" marked is illegal or
does not exist.
% Ambiguous input at '^' marked, Keyword marked with "^" is ambiguous.
follow keywords match it.
% " * " Unconfirmed command. Command line is not exclusive.
% " * " Unknown command. Command line does not exist.
% You Need higher priority! Command line cannot be executed due to limited
authority.
Command Description
clear Delete prompt information on the screen.
end Return to the privileged mode.
english Display the help and prompt information in
English.
exit Return to the upper-level mode.
help Check the help information.
history Check the history records.
list Check the list of all commands in current mode.
quit Log out.
Command Description
Raisecom> terminal line Configure line numbers of the terminal.
{ number | unlimited }
Raisecom> terminal time-out Configure the maximum no-operation timeout of
time the terminal.
Raisecom> terminal history Configure the number of the recorded history
number commands.
Command Description
Raisecom# hostname hostname Modify the system name.
Raisecom# logout Exit from the current login, which can also be
realized by entering quit or exit.
Raisecom# reboot Restart the device.
Raisecom# show rotp-cpu- Show the utilization ratio of CPU.
utilization-ratio
When accessing the RCMS2903-4E1-4GE through the Console interface, use the
CBL-RS232-DB9F/RJ45-2m Console cable delivered with the RCMS2903-4E1-4GE.
Step 1 Run the terminal emulation program on the PC.
1. Choose Start > All Programs > Accessories > Communications > Hyper Terminal.
2. Input a name, and click OK.
3. Select COM1, and click OK.
4. Configure COM1 properties as shown in Figure 1-2, and click OK.
Step 2 If the device is starting, it displays login information dynamically on the terminal software.
When a welcome prompt is displayed, press Enter to enter the login interface. If the device
has completed the login, it displays blank on the terminal software. Press Enter to enter the
login interface.
Step 3 Input the user name and password. By default, both the user name and password are raisecom.
When being inputting, the password is not displayed as plain text.
Login: raisecom
Password:
Step 4 Enter the privileged ECEX mode. By default, the user name is enable and the password is
raisecom.
Raisecom> enable
Password:
Step 5 After entering privileged ECEX mode, you can log in to the RCMS2903-4E1-4GE
successfully. Then, you can configure it as needed.
Raisecom#
Scenario
After the system log is enabled, the login and alarm information will be recorded in the log.
You can search for related information through the log.
Prerequisite
N/A
For example, if DST starts from 02:00 am second Monday of April to 02:00 am
second Monday of September, the clock is moved forward 60 minutes. Thus, the
period between 02:00 and 03:00 second Monday of April is skipped. Configuring time
during this period will fail.
DST in the Southern Hemisphere is opposite to that in the Northern Hemisphere. It is
from September this year to April next year. If the starting month is later than the
ending month, the RCMS2903-4E1-4GE judges that it is located in the Southern
Hemisphere.
2 System management
Scenario
After configuring the Automatic Laser Shutdown (ALS), you can effectively protect the
performance of the optical interface. Moreover, when the maintenance personnel remove the
fiber out, the laser will be stopped if ALS is enabled. Thus, it can avoid eye damage. And the
service will be automatically recovered when the fiber is plugged in.
Prerequisite
N/A
Scenario
Configure failover from the local optical interface and remote electrical interface to the local
electrical interface.
Failover from the optical interface to the Ethernet electrical interface refers to shutting down
the Ethernet electrical interface when Loss of Signal (LOS) and Loss of Frame (LOF) alarms
are generated on both the local and remote optical interfaces, until the optical interface
recovers on both ingress and egress directions.
Failover from the Ethernet electrical interface to the electrical interface refers to shutting
down the local Ethernet electrical interface when status of all remote Ethernet electrical
interfaces is changed to Link down from Link up, until at least one remote Ethernet interface
recovers to Link up.
Prerequisite
N/A
Scenario
The routing is used to select a path and forward packets. The routing is realized through
routing protocols. Routing protocols are rules to maintain the routing table between devices. It
is used to discover routes, generate the routing table, and instruct packet forwarding.
Static routing refers to a type of routing that is manually configured. It has fewer requirements
on the system. The static routing is mainly applied to small-and medium network. However,
the static routing cannot automatically adapt to the network topology changes.
To configure static routing for simple topology network, you need to configure static routing
manually to create an intercommunication network.
Prerequisite
Configure the IP address of the Layer 3 interface properly.
Scenario
After alarm masking for the E1 idle tributary is configured, alarms will not be reported to the
network management server if any alarm is generated on the idle E1 tributary.
Prerequisite
N/A
2.6 Maintenance
Maintain the RCMS2903-4E1-4GE by using the commands as below.
Command Description
Raisecom(config)# clear statistic Clear all statistics of the device.
Raisecom(config)# reset Reset the device.
Raisecom(config)# restore-default- Restore to the default manufacture configurations.
configuration
In the configuration examples, take FTP for example to back up or upgrading files.
You can choose either of the two modes: FTP or TFTP.
Raisecom# config
Raisecom(config)# interface snmp
Raisecom(config-snmp)# ip address 192.168.27.98 255.255.255.0
Raisecom(config-snmp)# end
Raisecom# updata-system-software
Set successfully
Step 7 Input a file name, which can be a string of any valid characters and does not conflict with an
existing file in the saving path. Take rcms2903.z for example.
Raisecom# config
Step 9 Wait until downloading is complete. When you see the following prompt, it indicates
downloading is successful.
Raisecom# reboot
Do you reboot the device?(Y/N)y
Raisecom# reboot
Step 2 When a prompt "booting….Press Space to Enter Bootrom menu......" is displayed, press
Space to enter the BootROM configuration mode.
Step 3 Input "i" to configure the IP address of the RCMS2903-4E1-4GE in the same network
segment with the IP address of the PC.
[Raisecom]: i
[Raisecom]: u
-----------------------------------
- 1. | serial -
-----------------------------------
- 2. | network -
-----------------------------------
Step 8 Input the user name, password, and file name of FTP.
usr: 111111
passwd: 111111
filename: rcms2903.z
[Raisecom]: r
3 Network management
3.1 Introduction
Simple Network Management Protocol (SNMP) is designed by the Internet Engineering Task
Force (IETF) to resolve problems in managing network devices connected to the Internet.
Through SNMP, a network management system can manage all network devices that support
SNMP, including monitoring network status, modifying configurations of a network device,
and receiving network alarms. SNMP is the most widely used network management protocol
in TCP/IP networks.
SNMP is separated into two parts: Agent and Network Management System (NMS). In the
SNMP network, the Agent is a managed device while the NMS is a manager. The Agent and
NMS communicate through SNMP packets transmitted through UDP.
Prerequisite
Before configuring SNMP, you should perform the following operations:
Configure the IP address of the SNMP interface.
Configure a routing protocol, making the route between the RCMS2903-4E1-4GE and
the NView NNM system reachable.
3.7 Maintenance
Maintain the RCMS2903-4E1-4GE by using the commands as below.
Command Description
Raisecom(config-snmp)# shutdown Shut down the current SNMP interface.
4.1 Introduction
4.1.1 Ethernet interface
Duplex modes
The Ethernet interface can work in the following two duplex modes:
In half duplex mode, an interface can receive or send packets at a time.
In full duplex mode, an interface can both receive and send packets concurrently.
Duplex mode auto-negotiation refers that the duplex mode is decided based on the automatic
negotiation between the local interface and peer interface.
Interface rate
The RCMS2903-4E1-4GE provides four 1000 Mbit/s Ethernet interfaces. The rate varies
from 10 Mbit/s to 100 Mbit/s to 1000 Mbit/s, which can be configured or automatically
negotiated.
Interface rate auto-negotiation refers that the interface rate is automatically negotiated by the
local and peer interfaces.
Flow control
When the received flow on the interface exceeds the processing and forwarding capability of
the device, the line will be congested. In order to decrease the packet loss rate due to the
buffer overflow, the upstream device is notified of slowing down or stopping sending data to
relieve the congestion.
Flow control can be divided into two types: back pressure flow adopted by the half duplex
Ethernet interface and the Institute of Electrical and Electronics Engineers (IEEE) 802.3x
flow control adopted by the full duplex Ethernet interface.
4.1.3 VLAN
Virtual Local Area Network (VLAN) is a Layer 2 isolation technology that is used to partition
devices in a LAN logically instead of physically to a network segment. Therefore, multiple
distinct virtual broadcast domains are created.
VLAN entries
For the RCMS2903-4E1-4GE, each VLAN entry is corresponding to one VLAN ID. You can
configure the status and member interfaces of multiple VLAN entries at the same time.
In different network management modes, the number of the VLAN entries is different:
In mode 1: the RCMS2903-4E1-4GE can be managed by the OPCOM3500E and
iTN2100 and supports 64 VLAN entries.
In mode 2: the RCMS2903-4E1-4GE can be managed by the RC002 and supports 16
VLAN entries.
You can use the bit 4 of SW1 to configure the network management modes.
Mode 1: bit 4 is configured to OFF.
Mode 2: bit 4 is configured to ON.
VLAN modes
The RCMS2903-4E1-4GE supports 4 working modes:
novlan: VLAN is not configured, that is, the device works in full switching mode.
portvlan: partition VLAN based on the interface, that is, different interfaces are isolated
from each other.
tagvlan: partition VLAN based on the VLAN ID, that is, the device works in signal Tag
mode.
QinQ
QinQ encapsulates the VLAN Tag of users' private network into the VLAN Tag of the public
network and enables the packet to transmit through the public network of the Internet Service
Provider (ISP) carrying double VLAN tags. In the public network, the packet is transmitted
according to the outer VLAN Tag (public VLAN Tag) and the VLAN Tag of users' private
network is shielded.
QinQ effectively relieve the shortage of VLAN ID in the public network. At the same time,
you can plan the VLAN ID of their private network without conflicting with the VLAN ID of
the public network.
TPID
Tag Protocol Identifier (TPID) is a filed in the VLAN Tag. IEEE 802.1Q protocol defines the
value of this field as 0x8100.
Different manufactures may set different values to the TPID of the outer Tag of the QinQ
packet. To use devices provided by different manufactures compatibly, you can configure the
TPID of the outer Tag.
4.1.4 QoS
Quality of Service (QoS) can ensure you to obtain expected service levels in the following
aspects in the transmission: packet loss ratio, time delay, jittering, and bandwidth, etc.
Priority trust
The RCMS2903-4E1-4GE supports the following three priority trust modes:
Interface-based: partition packets according to the default CoS priority and interfaces are
isolated from each other.
CoS-based: trust the CoS priority of the VLAN packet header and partition packets
according to the CoS priority of the ingress packet Tag. For the Untagged packet, use the
default CoS priority of the interface.
DSCP-based: trust the DSCP priority of the IP packet.
Queue mapping
Queue mapping refers to mapping packets of the same kind to the same interface queue.
The RCMS2903-4E1-4GE supports mapping CoS priority, DSCP priority, and interface
default priority to the queue. Moreover, it supports 4 interface queues.
Queue scheduling
Queue scheduling refers to extracting packet from the interface queue for transmission
according to specified policies.
The RCMS2903-4E1-4GE supports the following four QoS queue scheduling modes:
Strict Priority (SP): the device strictly schedules packets in a descending order of priority.
Packets with lower priority cannot be scheduled until packets with higher priority are
scheduled.
Weight Round Robin (WRR): on the basis of scheduling packets in a polling manner
according to the priority, the device schedules packets according to the weight of the
queue. The queue with a higher priority obtains more resources and the queue with a
lower priority obtains fewer resources to avoid the situation that the packet with a lower
priority will not be scheduled for a long time in the fixed priority scheduling.
1SP-3WRR: The queue with the highest priority is scheduled according to the SP mode.
Other three queues are scheduled in a polling manner according to the WRR mode.
2SP-2WRR: The two queues with the higher priority are scheduled according to the SP
mode. Other two queues are scheduled in a polling manner according to the WRR mode.
Scenario
The Ethernet interface includes the GE electrical interface and GF optical interface. Through
configuring the interface, you need to make sure that parameters of interfaces on both ends
are consistent and services are transmitted normally.
Prerequisite
N/A
Scenario
VLAN can partition different users and services logically.
Prerequisite
N/A
Scenario
QoS provides differentiated network services according to different kinds of packets and
customers' requirements. QoS ensures that services demanding high real-time and reliability
will be transmitted high-efficiently at the first priority.
Prerequisite
Configure the interface-based VLAN.
Scenario
The RCMS2903-4E1-4GE supports interface-based and VLAN-based rate limiting. You can
choose either of them based on the needs.
Prerequisite
N/A
Scenario
When the interface receives a great deal of broadcast, unknown multicast, and unknown
unicast packets, a broadcast storm will be generated, which may lead to network congestion.
Storm control prevent the generation of broadcast storm through limiting the rate of the
broadcast packets on the interface.
Prerequisite
N/A
4.7 Maintenance
Maintain the RCMS2903-4E1-4GE by using the commands as below.
Command Description
Raisecom(config-ge/*)# clear statistic Clear statistics on the GE electrical interface.
Raisecom(config-fx-ge/*)# clear Clear statistics on the GF optical interface.
statistic
Configuration steps
Step 1 Configure the VLAN mode to Tag VLAN mode.
Raisecom# config
Raisecom(config)# vlan-type tagvlan
Set successfully
Step 2 Configure the VLAN ID of the VLAN entry 1 as 100 and add switching interfaces 1 and 2 to
the VLAN entry 1.
Step 3 Configure the VLAN ID of the VLAN entry 2 as 200 and add switching interfaces 3 and 4 to
the VLAN entry 2.
Step 4 Configure the PVID of switching interfaces 1 and 2 as 100 and PVID of switching interfaces
3 and 4 as 200.
Step 5 Configure the Tag mode of switching interfaces 1–4 to Untag mode (taking switching
interface 1 for example), and configure the switching interface 5 to the Tag mode.
Step 6 Configure storm control on switching interface 1 and the rate for storm control is 256 Kbit/s.
Checking results
Show configurations of VLAN entries 1 and 2.
5 Configuring E1 access
5.1 Introduction
E1
E1 is one of the two hierarchies of the Plesiochronous Digital Hierarchy (PDH). It includes
features as below:
The rate of E1 link is 2.048 Mbit/s and E1 uses Pulse Code Modulation (PCM).
The length of E1 frame is 256 bits. It consists of 32 timeslots and each timeslot consists
of 8 bits.
8K E1 frames are transmitted through the interface per second, so the interface rate is
2048 Kbit/s (8 K/s × 256 bit). Each timeslot consists of 8 bits in the E1 frame, so the rate
of each timeslot is 64 Kbit/s (8 K/s × 8 bit) and rate of each E1 frame is 32 × 64 Kbit/s.
Structure of E1 frame
E1 frame is in three modes: unframed, framed and multiframed.
In an unframed E1, all 32 timeslots are used to transmit valid data.
In a framed E1, TS0 transmits Frame Alignment Signal (FAS), CRC-4, and peer alarm
indication; other 31 timeslots transmit valid data.
In a multiframed E1, TS0 transmits overhead; TS16 transmits Channel Associated
Signaling (CAS), multi-FAS, and multiframe peer alarm indication; those 30 timeslots
TS1–TS15 and TS17–TS31 transmit voice or data.
In an E1 channel, a timeslot consists of 8 bits while 32 timeslots compose a frame (F). A
multiframed (MF) consists of 16 frames.
The E1 interface of the RCMS2903-4E1-4GE has two modes: balanced and unbalanced.
Moreover, it supports transparent transmission, that is, unframed mode.
E1 loopback
Loopback detection is a frequently-used method to test and analyse interface or link problems.
The RCMS2903-4E1-4GE supports local internal loopback, external loopback, bidirectional
loopback, and remote internal loopback at the E1 side.
Local internal loopback: signals sent by the Tx of an interface are received by the Rx of
the same interface. You can know the working status of the interface by checking the
sending and receiving of data.
Local external loopback: the interface sends signals sent by the peer to the Rx of the peer
to form a detection loop. It is mainly used for checking the line status.
Local bidirectional loopback: local internal loopback and local external loopback is
enabled at the same time.
Remote internal loopback: the interface sends signals to the peer, and then the peer sends
the received signals to the local, thus forming a detection loop.
Figure 5-1 and Figure 5-2 show local bidirectional loopback and remote internal loopback.
Scenario
You can configure alarm masking for the E1 interface by CLI and the type of the E1 interface
by DIP.
Prerequisite
N/A
Scenario
You can configure the loopback mode for each way of E1 on the E1 interface. The
RCMS2903-4E1-4GE supports automatical discharge, that is, loopback will be disabled when
the configured hold-time expires.
Prerequisite
N/A
5.4 Maintenance
Maintain the RCMS2903-4E1-4GE by using the commands as below.
Command Description
Raisecom(config-e1/*)# clear statistic Clear statistics on the E1 interface.
6 Alarm management
6.1 Introduction
Alarm means when a fault is generated on the RCMS2903-4E1-4GE or some working
condition changes, the RCMS2903-4E1-4GE will generate alarm information according to
different faults.
Alarm information is used to report some urgent and important events and must be sent to the
network administrator promptly, which provides strong support for monitoring device
operation and diagnosing faults.
Alarm information is stored in the alarm buffer. Meanwhile, if a NMS is established, the
alarm information will be sent to NMS through SNMP. The information sent to the NMS is
called Trap information.
Event alarm: prompted alarms or alarms that are generated because of failure in relating
the fault to the recovery, such as alarms generated by failing to Ping
Alarms can be divided into four types by function:
Service quality alarm: alarms caused by service quality degradation, including
congestion, performance degradation, high resource utilization rate, and the bandwidth
reducing
Processing error alarm: alarms caused by software or processing errors, including
software errors, memory overflow, version mismatching, and the abnormal program
aborts
Environmental alarm: alarms caused by equipment location-related problems, including
the environment temperature, humidity, ventilation and other abnormal working
conditions
Device alarm: alarms caused by failure of physical resources, including power, fan,
processor, clock, input/output ports and other hardware
Related concepts
Related concepts about alarm management are displayed as follows:
Alarm inhibition
When alarm inhibition is enabled, the RCMS2903-4E1-4GE records root alarms only without
affiliated alarms. For example, alarm A absolutely generates alarm B; when alarm inhibition
is enabled, alarm B will be inhibited, not sent to the alarm buffer, and not logged.
When alarm inhibition is enabled, the number of alarms to be reported is reduced sharply.
When alarm inhibition is disabled, the root alarms and their affiliated alarms are recorded on
the RCMS2903-4E1-4GE.
Alarm auto-report
Auto-report refers that an alarm is reported to NMS automatically with its generation and you
do not need to initiate inquiries or synchronization.
You can set auto-report function to some alarm, some alarm source, or the specified alarm
from specified alarm source.
The alarm source refers to an entity that generates related alarms, such as ports,
devices, or cards.
Alarm monitoring
Alarm monitoring is used to process alarms generated by modules:
− When alarm monitoring is enabled, the alarm module will receive alarms generated
by modules, and process them according to the configurations of the alarm module,
such as recording alarm in alarm buffer, or recording system logs, etc;
− When alarm monitoring is disabled, the alarm module will discard alarms generated
by modules without follow-up treatment. In addition, alarms will not be recorded on
the RCMS2903-4E1-4GE.
You can perform the alarm monitoring function on some alarm, alarm source or specified
alarm on from specified alarm source.
Alarm inverse reporting
Alarm inverse reporting refers that alarms reported by the device are inverse to the actual
situation. No alarms are reported when the interface is out of use; related alarms are reported
when the interface is in use. The alarm reports are cleared if the interface returns to the out-of
use status.
The RCMS2903-4E1-4GE supports interface-based alarm inverse reporting only. You can set
the alarm inverse reporting in three modes:
− Non-inverse reporting
In this mode, alarms are reported properly.
− Manual recovery reporting
In this mode, the alarms to be reported on an interface are inverse to the actual situation. For
example, recovery alarms are reported when there are actually alarms; alarms are reported
when there are no alarms.
− Automatical recovery reporting
When changing the inverse reporting to this mode, you will fail when there are no inverse
alarms and succeed when there are inverse alarms. In this mode, the alarms to be reported on
an interface are inverse to the actual situation. After alarms are eliminated, the mode changes
to the non-inverse reporting mode, and then alarms are reported normally before the mode
changes again.
Alarm delay
Alarm delay refers that the RCMS2903-4E1-4GE will record alarms and report them to NMS
after a delay but not immediately when alarms are generated. Delays for recording and
reporting alarms are identical.
By default, the delay is 5s for both delayed recording and delayed reporting.
Alarm saving
Alarm saving refers to how to record new alarms when the alarm buffer is full. There are two
types:
– Stop: in this mode, new alarms are discarded without being recorded.
6.10 Maintenance
Maintain the RCMS2903-4E1-4GE by using the commands as below.
7 Appendix
This chapter describe terms and abbreviations involved in this guide, including the following
sections:
Terms
Acronyms and abbreviations
7.1 Terms
A
Alarm masking The NMS does not display alarms of a specified element or does not
monitor some unimportant alarms.
Automatic When the fiber of the optical interface is pulled out or when the output
Laser Shutdown power of the optical transmitter is over great, the optical interface shuts
(ALS) down the laser automatically to avoid maintenance and operation risks.
C
(Class of Classify data and attach different priorities to the data through
Service) CoS comparison of the service type filed and indicator of the data packet.
E
Error code Bits of the received and sent signals are inconsistent with each other.
F
Frame It is a data transmission unit.
H
Half duplex Perform bidirectional electronic communicate in one direction only at
same time.
L
Loopback A process that a signal returns to the place where it is sent. It can be
used to detect and analyze the fault that may exist in the ring network.
M
Multiplexing It is used to adapt multiple Lower-order Path (LP) signals to a HP or
multiple HP signals to a multiplexing section.
Multiplexer The device integrates multiple tributary channels to several bearer
channels.
T
Timeslot Time is divided into periodical frames. Each frame is divided into
multiple timeslots. Each timeslot is a communication channel which
can be assigned to a user.
V
VLAN is a protocol proposed to solve broadcast and security issues for
Virtual Local
Ethernet. It divides devices in a LAN into different segment logically
Area Network
rather than physically, thus implementing virtual work groups which
(VLAN)
are based on Layer 2 isolation and do not affect each other.
C
CAS Channel Associated Signaling
CRC Cyclic Redundancy Check
F
FAS Frame Alignment Signal
FTP File Transfer Protocol
G
GE Gigabit Ethernet
L
LOF Loss of Frame
LOS Loss of Signal
P
PDH Plesiochronous Digital Hierarchy
Q
QoS Quality of Service
S
SFP Small Form-factor Pluggable
T
TFTP Trivial File Transfer Protocol
TPID Tag Protocol Identifier
V
VLAN Virtual LAN