IManager U2000 Unified Network Managemen
IManager U2000 Unified Network Managemen
IManager U2000 Unified Network Managemen
System
V100R002C00
Product Description
Issue 03
Date 2010-11-02
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: [email protected]
Related Version
The following table lists the product version related to this document.
Intended Audience
The iManager U2000 Product Description describes the position, functional characteristics,
system architecture and networking mode of the U2000, appended with standards that the
U2000 complies with, and performance indexes.
This document provides guides for getting the features and functions of the U2000.
This document is intended for:
Network Planning Engineer
Data Configuration Engineer
System Maintenance Engineer
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
Symbol Description
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or
supplement important points of the main text.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.
Contents
Figures
Figure 2-7 Integrated NMS for unified network equipment management.......................................................... 2-8
Figure 2-8 Network management solution for a broadband bearer network ...................................................... 2-9
Figure 2-9 Network management solution for a mobile bearer network .......................................................... 2-11
Figure 2-10 Network management solution for an IP core network ................................................................. 2-13
Figure 2-11 Networking application of the U2000 in the access network ........................................................ 2-15
Figure 3-2 Software structure - Solaris HA system (Veritas hot standby) .......................................................... 3-3
Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby) ................................................. 3-3
Figure 3-4 Software structure - Windows HA system (Veritas hot standby) ...................................................... 3-4
Figure 4-10 Inventory management window and its functions ........................................................................ 4-18
Figure 4-11 Log management window and its functions .................................................................................. 4-19
Tables
Table 17-1 Management capabilities of the U2000 on different hardware platforms ....................................... 17-3
Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents .................................. 17-7
Table 17-3 Management capabilities of the U2000 on different IP NE equivalents ......................................... 17-9
Table 17-4 Management capabilities of the U2000 on different access NE equivalents ................................ 17-12
1 Overview
OSS
Service
management layer
XML/CORBA/SNMP/FTP
Network
management layer
iManager U2000
+
Element
management layer
U2000
IP MSAN WDM
EPE
EPE NPE BRAS IMS
VDSL2
Core
AG
MSE
Internet/
SP
MSTP BRAS WDM
MSTP
MSTP
UPE VC12/VC4
MSTP
MSTP
Access
Home/Business Node Metro Network SR/BRAS Backbone
Modular Architecture
The U2000 uses a modular design to increase system flexibility.
By adopting the mature and widely-used C/S (Client/Server) architecture, the U2000
supports distributed and hierarchical database system, service processing system, and
foreground application system, and supports concurrent operations of multiple clients, to
meet the management requirements of complex and large-scale networks.
The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.
Slave servers can share the CPU usage and memory usage of the master server. In this manner,
the load is balanced.
2.1.3 Centralized Deployment of an HA System
The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where
there is only one server on either the primary site or the secondary site.
2.1.4 Distributed Deployment of an HA System
The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed
deployment mode where both the primary and secondary sites use distributed systems.
The management components for manageable equipment can be deployed on different servers
or on the same server.
Distributed system consists of the master server and slave server, which compose a site to
perform the U2000 server function.
The master server is the core of a distributed system. The database server and the core
subsystems of the U2000 are running on the master server.
The non-core subsystems of the U2000 (such as the management components for manageable
equipment) are running on the slave server. In this way, the CPU usage and the memory usage
of the master server are lowered, the load is balanced between the master and slave servers
and the management capability of the U2000 is increased.
In the distributed deployment mode, you can deploy all servers in only the same LAN.
The primary and secondary sites comprise an HA system. The data in different locations is
backed up through a network. When a fault occurs in the primary site, the system switches to
the secondary site so that network monitoring continues. Figure 2-3 shows the networking
diagram.
Managed Network
NMS
Networking Description
The devices managed by the U2000 are all connected to the managed network. The U2000
needs to be connected to only the nearby NE on the managed network. After configuring the
related routes, you can manage all the devices on the network.
The way of connecting the U2000 with the managed network depends on the distance
between the U2000 and its nearby NE. If the U2000 and its nearby IP devices are in the same
equipment room, you can use the LAN mode. If the U2000 and its nearby IP devices are far
from each other, you can use the private line mode. The private line mode is similar to the
outband networking mode.
Networking Advantages: This networking mode is flexible and cost-effective. It does not
need extra devices.
Networking Disadvantages: In the case of network failure, the communication channel
between the U2000 and its managed network is interrupted. As a result, the U2000
cannot maintain the managed network.
DCN
NMS
Managed Network
Networking description
The devices managed by the U2000 are all connected to the managed network. The U2000
connects with the devices on the managed network through the DCN that is made up of other
devices. In this manner, the U2000 implements its management on the managed network and
devices.
Networking advantages: In outband networking mode, the U2000 is connected to its
managed devices through other devices. It is not connected to its managed devices
directly. Compared with the inband networking mode, this mode provides more reliable
device management channels. When a fault occurs on a managed device, the U2000 can
locate information about the faulty device in a timely manner and monitor this device in
real time.
Networking disadvantages: In outband networking mode, the U2000 manages its
managed devices through a maintenance channel that is independent of the service
channel. To provide such a maintenance channel, you need to build a network that is
made up of extra devices. Thus, the cost of constructing the network is high.
The U2000 provides perfect solutions for broadband bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.3 Mobile Bearer Network
The U2000 provides perfect solutions for mobile bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.4 IP Core Network
The U2000 provides perfect solutions for IP core networks in terms of network deployment,
service deployment, and service assurance.
2.3.5 Access Network
In the networking application of the access network, the U2000 manages and maintains xPON
OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.
oss
Service management layer
XML/CORBA/SNMP/FTP/TL1
iManager U2000
Network management layer
+
NE management layer
Datacom network
Access network Transport network NE layer
Access network SDH/WDM/OTN/MW
Router/Switch/BRAS
MSAN/FTTX
/PTN
Networking Diagram
Network Deployment
The U2000 meets the following requirements in the network deployment stage:
Supporting the remote disaster recovery solutions
When the active server fails, the standby server can take over as the active server to
avoid service interruption.
Providing the fast OSS integration capability through abundant NBIs such as SNMP, FTP,
CORBA, and XML NBIs and implementing end-to-end management by providing alarm,
inventory, and performance data for upper-layer OSSs.
Service Deployment
Carrying multiple services is one of the most distinctive features of the Metro Ethernet.
Services such as the high-speed internet (HSI) service, IPTV, and voice over IP (VoIP) must
be established on logical channels.
The U2000 allows you to quickly establish specific logical channels on physical networks.
For example, you can quickly establish end-to-end MPLS LSP, MPLS TE, PW, and VPLS
logical channels through GUIs. You can verify the validity of services before deployment and
modify services after the logical channels are established.
The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000
provides the batch deployment function to accelerate the deployment process.
To ensure the reliability of key channels, you can configure protection protocols such as BFD,
VRRP, and MPLS OAM.
The U2000 provides efficient test diagnosis tools. Through the related test cases, you can use
test diagnosis tools to quickly identify fault causes and rectify network faults, thus ensuring
network stability.
Service Assurance
The U2000 monitors the running status of the network 24 hours a day and 7 days a week in
multiple ways. It can detect network faults or degradation in a timely manner and report
endto- end SLA data of the network.
The U2000 provides the following service assurance for the broadband bearer network:
Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.
Performance monitoring 24 hours a day and 7 days a week
The U2000 regularly collects the traffic data of all the links or some key links on the
entire network to provide effective support for network monitoring.
End-to-end SLA monitoring on network nodes
The U2000 regularly collect the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.
Networking Diagram
Network Deployment
The U2000 meets the following requirements in the network deployment stage:
Large-scale network management in distributed deployment mode
In distributed deployment mode, NE Explorer instances can be deployed on one or more
servers, enabling the entire system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.
HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.
Service Deployment
On a mobile bearer network, the TDM base station, ATM base station, and IP base station are
borne by end-to-end PWs.
The U2000 supports the following features in terms of service deployment:
Providing user-friendly GUIs for the creation and maintenance of logical CES, ATM,
Ethernet, and PWE3 channels
Supporting the ability to perform end-to-end management on static and dynamic tunnels
and to query the binding relations between PWs and tunnels
Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, MPLS OAM,
and QoS to ensure service reliability
Supporting the ability to deploy services in batches through the service template to
improve the efficiency and preciseness of service deployment, in the case that a large
number of NEs are deployed on the mobile bearer network
Service Assurance
The U2000 provides the following service assurance for the mobile bearer network:
Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.
Performance monitoring 24 hours a day and 7 days a week
The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.
Service-centered performance monitoring
On a mobile bearer network, you can precisely analyze the trend of service traffic, and
identify and locate faults through the performance indicators used to monitor the related
services, such as PWE3, VPLS, and L3VPN services.
Networking Diagram
Network Deployment
The U2000 meets the following requirements in the network deployment stage:
Centralized deployment and authority- and domain-based user management
Different users can mange different objects according to their respective management
rights. In this manner, the security of the U2000 is ensured.
HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.
Distributed deployment of collectors for managing large-scale networks
In distributed deployment mode, NE explorer instances can be deployed on one or more
servers, enabling the whole system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.
Service Deployment
The U2000 supports the following features in terms of service deployment:
Supporting the ability to deploy mainstream services such as VPLS, L3VPN, and PWE3
services and providing multiple types of service configuration templates and bulk
configuration templates
With simple and user-friendly GUIs, the U2000 effectively improves the efficiency of
service deployment.
Supporting the ability to manage mainstream routing protocols, such as OSPF, ISIS, and
BGP
Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, VPN FRR,
MPLS OAM, and QoS to ensure service reliability
Service Assurance
The U2000 provides the following service assurance for the IP core network:
Real-time alarm monitoring and notification
The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network. By diagnosing services
according to network protocol layers, the U2000 can quick locate the faulty network
layer.
Performance monitoring 24 hours a day and 7 days a week
The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.
End-to-end SLA monitoring on network nodes
The U2000 regularly collects the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.
Networking Diagram
Networking description
Broadband access:
As IP-DSLAMs, the broadband access devices support various broadband access
modes, such as the ADSL2+, SHDSL, and VDSL2. They provide high-speed Internet
access service, video service, and ATM and IP private line services for business users,
enterprises, cyber cafes, and common users.
The DSLAMs at different levels can be subtended through GE/FE ports to provide
xDSL services. The subtending of devices extends the coverage of the network
efficiently and meets the requirements of the scenarios in which a large number of
users are supported.
The broadband access devices provide the LAN private line interconnection service
of the carrier-class high quality. The service is applicable to the interconnection
between branches, such as the government, enterprise, and business user (for example,
a bank), and their headquarters. It is also applicable to other applications such as
broadband Internet access and video conference.
FTTx access:
The OLT in the PON system works with the ONU/ONT, which is connected to the
LAN switch or hub in the downstream direction, to provide service access for users.
In the downstream direction, the OLT is connected to the MDU or mini-MSAN
through fibers. The MDU or mini-MSAN provides service access for more users
through twisted pairs, coaxial cables, and category-5 cables.
Integrated access:
Controlled by the MGC, the MSAN supports the VoIP, FoIP, and MoIP service access
and provides ISDN BRA and ISDN PRA services.
The MSAN provides the ADSL/VDSL2 broadband Internet access service and the
SHDSL private line interconnection service.
3 System Architecture
Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby)
The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary
site to the secondary site so that data is synchronized between the primary and secondary
sites in real time.
The Veritas cluster server (VCS) is used to monitor the system and application service in
real time. When a fault occurs in hardware or software, the VCS restarts or stops the
application service.
The Veritas volume manager (VxVM) is used to manage the disks and data volumes of
servers.
3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.
3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
The following table lists the equipment supported by the NBIs of the U2000.
Interface Equipment
Type
XML The XML NBI enables unified management functions for the OSS in
terms of alarms, performance, inventory, and service provisioning. These
management functions apply to routers, Metro equipment, transport
equipment, and access equipment.
CORBA The CORBA NBI enables unified alarm management for the OSS on
routers, Metro equipment, transport equipment, and access equipment.
Meanwhile, the CORBA NBI enables management of performance,
inventory, and service provisioning for the OSS in Metro and transport
domains.
SNMP The SNMP NBI enables unified alarm management of the OSS on
routers, Metro equipment, transport equipment, and access equipment.
TL1 The TL1 NBI enables inventory query, inventory provisioning, and
service provisioning (xDSL, xPON, broadband, and narrowband
services) for the OSS in the access domain.
FTP The FTP performance NBI enables the export of performance statistics
for the OSS. In this case, the performance statistics is exported to the
specified FTP server for analysis.
MML The U2000 can access an OSS test system, and can support tests on
narrowband access devices (lines and terminals) and ADSL lines through
the OSS test NBI.
XML NBI
Compliant with the TMF MTOSI 2.0 series standard, the U2000 XML NBI enables unified
management functions of the OSS in terms of alarms, performance, inventory, and service
provisioning. These management functions apply to routers, Metro equipment, transport
equipment, and access equipment.
The U2000 XML NBI mainly supports the following functions:
Alarm management
Report alarm events.
Synchronize active alarms.
Acknowledge alarms.
Unacknowledge alarms.
Collect alarm statistics.
Performance management
Query history performance data.
Query current performance data.
Report performance threshold-crossing events.
Query performance threshold-crossing events.
Inventory management
Query physical inventory (NE, shelf, slot, card, and physical port).
CORBA NBI
Compliant with the TMF MTNM V3.5 series standard, the U2000 CORBA NBI enables
unified alarm management for the OSS. Meanwhile, the CORBA NBI enables service
provisioning, diagnosis test, inventory management, and performance management on Metro
and transport equipment.
The U2000 CORBA NBI mainly supports the following functions:
Alarm management
Report alarm events.
Synchronize active alarms.
Acknowledge alarms.
Unacknowledge alarms.
Performance management in the Metro and transport domains
Query history performance data.
Query current performance data.
Report performance threshold-crossing events.
Query performance threshold-crossing events.
Inventory management in the Metro and transport domains
Query physical inventory (NE, shelf, slot, card, and physical port).
Query logical inventory (logical port, fiber/cable, and trail).
Service provisioning management in the Metro and transport domains
Provision end-to-end services in the transport domain (SDH, WDM, OTN, MSTP,
ASON, and RTN).
Provision single-station services in the transport domain (SDH, WDM, OTN, and
MSTP).
Provision resources for Metro tunnels (MPLS tunnel and IP tunnel).
Provision resources for Metro services (ATM PWE3, CES PWE3, ETH PWE3, and
VPLS).
Diagnosis test management in the transport domain
Set loopback on a port and alarm insertion.
Conduct Ethernet CC, LB, and LT tests.
Conduct the 2M PRBS test.
SNMP NBI
Compliant with the SNMP V1/V2/V3 standard, the U2000 SNMP NBI enables unified alarm
management of the OSS on routers, Metro equipment, transport equipment, and access
equipment.
TL1 NBI
Compliant with the GR 831 standard, the U2000 TL1 NBI enables inventory query, inventory
provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services)
for the OSS in the access domain.
The U2000 TL1 NBI mainly supports the following functions:
Service provisioning management in the access domain
Provision xDSL services (ADSL, SHDSL, and VDSL2).
Provision xPON services (GPON and EPON).
Provision multicast services.
Provision voice services.
Provision BRAS services.
Manage service port/PVC connections.
Manage VLANs.
Manage Ethernet ports.
Manage ACL&Qos.
Inventory management in the access domain
Query resources (equipment, shelf, card, daughter card, port, and service virtual port).
Report resource change notification.
Manage and maintain resources.
Controlling the test component of an access device to perform a line test and report the
test result.
Issuing commands to capture or release a subscriber line to the test bus of a device and
then using external test unit to perform a line test.
The MML NBI solves the following problems:
A centralized line test system is provided to manage and test lines in the entire network.
These lines can be managed by EMSs provided by different vendors.
The integrated line test system can control an access device and a test unit concurrently
to perform a line test.
The U2000 supports the following types of MML NBIs:
Narrowband line test NBI: It is used to test narrowband access devices (lines and
terminals).
ADSL line test NBI: It is used to query ADSL port information, and capture or release
lines.
3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.
Qx Interface
The Qx interface adopts the private OptiX management protocol developed by Huawei.
Through the Qx interface, the U2000 is connected to the OptiX series equipment.
SNMP SBI
The SNMP interface is compliant with the SNMP V1, V2, and V2 standards. Through the
SNMP interface, the U2000 is connected to routers, switches, and security products of
Huawei.
CLI SBI
Through the CLI interface, the U2000 is connected to routers, switches, and security products
of Huawei.
SSH SBI
Secure Shell (SSH) is a tool that is similar to Telnet. All the transmitted data can be encrypted
through the SSH to prevent DNS spoofing and IP spoofing. In addition, the transmission rate
is high because the data transmitted through the SSH is compressed.
Telnet SBI
Through the Telnet SBI, the U2000 can log in to equipment remotely and manage equipment.
TFTP/FTP/SFTP SBI
The U2000 can back up the data of devices, upgrade devices, and load patches through the
TFTP/FTP/SFTP SBI.
When the data is backed up in the SFTP mode, the commands and the data are encrypted before they are
transmitted.
Syslog SBI
The U2000 can manage the NE logs through the Syslog SBI.
This topic describes how to ensure the security of the U2000 by managing objects such as
users, user groups, rights, and operation sets.
4.2 Topology Management
In topology management, the managed NEs and their connections are displayed in a topology
view. The managed NEs are displayed and managed in subnets and views. You can monitor
the operating status of the entire network in real time by browsing the topology view.
4.3 Alarm Management
In alarm management, you can monitor network exceptions in real time. It provides various
management methods such as alarm statistics, alarm identification, alarm notification, alarm
redefinition, and alarm correlation analysis. This helps the network administrator take proper
measures to recover the normal operation of the network.
4.4 Performance Management
The U2000 can monitor the key indicators of a network in real time, and provide statistics on
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.
4.5 Inventory Management
The U2000 provides the inventory management function that allows you to query and collect
the statistics on physical and logical resources in a unified manner.
4.6 Log Management
Log management includes the management of U2000 security logs, U2000 operation logs,
and NE security logs. The U2000 allows you to query and save logs periodically, to detect
illegal login and operations, and analyze faults in a timely manner. You can query the U2000
client that is used by a U2000 user to log in to the U2000 server and query the operations
performed by the user after login. You can also dump or print log data.
4.7 Database Management
The database backup management system of the U2000 provides a tool for database backup
and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable
and safe running of the U2000. Database management includes the management of NE and
U2000 databases. To ensure data security, you need to back up the database periodically.
4.8 NE Communication Parameter Management
You can set the parameters for the communication between the U2000 and NEs to ensure that
the U2000 communicate with the NEs in normal state.
4.9 DCN Management
DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and
microwave products.
4.10 NE Software Management
U2000 supports backup and loading of the equipment data.
4.11 Report Management
The U2000supports the iWeb report function and at the same time supports NMS report that
provides reports about alarms, logs, and resources. The U2000 user is able to print desired
data while viewing them. The report in table format supports filtering by equipment type and
can be saved in Excel format.
OSS/BSS
Hacker
SSL encryption
Firewall
Plain text
<=> 1010100100...
Client Worm
Firewall Virus
iManager U2000
SSL encryption
Plain text
<=> 1010100100...
Database backup and
Centralized authentication restoration
Account security policy Log management
Access control list
SNMP/Telnet/FTP
Permission Management
User permissions are classified into management permissions and operation permissions.
Through permission assignment, user operations on the U2000 can be controlled.
Management permissions refer to the permissions that a user is given to manage the
specified equipment and its data, or the permissions that a user group is given to manage
the specified domains. In the topology view, the equipment or areas that cannot be
managed are invisible.
Operation permissions refer to the permissions that a user is given to perform operations.
If a user does not have the permissions to manage a type of equipment, the user does not
have the permissions to operate the equipment.
The functions of permission management are described as follows:
Adding or deleting user or user group permissions, and setting the management domain
of the user or user group.
Creating object sets. Managed objects are grouped into different object sets to facilitate
permission assignment.
Creating operation sets. Operation permissions are grouped into different operation sets
to facilitate permission assignment.
Modifying or deleting object sets or operation sets.
Assigning the permissions of a type set to the user. After that, the user has the
permissions to view and operate the devices whose type is consistent with the type set.
Adjustable topology view: The view can be zoomed in or out so that you can view the
objects clearly.
Bird's eye view: You can see the position of the current topological window in the entire
view.
Network-wide NE statistics collection: You can collect statistics on the number of NE
types and the number of NEs of each type in the entire network.
Filter tree: You can filter all the NEs to display only the required NEs quickly.
Status bar: It displays the information such as the current status, current login user, IP
address of the server that is connected currently, and current operation result.
Topology view: A GUI in the U2000, which reflects the network structure. This GUI
shows various physical and logical entities of the network and provides the entrances of
various operations.
The display of topology alarms on the U2000 has the following features:
The color of a topological node indicates the polling status (such as normal, unknown, or
offline) and the alarm status of the monitored NE.
When an NE generates multiple fault alarms at different severities, the corresponding
topological node is displayed in the color/iron that indicates the highest alarm severity of
these alarms.
When multiple nodes in a subnet generate fault alarms, the subnet is displayed in the
color/iron that indicates the highest alarm severity of these alarms.
You can query the current alarms of an NE through the NE node. In addition, you can
query the details of the fault alarms through the NE Panel.
In automatic topology discovery, the transport NE, NE based on the SNMP protocol, and
NE based on the ICMP protocol are searched separately in batches. Then, the NE that is
searched out is added to the topology view automatically.
The Secuity NE can be added to the topology view automatically by use the function of
Batch Import NE.
The U2000 searches for the fiber/link in batches. Then, the discovered fiber/link is added
to the topology view on the U2000 automatically.
Function Description
Unified alarm panel Through the alarm panel, you can customize alarm conditions in
an alarm template flexibly and display alarms dynamically. This
helps to classify alarms quickly and acknowledge the concerned
alarms.
Alarm filtering With the alarm filtering function, you can learn the running status
of an NE in real time. In addition, you can query the alarm status,
refresh the status in real time, and query the details of an alarm in
the alarm activation window. You can also print the alarm
records that are received recently and meet the print conditions.
Alarm query With the alarm query function, you can query alarms by object
where an alarm occurs, function, alarm status, and alarm severity.
In addition, you can save and print the query result.
Alarm color display The severity of each alarm in the alarm list is displayed with a
corresponding color. The color can be customized.
Alarm topology When an NE reports an alarm, the icon in the upper left corner of
display the NE in the topology view varies with the alarm severity, or the
NE icon in the topology view can be in different colors according
to the alarm severity. In this case, you can query the current alarm
of the NE from the shortcut menu.
Alarm locating With the alarm locating function, you can select an alarm and
locate the topology object that generates the alarm (For a physical
alarm, you can locate the panel of the NE that generates the
alarm.)
Function Description
Sequence customizing Through the sequence customizing function, you can sort alarms
by field in the alarm list and customize the alarm display. In
addition, you can save alarms in the .txt, html, xls, pdf, and csv
file, and print the required alarm records.
Alarm Statistics
You can learn the alarm status through alarm statistics and alarm analysis.
U2000 can collect alarm statistics based on user-defined conditions. The alarm conditions
include the alarm name, alarm severity, alarm function type, alarm rising time, alarm status, or
a combination of any preceding items.
repeated events occur. In addition, the system can change the alarm or event severity
according to the pre-defined settings.
Alarm/Event frequency analysis
This function helps you to analyze the frequency with which an alarm or event occurs.
You can set a condition. Within the pre-defined period, when the number of alarms or
events exceeds the threshold, the system informs the user according to the pre-defined
correlation action.
Acknowledged&Uncleared alarm time analysis
This function helps you to analyze the time of an acknowledged but uncleared alarm.
You can set a condition. Within the pre-defined period, if the time of an acknowledged
alarm exceeds the threshold, the system changes the alarm severity.
Alarm Synchronization
The U2000 supports the ability to synchronize NE alarms automatically and manually. You
can manually synchronize NE alarms by performing operations through GUI or set an
automatic synchronization policy. When the U2000 restarts or the communication with an NE
recovers, the NE sends an alarm to the U2000. This implements the automatic alarm
synchronization on the U2000.
The U2000 supports the ability to synchronize NE alarm.
Manual synchronization
You can manually synchronize NE alarms by performing operations through GUI.
Automatic synchronization
You can set an automatic synchronization policy. When the U2000 starts, when its
communication with an NE recovers, or when the LCT user logs out, the NE sends an
alarm to the U2000. This implements the automatic alarm synchronization on the U2000.
Alarms are synchronized according to the following rules:
If an alarm is cleared on the NE but uncleared on the U2000, the alarm on the U2000 is
cleared.
If an alarm exists on the NE but does not exist on the U2000, the alarm is added to the
U2000.
Alarm Redefinition
The U2000 allows you to redefine the alarms of the NE. You can redefine the alarm severity
according to the requirements.
You can use this function to change the alarm severity displayed on the U2000, thus
highlighting only the alarms that concerns you.
Alarm Suppression
U2000 supports the ability to suppress NE alarms. If you set the status of an alarm to
Suppressed, the NE does not report the alarm.
The difference between alarm suppression and alarm masking is as follows: If you enable
alarm masking, an NE still reports an alarm but the U2000 does not receive the alarm. If you
enable alarm suppression, the NE does not report an alarm.
Alarm Jumping
The U2000 supports the alarm locating function. This function helps to jump to the topology
object that generates the required alarm. In addition, this function helps to quickly locate a
network fault, which improves the efficiency of alarm locating. Figure 4-8 shows the alarm
jumping function.
Template Description
Data Monitoring Template A data monitoring template is a collection
of indicators, which can be applied on the
resources for collecting the performance
data. You can configure indicators and
indicator groups.
TCA Monitoring Template A threshold crossing alert (TCA)
monitoring template is a collection of
indicators and threshold definition that can
be applied on the resources for monitoring
the TCA alerts. TCA can be applied
according to the conditions selected such as
high TCA monitor and low TCA monitor.
Threshold definition includes high trigger,
low trigger, high clear, low clear, high alarm
level, and low alarm level.
Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
Information displayed in table mode can be saved in TXT,CSV or HTMLformat.
You can collect statistics on network performance data within a specified period, to know the
performance status of a network in the specified period and to provide data reference for
forecasting performance change of the network.
By setting the performance monitoring template, you can manage performance monitoring
tasks in an easy manner.
Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
Information displayed in table mode can be saved in TXT,CSV or HTMLformat.
Viewing the running results of SLA test on network monitoring through a matrix (Now
only support UDP jitter test through matrix)
You can view the results of the network monitoring test cases through a matrix. In this
manner, you can know the statistics about network-related indicators, evaluate network
performance, and perform association analysis on network performance.
Physical Resources
The physical resources are as follows:
Telecommunications room
Rack
NE
Shelf
Board
Subboard
Port
ONU
Slot Information Report
Slot Used Statistics
Logical Resources
The logical resources are as follows:
Connection
Gateway
VLAN
Multicast
QoS and ACL
Protocol
Link
Link group
Interface resource
Operation Logs
Operation logs record the operations (such as fault management, performance management,
topology management, and resource management) performed on the U2000.
View operation logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, operation object, or a random combination of the preceding items. In
this manner, the network administrator can learn the operations performed by the current
user in real time.
Dump operation logs.
Dump operation logs manually.
Dump operation logs upon log overflow or at scheduled times.
Forward operation logs to the syslog server.
Save operation logs as the TXT, HTML, CVS, PDF or Excel file.
System Logs
System logs record operations performed on the U2000, including the service start and stop,
and log exporting and deletion.
View system logs. The network administrator can set query conditions and query user
operation logs by source, level, time range, details, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.
Dump system logs.
Dump system logs manually.
Dump system logs upon log overflow or at scheduled times.
Forward system logs to the syslog server.
Save system logs as the TXT, HTML, CVS, PDF or Excel file.
Security Logs
Security logs record the security-based operations that the user performs on the U2000,
including logout, login, log dumping, and device log synchronization.
View security logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, security event, operation object, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.
Dump security logs.
Dump security logs manually.
Dump security logs upon log overflow or at scheduled times.
Forward security logs to the syslog server.
Save operation logs as the TXT, HTML, CVS, PDF or Excel file.
NE Logs
NE logs record the operations on the managed NEs. You can query the NE logs through
theU2000 client GUI. You do not need to query the operation logs on each NE.
NE Database Management
By using the U2000, you can perform the following NE database management operations:
For transport equipment and access equipment, back up the NE database to the system
control and communication unit (SCC).
For transport equipment and access equipment, back up the NE database of transport or
access equipment to the CF card manually or automatically.
For transport equipment and access equipment, restore the NE configuration data of
transport or access equipment from the SCC board or CF card.
Back up the NE database to a local or remote server.
Start a manual backup.
Set a scheduled backup task.
Restore the NE database from a local or remote server.
Task Management
U2000 enables you to create scheduled tasks, including backing up the data of an NE, loading
the programs or patches of an NE, and restoring the data of an NE. U2000 can automatically
perform the tasks and can also suspend and resume tasks.
Policy Management
U2000 enables you to configure backup policies and saving policies. You can configure the
default backup policy or saving policy. In this case, U2000 backs up or saves the data
automatically and periodically according to the configured policy. You can also modify,
suspend, and run the equipment backup or saving policy.
Resource Report
Port Resource Report
Statistics Report of SDH Tributary Port Resources
Lower Order Cross-Connections Statistic Report
SDH Fiber/Microwave Link Resource Usage Report
Statistics Report of Trails Between SDH NEs
Statistics Report of SDH Protection Subnet Resources
Statistics Report of SDH Circuit Resources
Microwave Link Report
Microwave License Capacity Report
Statistics Report of Ethernet Port Resources
Statistics Report of Service Resources Between Ethernet NEs
WDM Protection Group Switching State Report
WDM NE Master/Slave Subrack Info Report
Statistics Report of WDM Client-Side Port Resources
Statistics Report of WDM Link Resources
Statistics Report of Inter-Station Wavelength Resources
Browse WDM Wavelength Resource
Wavelength Resource Usage Report
PON Port Splitting Status
Board Manufacturer Information
Export project Document
Clock Tracing Diagram
Networking Diagram
Timeslot Allocation Diagram
iWeb report
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
The function of the iWeb report see 9.7 Report Subsystem Management.
The main functions for querying the system information are as follows:
Querying the process information
Querying the hard disk information
Querying the database information
Querying the component information
Querying the operation logs
both SDH and ASON features. An ASON network is managed by the U2000 that combines
ASON and SDH features.
Basic NE Configuration
By using the U2000, a user can perform the following operations:
Modify NE attributes such as:
NE name
NE ID
NE Extended ID
Remarks
NE pre-configuration
In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID on the
U2000.
Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
Query physical resources in the following lists:
NE list
Board manufacturer information
Board list
Cabinet list
Subrack list
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
Replace a board. The user can replace a board with a board of another type on the
U2000.
The user can replace board A with board B whose rate is the same as the rate of board
A and where the number of ports is the same as the number of ports on board A.
The user can also replace board A with board B whose rate is lower than the rate of
board B and where the number of ports is less than the number of ports on board A.
Query the actual physical board type of a board that is used as a board of another type.
Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.
Environment monitoring information. You can set the following items:
PMU interface
EMU interface
CAU interface
NE fan speed
Virtual NE management
Create a virtual NE.
Add a board.
Create fibers between the virtual NE and other NEs.
Create SDH services.
Create protection subnets.
Search for and create trails on the virtual NE.
Support the replacement of the boards.
Supports the management of inband DCN.
Support graphical display of performance events relevant to the optical power.
Orderwire Configuration
By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.
Set and query the networkwide conference call number.
Set and query the subnet No. length and the related subnet of the optical interface.
Configure and query the SDH network node interface (NNI) connection for orderwire.
Configure and query the F1 data port.
Configure and query the broadcast data port.
Interface Configuration
By using the U2000, a user can perform the following operations:
Interface board management: Query and set the SDH interface boards installed on NEs.
Set the parameters of SDH interfaces.
Set the parameters of PDH interfaces.
Modify the optical/electrical attributes of the board port.
Set overhead interfaces, including:
Orderwire
Hotline number
Support the setting of the LPT restoration time and the point to multi-point LPT
management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and
VCTrunk(s)->VCTrunk(s) for a board.
Support the ability to manage multiprotocol label switching (MPLS) for multi-service
transmission platform (MSTP) equipment. The MSTP equipment builds an label
switched path (LSP) with a PE router, identifies LSP labels and service priorities, and
encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.
Supports the management of the virtual Ethernet interface
Supports the control plane for configuring the static routes and address resolution.
Supports the packet Ethernet services including E-Line service, E-LAN service,
E-AGGR service and clock service.
RPR Management
By using the U2000, a user can perform the following operations:
Modify resilient packet ring (RPR) node information.
Set and query the node information of an NE in the RPR.
Set the RPR link information of an NE.
Query the topology of the RPR that the NE belongs to.
Query the protection status, switching status and switching position of the RPR that an
NE belongs to.
Configure forced switching, manual switching or clear switching in the RPR that an NE
belongs to.
Clock Configuration
By using the U2000, a user can perform the following operations:
Query the clock synchronization status.
Set clock source priority tables, including:
System clock source priority list
Priority table for phase-locked sources of 1st external clock output
Priority table for phase-locked sources of 2nd external clock output
Set clock source switching, including:
Clock source restoration parameters
Clock source switching condition
Clock source switching
Configure clock subnets, including:
Clock subnet
Clock quality
Synchronization status message (SSM) output control
Clock ID status
Set phase-locked sources output by external clock, including:
External clock output phase-locked source
2 Mbit/s phase-locked source external clock attributes
Create an SDH trail, designate a timeslot, and select the protection priority strategy
and the resource usage strategy. The service levels include VC12, VC3, VC4, VC4
server trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.
Activate or deactivate, and lock or unlock an SDH trail.
Join or split, and enable or disable a VC4 server trail.
During search of SDH trails, the U2000 retains the attributes of the existing ones as
they are.
Upgrade an SDH trail to an ASON trail.
Degrade an ASON trail to an SDH trail.
Query the service status on a per-NE basis according to SDH trails.
Manage optical power: Query the input power, output power, and power thresholds
for SDH boards.
Set and query the overhead bytes of all NEs on the trail, such as the trace byte.
The U2000 prompts users to configure trace bytes when timeslot out-of-sequence
occurs to the MS.
Query the status of a lower order service.
Set overhead pass-through or termination of all NEs on the trail.
Insert alarms into the trails of VC4 level, such as AIS and remote defect indication
(RDI).
Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback,
optical interface loopback and cross-connection loopback.
Perform a PRBS test on the trail.
Modify the add/drop ports of the trail and the timeslot occupied by the trail
in-service.
Adjust the original route partially by changing the NE, board or timeslot that the trail
passes through.
Modify the route for concatenated services in-service.
Person SNCP switching on a trail.
Generate dual-fed SDH services automatically for 1+1 linear MSP.
Duplicate an SDH trail for creating trails in batches.
Manage discrete SDH services, such as querying or analyzing discrete services.
View the usage of VC12 or VC3 trails related to a VC4 server trail in an easy manner.
You can also view the information about the VC12 or VC3 trails.
Convert SDH discrete cross-connections to a mono nodal trail.
Manage an SDH trail based on rights and domains.
Manage the alarms and performance events related to an SDH trail.
Configure alarm suppression or alarm reversion for a trail.
Query current and history alarms, current and history performance data, unavailable
time (UAT) and performance threshold-crossing records of an SDH trail.
Set the performance parameters for an SDH trail.
Query the SDH trails and customer information affected by an alarm.
Display the R_LOS alarms in the Transmission Media Layer Route view.
Search for trails. According to the NE configuration data, at the NE layer, or the fiber
connection data, protection subnet information at the network layer, the U2000 generates
the network layer information about end-to-end trails, including SDH trails and Ethernet
trails.
Name trails automatically.
Filter trails in three ways.
Filter all: Filter all trails and only display the qualified trails in a network.
Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.
For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.
Activate or deactivate an Ethernet trail.
During search of Ethernet trails, the U2000 retains the attributes of the existing ones as
they are.
Manage discrete Ethernet services, such as querying or analyzing discrete services.
Search for an Ethernet trail.
Manage the alarms and performance events related to an Ethernet trail.
Query the Ethernet trails and customer information affected by the alarm.
Query current and history alarms of an Ethernet trail.
Filter trails in three ways.
Filter all: Filter all trails and only display the qualified trails in a network.
Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.
Manage the alarms and performance events related to an Ethernet trail.
Query the Ethernet trails and customer information affected by the alarm.
Query current alarms, history alarms of an Ethernet trail.
Implement the RMON performance function of an Ethernet trail.
Tunnel Management
By using the U2000, you can perform the following operations:
Create static tunnels.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including the working and protection routes.
View the alarm of a tunnel.
View the performance of a tunnel.
Test and check a tunnel.
Manage discrete tunnels.
Manage BGP/MPLS VPN tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.
Tunnel Management
By using the U2000, you can perform the following operations:
Create static CR tunnel.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
View the alarm of a tunnel.
View the performance of a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.
Manage domains, including creating and deleting domains, and changing the domain
name.
Query the ASON NE software version.
Search for ASON discrete signaling.
Manage node IDs on ASON NEs.
Enable or disable the optical virtual private network (OVPN) status of the NE.
Query SRGs relevant to an NE.
TE Link Management
By using the U2000, a user can perform the following operations:
Synchronize networkwide links by domain.
Filter links by domain, source/sink information or OVPN customer.
View traffic engineering (TE) links.
Create virtual TE links.
Delete virtual TE links.
Create fibers.
Set the distance for a TE link.
Set the risk link group number.
View the preset restoration trail or shared mesh for restoration trail an ASON trail.
Revert ASON trails manually.
Switch the working or protection trail of a diamond trail manually.
View the alarms of an ASON trail.
Set alarm suppression for the selected ASON trail.
View the control plane performance of an ASON trail.
View the performance events of an ASON trail.
Create the ASON trail report.
Refresh the original route, actual route or associated route of an ASON trail.
Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.
Set an actual route as an original route.
Restore to the original route in batches.
Set names for ASON trails in batches according to the naming rules.
Query the service level agreement (SLA) conformity of ASON trails.
Support the display of valid routes for gold services after the MSP switching.
Save the attributes of the service after you create an ASON service successful.
Restore the default attributes of the service when you create an ASON service.
Set SNCP access to a ASON trail.
Manage creators of SDH ASON trails.
Downgrade an SDH ASON trail forcibly.
Reroute the preset SDH ASON restoration trail in case of a fault.
SRG Management
Create, delete and modify an SRG.
Manage SRGS of the pipe, fiber/cable, NE and site.
Basic NE Configuration
By using the U2000, a user can perform the following operations:
Synchronize NE time: Send the computer system time, NTP server time, or standard
NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You
can set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.
Query the physical inventory information, including the equipment room, racks, NEs,
shelves, boards, subboards, and ports.
Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
Disable NE functions automatically. You can set the U2000 to periodically disable
certain NE functions that may affect services, such as loopback and ALS. When the time
expires, these operations automatically stop.
Modify NE attributes such as:
NE name
NE ID
NE extended ID
Remarks
NE pre-configuration
NE Time zone and DST
Change attributes of optical NEs, including:
Name
Remarks
Resources assigned for them
Environment monitoring information. You can set or query the PMU interface, NE fan
speed and monitor temperature.
Network operator information. You can set the information about the network operator,
including the international identifier, domestic identifier, and customized identifier.
Search and create NEs by discovering the NE IP address automatically.
Orderwire Configuration
By using the U2000, a user can perform the following operations:
Configure the board to an orderwire board, and query the orderwire board information.
Set and query the orderwire phone numbers, call waiting time, dialing mode, and
orderwire phone port availability.
Set and query the networkwide conference call number.
Set and query the subnet No. length and the related subnet of the optical interface.
Set and query the SDH NNI connection for orderwire.
QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.
Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.
Configure QoS, including:
Flow
CAR
CoS
Flow shaping
Port shaping
Configure link capacity adjustment scheme (LCAS): The LCAS can dynamically adjust
the number of virtual containers for mapping desired services, to meet different
bandwidth requirements of services. In this manner, the bandwidth utilization is
improved.
Configure OAM for Ethernet services.
Configure OAM for Ethernet ports.
Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:
Configure and query the SM overhead.
Configure and query PM overheads.
Configure and query the TCM overhead.
Configure and query the FTFL overhead.
Query the OPU overhead.
By using the U2000, a user can configure WDM overheads as follows:
Configure the optical channel (OCh) overhead at the SDH interface.
Configure the optical transponder unit (OTU) overhead at the OTN interface.
Configure the optical demultiplexer unit (ODU) overhead at the OTN interface.
Configure the optical channel payload unit (OPU) overhead at the OTN interface.
Configure the optical transmission section (OTS) overhead at the OTN interface.
By using the U2000, a user can configure SDH overheads for the OptiX OSN 8800 I and
OptiX OSN 8800 II as follows:
Configure the regenerator section overhead (J0).
Configure the lower order path overhead (V5, J2).
Configure the VC4 higher order path overhead (J1, C2) and pass-through or termination.
Configure the VC3 higher order path overhead (J1, C2).
ROADM Configuration
Using the reconfigurable optical add/drop multiplexer (ROADM) function in the U2000, a
user can perform add/drop and pass-through configuration for optical channels. The WDM
equipment uses the DWC and wave selective switch (WSS) to implement the ROADM
function.
Configure ROADM boards based on the DWC boards: The wavelength grooming is
realized through the DWC boards. This configuration method is often used for the
normal nodes in a chain or ring network.
Configure ROADM boards based on the WSS boards: There are two types of networking:
WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for the
cross-connect nodes in a ring network.
Configure ROADM boards based on the multiplexing and demultiplexing boards:
Wavelengths cannot be groomed dynamically. This configuration method is often used
for the normal nodes in a chain network.
Clock Configuration
By using the U2000, a user can perform the following operations:
Configure a board clock source.
Configure transparent transmission of an external clock.
Configure a clock for the SCC board.
Configure a clock for the optical supervisory channel unit.
Specify the traceable clock source for the SCC board.
Define the clock source priorities.
Configure MS SNCP.
Configure VLAN SNCP for an Ethernet board.
Perform protection switching.
Query the switching status.
Support BPS protection.
Support the DBPS protection. The distribute board protect system (DBPS) protects the
10GE and GE ports of the TBE board.
Support ODUk SPRings of the ODU1 and ODU2 levels.
Support the service package. The service package module helps you perform typical
service configurations. In this manner, you are freed from the in-field commissioning.
This reduces costs of deployment commissioning and maintenance of products. In
addition, the equipment can be configured in a one-touch manner.
In the case of 1+1 protection for the SCC board, a user can query the status of the data
backup between the active and standby SCC boards.
The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.
Perform the function of automatic power equilibrium (APE). If the MCA board at the
receive end detects that the optical power of some channels is abnormal, the station
reports an exceptional event to the U2000. After the user confirms the event, the U2000
issues a command to the optical attenuation adjustment board of the upstream station.
This board adjusts the optical power of the abnormal channel so that the optical signal
noise ratio (OSNR) of each channel at the receive end is equalized.
Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.
Support pre-alerts for the port optical power.
Dispersion Compensation
By using the U2000, a user can perform the following operations:
The DCM board can conduct dispersion compensation to each band to realize dispersion
equalization.
Tunable dispersion compensators (TDCs) can be used to precisely adjust the dispersion.
The submarine system supports using a separate dispersion compensation board, such as
the TDC1 and TDC2, to perform dispersion compensation for signals at the line side of
OTU boards.
Wavelength Monitoring
The U2000 supports wavelength monitoring management for the OptiX BWS 1600G, OptiX
OSN 6800, OptiX OSN 8800 I and OptiX OSN 8800 II.
WDM PRBS
You can perform a PRBS test on a board to check the path quality. You can also check
whether the WDM link is normal before a service is available.
PFE Managent
The U2000 supports the ability to manage the PFE 1670, the PFE 1670 is the power supply
equipment for the submarine transmission system.
FC Service Test
The FC service test uses the 12LOM board to replace the FC test equipment (such as Smartbit)
to run the test. The FC service test serves to verify whether the FC service line and the
equipment under test are normal.
Basic NE Configuration
By using the U2000, a user can perform the following operations:
Synchronize NE time: Send the computer system time, NTP server time at the U2000
server end to all NEs for synchronizing the NE time. You can configure the U2000 to
automatically synchronize the NE time by specifying the automatic synchronization
period.
Query physical resources in the following lists:
NE list
Board manufacturer information
Board list
Subrack list
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
Disable the NE functions automatically. You can set to periodically disable some NE
functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.
Modify NE attributes such as:
NE name
Remarks
Enable or disable automatic board installation.
Enable or disable LAN port access control.
Set start time for 24-hour performance monitoring.
Enable or disable daylight saving time.
Orderwire Configuration
By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, and call waiting time.
Set and query the networkwide conference call number.
Set and query the subnet number length.
Network attributes
Advanced attributes
Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.
QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.
Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.
Configure QoS, including:
Flow
CAR
CoS
Port shaping
Configure OAM for Ethernet services.
Configure OAM for Ethernet ports.
Support the intra-board LAG function.
Support the DLAG function.
Support the VLAN group function.
Support the port MAC address filtering.
Test frame receiving and transmitting on Ethernet boards.
Support the protocol diagnosis function.
Configure QinQ Type area.
Configure Ethernet Layer-2 switching, including:
Aging time
Spanning tree
IGMP snooping protocol.
Support the automatic reporting of RMON performance of Ethernet boards.
Dump history RMON performance data of Ethernet boards.
Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:
Configure and query the SM overhead.
Configure and query the PM overhead.
Configure and query the TCM overhead.
Query the OPU overhead.
Configure and query the FTFL overhead.
By using the U2000, a user can configure WDM overheads as follows:
OCh Overhead Management-SONET Interface.
Configure the OTU overhead at the OCh overhead management-OTN interface.
Configure the ODU overhead at the OCh overhead management-OTN interface.
Configure the OPU overhead at the OCh overhead management-OTN interface.
Configure the TCM overhead at the OCh overhead management-OTN interface.
Configure the OTS overhead at the OCh overhead management-OTN interface.
Lock WDM trails and view the lock status of the corresponding trails in the service
management window of the NE Explorer.
View the name of the trail that a service belongs to.
Query the trail that a service belongs to.
ROADM Configuration
Using the ROADM function in the U2000, a user can perform add/drop and pass-through
configuration for optical channels. The WDM equipment uses the DWC and WSS to
implement the function of reconfiguration optical add/drop multiplexing.
The DWC type of the ROADM: The DWC is applicable to normal nodes in a chain or
ring network.
The WSS type of the ROADM: The WSS is applicable to cross-connect nodes in a ring.
This way is applicable for the grooming of multi-dimensional optical cross-connections.
A maximum of eight dimensions are supported.
Optical cross-connection broadcast services: Support the broadcast services of optical
cross-connections on a per-NE basis.
Clock Configuration
By using the U2000, a user can perform the following operations:
Configure the master clock.
Add a clock source.
Delete a clock source.
Query a clock source.
Configure the OTC card clock.
Set the input attributes of the OTC card clock.
Set the output attributes of the OTC card clock.
Set the working route of the OTC card clock.
Set the synchronization clock source.
The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.
Perform the function of APE. If the MCA board at the receive end detects that the optical
power of some channels is abnormal, the station reports an exceptional event to the
U2000. After the user confirms the event, the U2000 issues a command to the optical
attenuation adjustment board of the upstream station. This board adjusts the optical
power of the abnormal channel so that the OSNR of each channel at the receive end is
equalized.
Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.
Support pre-alerts for the port optical power.
Dispersion Compensation
The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion
slope at 1550 nm window. After the optical signal is transmitted over a certain distance,
the accumulation of positive dispersion broadens the optical signal pulse and seriously
affects the system transmission performance. To minimize this effect, a negative DCM is
used in the network. It uses negative dispersion to compensate the positive dispersion of
transmitting fiber, so as to maintain the original shape of the signal pulse.
The OEQ NE can apply dispersion compensation to each band to reach dispersion
equalization.
This function supports 40G dispersion compensation configuration. It uses the TDC to
precisely adjust the dispersion.
Wavelength Monitoring
Wavelength monitoring uses the wavelength supervisory unit to monitor the wavelengths that
are transmitted from the WDM-side optical interface of the OTU board (including the service
convergence unit) and to control the wavelength drift. This function ensures stable
wavelengths.
WDM PRBS
You can perform PRBS on a board to check the path quality. You can also check whether the
WDM link is normal before a service is available.
Housekeeping Configuration
By using the U2000, a user can perform the following operations:
Set and query environment alarm property.
Create environment alarm attributes.
Set normal state of environment property.
Query environment alarm attributes.
Modify environment alarm attributes.
Delete environment alarm attributes.
EAPE Management
Enhanced automatic power equalization (EAPE) management can reduce the bit error rate
(BER) of a service. You can query the EAPE function for an OCh trail.
ASON Management
Topology Management
By using the U2000, a user can perform the following operations:
Discover ASON topologies and resources automatically.
Synchronize NEs in a domain: the U2000 can obtain the topology of the network through
the active NE.
Set the active and standby NEs.
Manage domains, including creating and deleting domains, and changing the domain
name.
Query the ASON NE software version.
To perform end-to-end network management, you need to have the related license.
By using the U2000, a user can perform the following operations:
Search for a trail.
According to the NE configuration data and fiber connection data in the NE layer, the
U2000 generates the network layer information about end-to-end trails, including
OTS trails, OCh client trails, OCh trails, optical multiplex section (OMS) trails,
optical supervisory channel (OSC) trails, ODUk layer trails and optical channel
transport unit (OTUk) layer trails.
Manage conflict and discrete trails created during the search process.
Join trails automatically during the wavelength trail search process.
Support the reservation of user-defined information on trails during WDM trail
search.
Search for inverse multiplexing trail of the 40G and 10G rate levels.
Create a trail.
The U2000 automatically generate an OTS trail after the fibers are correctly
connected between the specified boards.
Create an OCh trail, and create an OCh cross-connection by using the trail
management function.
Create an ODU0, ODU1 or ODU2 trail, and create an ODU0, ODU1 or ODU2
cross-connection by using the trail management function.
Create a client trail, and create GE, FC, and FE services based on the OCh and ODUk
trails by using the trail management function.
Create SNCP or WXCP by using the trail management function.
Create a WDM trail by double-clicking an NE and select the source and sink ends.
Select the explicit route of the protection trail when creating a WDM trail.
Support the end-to-end management function for ASON-WDM trails.
Create multi-layer WDM trails. Meanwhile, the Client and ODUk cross-connections
are created by using the end-to-end trail management function.
Create trails through duplication. You can create multiple trails by duplicating a trail.
In addition, you can generate Client and ODUk cross-connections in batches by using
the end-to-end trail management function.
Create WDM trails whose fiber jumpers are connected inside a station
Support port attribute.
View inner cross-connection.
Manage customers of a trail.
Create a customer.
View and modify the customer information.
View the trail related to a customer.
View the current and history alarms for a customer.
Delete a customer.
View trails.
Join trails of the same type.
Split a trail into trails of the same type.
Browse the trails included in a trail group.
Query 1+1 protection for an optical layer trail and perform protection switching for
the optical layer trail.
Query WXCP and SNCP protected trails, and perform protection switching.
Support the ability to add and delete a WXCP protection group.
Use the TTI byte to check fiber connection relations of an OCh trail.
Support the transaction creation of WDM trails and the rollback in the case of a
creation failure.
Support outputting the TM-TM connection diagram for WDM trails.
Support the automatic naming rule for WDM trails.
Modify the source and sink of a Client trail.
Support ODU trail end-to-end management.
Support the search and end-to-end management of Client trails.
Support the optical layer alarms and the configuration of optical layer overheads on
trail levels.
Support the functions of adding and deleting the WXCP or SNCP protection of an
ODUk trail or a Client trail.
Set the optical power mode by the end-to-end trail management function.
Implement the Save As and Print functions for the channel allocation of a WDM trail.
Save the signal flow diagram of a WDM trail.
Manage WDM trails base on rights and domains.
Manage WDM discrete services.
Manage WDM platinum trails.
Support 8 clients to create WDM trail on the same time.
Delete a trail. You can delete a WDM trail (except the OTS trail) from the NE layer and
network layer of the U2000.
Support enhanced automatic power equilibrium (EAPE) based on an OCh trail. The
EAPE function automatically adjusts the transmitted optical power of each path
according to the signal quality of each path monitored by the OTU board at the receive
end, to ensure the quality of signals in each path at the receive end meets the preset
requirements. This ensures that services are available.
Filter trails in three ways.
Filter all: Filter all trails and only display the qualified trails in a network.
Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.
Topology Management
By using the U2000, a user can perform the following operations:
Discover ASON topologies and resources automatically.
Synchronize NEs in a domain: the U2000 can obtain the topology of the ASON domain
through the active NE.
Set the active and standby NEs.
Manage domains, including creating and deleting domains, and changing the domain
name.
Query the ASON NE software version.
Manage node IDs on ASON NEs.
Query the version of the ASON software.
TE Link Management
By using the U2000, a user can perform the following operations:
Synchronize networkwide links by domain or payload type.
Filter links by domain, link signal type, payload type (optical layer, electrical layer), or
source/sink information.
View TE links.
Query the related ASON trails for a TE link.
Create fibers according the TE link.
Create a virtual TE link.
Delete a virtual TE link.
Manage TE links whose payload type is OCh, ODUk or client (GE/Any).
Set the distance for a TE link.
Set the risk link group number.
Create a link resource report.
View resource usage.
View the current alarm or history alarm information about a link.
Set alarm suppression for a control plane alarm.
Basic NE Configuration
By using the U2000, a user can perform the following operations:
Support the ability to manage the connections between back-to-back RTN NEs. On the
Main Topology of the U2000, the connections between back-to-back RTN NEs indicate
the relations between the RTN NEs on the same station that are connected in a
back-to-back manner through network interfaces.
Modify NE attributes such as:
NE name
NE ID
NE Extended ID
Remarks
Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.
Query physical resources in the following lists:
NE list
Board manufacturer information
Board list
Cabinet list
Subrack list
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.
Environment monitoring information. You can set the interfaces of environment
monitoring.
Support the license management function for equipment.
Support the press-to-install function for logical boards.
Support the Hop management function.
Orderwire Configuration
By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.
Set and query the orderwire occupied bytes.
Configure and query the F1 data port.
Configure and query the broadcast data port.
Interface Configuration
By using the U2000, a user can perform the following operations:
Bound path
Configure external ports of Ethernet interface, including:
Basic attributes
Flow control
TAG attributes
Network attributes
Advanced attributes.
Configure Jumbo frame.
Configure QinQ Type area.
Configure Ethernet private line (EPL) services.
Configure EVPL (QinQ) services.
Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,
disable MAC address, bound path, self-learning MAC address, and VLAN MAC address
table capacity.
Configure Ethernet virtual private LAN (EVPLAN) services.
Test frame receiving and transmitting on Ethernet boards.
Configure quality of service (QoS), including:
Flow configuration
CAR configuration
CoS configuration
Port shaping configuration
Board shaping configuration
Configure Ethernet Layer-2 switching, including:
Aging time
Spanning tree
IGMP snooping protocol.
Support the ability to diagnose protocol faults and restore protocols.
Configure point-to-point LPT management and point-to-multipoint LPT management.
Configure Ethernet intra-board LAG.
Configure Ethernet Ring Protection.
Configure the RMON performance functions such as browsing history groups of
Ethernet ports, collecting performance statistics of a group, setting an alarm group of
Ethernet ports, and setting a history control group.
Clock Configuration
By using the U2000, a user can perform the following operations:
Query the clock synchronization status.
Set system clock source priority list.
Set clock source switching, including:
Clock source restoration parameters
Clock source switching condition
LAG Configuration
Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical
link of faster rate for transmitting data. This function improves the link availability and
increases link capacity.
The U2000 supports configuring the following LAG attributes:
Configure the load sharing type, including sharing and non-sharing.
Configure the LAG type, including manual and static.
Configure the service distribution algorithm of the LAG.
Configure the port priority and system priority of the LAG.
BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection
packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.
QoS Configuration
Quality of service (QoS) indicates the performance of the data flow that travels through a
network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the
bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating
and monitoring network resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:
Configure Diffsever domains.
Configure ATM CoS mapping.
Configure simple flow classification and complex flow classification.
Configure CAR and Shaping.
Configure the color blindness mode.
Configure the WFQ schedule policy.
Configure the port WREQ schedule policy.
To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy and V-UNI ingress policy. By using these function
point policies, you can bind the CAR configuration attribute, shaping configuration
attribute, flow classification configuration attributes, WFQ schedule policy and WRED
policy attributes.
Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and
hold-off time.
Perform MPLS tunnel protection switching.
Query the protection switching status of an MPLS tunnel.
Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.
Tunnel Management
By using the U2000, you can perform the following operations:
Create static tunnels.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including the working and protection routes.
View the alarm of a tunnel.
View the performance of a tunnel.
Test and check a tunnel.
Manage discrete tunnels.
Manage BGP/MPLS VPN tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.
Tunnel Management
By using the U2000, you can perform the following operations:
Create static CR, RSVP, and IP tunnels.
Create RSVP tunnels in batches.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
View the alarm of a tunnel.
View the performance of a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.
Basic NE Configuration
By using the U2000, a user can perform the following operations:
Modify NE attributes such as:
NE name
NE ID
NE extended ID
Remarks
NE pre-configuration
Synchronize NE time: Align all NEs with the system time of the U2000 server. You can
set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.
Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.
Disable NE functions automatically: You can set to periodically disable certain NE
functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.
Support environment monitoring information.
Support the board replacement function.
Clock Configuration
The U2000 supports configuring various clock mode.
Configuration the clock domain.
Query the clock synchronization status.
IEEE 1588 Packet Clock
Configure clock service.
Configure clock synchronization attribute.
Configure clock source priority table.
Configure clock subnet.
Configure external interface.
TOP Packet Clock Configuration
Configure clock services.
Select a differential clock source.
ACR Clock Configuration
Configure CES ACR or 1588 ACR clock.
Configure ACR clock protection.
Physical Clock Configuration
Query the clock synchronization status.
Set clock source priority tables, including:
System clock source priority list
Priority table for phase-locked sources of 1st external clock output
MSTP Configuration
The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to
block some redundant trails and change a loop network to a non-loop tree network. This
function prevents packet increase in a loop network and generation of broadcast storms in an
endless cycle. Different from the STP and RSTP, the MSTP can forward data according to
VLAN packets and realize load balance of VLAN data.
The U2000 supports configuring the following MSTP attributes:
Configure parameters of port groups and bridges.
Configure CIST and MSTI parameters.
Query CIST status and MSTI status.
The U2000 supports the ability to configure IGMP snooping for E-LAN services and provides
the following functions:
Configure IGMP Snooping protocol parameters.
Configure quick leave ports.
Manage routes.
Configure route member ports.
Query statistic information of IGMP protocol packets.
BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection
packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.
The U2000 supports the functions of performing the BFD detection on IP/GRE tunnels and
the inter gateway protocol (IGP).
The U2000 supports configuring single-hop or multi-hop BFD detection.
LPT Configuration
LPT is used to return the remote-end link status to the near end. The near-end equipment
performs operations depending on the remote-end link status. When the intermediate
transmission network of the services becomes faulty, the LPT informs the access equipment at
both ends of the transmission network to enable the backup network. That ensures the normal
transmission of the important data.
QoS Configuration
QoS indicates the performance of the data flow that travels through a network. The QoS is
used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can
minimize the delay and jitter in the network by reasonably allocating and monitoring network
resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:
Configure QoS profile.
Configure DiffServ domains.
Configure ATM CoS mapping.
Configure SVLAN DEI used flag.
Configure simple flow classification and complex flow classification.
Configure CAR and Shaping.
Configure the color blindness mode.
Configure the WFQ schedule policy.
Configure the port WRED schedule policy.
Configure the port WFQ policy.
Configure the service WRED policy.
To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy
and QinQ policy. By using these function point policies, you can bind the CAR
configuration attribute, shaping configuration attribute, flow classification configuration
attributes, WFQ schedule policy, WRED policy and color blindness mode attributes.
Configure CoS queue mapping.
Supports the application of the QoS policy to multiple NEs.
The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE
basis:
Configure basic attributes of the MPLS.
Configure static unicast MPLS tunnels.
Create forward and backward MPLS tunnels at the same time.
Create bidirectional MPLS Tunnel.
Create the E-LSP and L-LSP.
Manage PWs.
Manage tunnel labels and PW labels.
Query the PWs that a tunnel carries.
MS PW Configuration
By creating multi step (MS)-PW to transmit services, you can save tunnel resources and
transmit services over different networks.
UDP-Encapsulated PW Configuration
The U2000 supports the UDP-encapsulated PWs that are carried in IP tunnels.
See Figure 8-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using the
E1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates
the pieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW.
The U2000 provides the following configuration functions for CES service creation:
Create the corresponding PW when creating a CES service.
Create UNI-UNI and UNI-NNI CES services.
Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
Configure QoS of the CES service.
Configure idle timeslot recovery value.
Configure CES service alarm transparent transmission.
Select the tunnel where a PW is carried online.
The U2000 provides the following configuration functions for ATM service creation:
Create UNI-UNI and UNIs-NNI ATM services.
Create PVP, PVC and transparent ATM services.
Create the corresponding PW when creating an ATM service.
Configure the IMA group.
Configure QoS of the ATM service.
Configure the CoS mapping.
Select the tunnel where a PW is carried online.
The U2000 supports the following functions of configuring E-line services on a per-NE basis:
Create UNI-UNI E-Line services.
Create UNI-NNI E-Line services that are carried on ports.
Create UNI-NNI E-Line services that are carried on PWs.
Create UNI-NNI E-Line services that are carried on QinQ links.
Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.
Configure ETH LPT.
Configure the V-UNI group.
Select the tunnel where a PW is carried online.
The U2000 supports the following functions of configuring E-Aggr services on a per-NE
basis:
Configure the VLAN forwarding table items of an E-Aggr service.
Configure the service and the QoS of the corresponding PW when creating an E-Aggr
service.
Configure the V-UNI group.
Select the tunnel where a PW is carried online.
Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 supports the following functions of configuring E-LAN services on a per-NE
basis:
Create E-LAN services that are carried on port.
Create E-LAN services that are carried on PWs.
Create E-LAN services that are carried on QinQ links.
Configure the service and the QoS of the corresponding PW when creating an E-LAN
service.
Configure the V-UNI and NNI interfaces of an E-LAN service.
Configure the split horizon group of an E-LAN service.
Configure the V-UNI group.
Configure the MAC address learning parameters.
Configure the unknown frame processing mode.
Configure the static MAC address.
The U2000 provides the following functions of configuring Ethernet port OAM:
Configure OAM parameters.
Configure the OAM error frame monitoring.
Query the remote OAM parameters.
Tunnel Management
By using the U2000, you can perform the following operations:
Create static CR, RSVP, LDP, and IP tunnels.
Create RSVP and LDP tunnels in batches.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
9.8 VPN Service Management
The U2000 provides centralized and unified management, including service deployment,
service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS
service, and PWE3 service.
9.9 Tunnel Service Management
Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.
Device Management
Identify the software versions of devices and adapt to different types of devices automatically.
Entity Management
This function allows you to perform the following operations:
Automatically obtain the data about device entities, including frames, boards, power
supplies, fans, and ports.
Refresh entity data and monitor the entity status.
Clock Management
This function supports physical clock and PTP clock.
Interface Management
This function allows you to configure a variety of media interfaces, including:
Ethernet interfaces
POS interfaces
Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and
virtual template (VT) interfaces
LLDP Management
This function supports the configuration of LLDP globally or on interfaces.
NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:
Manage local users
Configure VTYs
Configure the Telnet and FTP service
Configure log services
Configure alarm services
Configure SSH services
Configure NAP services
QoS Management
The specific functions are as follows:
Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
Manage the configurations of interface QoS and system QoS.
Configure DS domain policies.
Manage the configurations of mirrored traffic and mirrored ports.
Manage the configurations of HQoS, including the discard policy, HQoS flow queue
policy, HQoS flow queue mapping, HQoS scheduler, and HQoS user scheduling.
Route Management
This function allows you to configure the static routes, routing information, routing policy,
public network and private network of BGP routes, IS-IS routes, and OSPF routes.
MPLS Management
This function supports NE-level MPLS management, including:
Enable MPLS-related protocols.
Configure MPLS TE tunnel.
Set MPLS interface parameters.
Configure static LSPs.
Configure MPLS OAM detection and protection groups.
ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.
BRAS Management
This function supports the broadband remote access service (BRAS) features of multi-service
gateways, including:
Address pool management
Authorization, authentication and accounting (AAA) management
Domain and Point-to-Point Protocol (PPP) management
Built-in Web server management
Layer-3 Internet Service Provider (ISP) configuration management
Portal server management
VLAN management
User management
This function also allows the system to collect the statistics on domains, IP address segments,
and IP addresses of the whole device in real time.
VPDN Management
This function allows you to configure the Layer-2 Tunneling Protocol (L2TP) on
multi-service gateways and manage L2TP tunnels.
BFD Management
The specific functions are as follows:
Configure BFD attributes.
Manage BFD sessions.
VRRP/VGMP Management
The specific functions are as follows:
Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring global VRRP attributes, interface attributes, and interface VR, and managing
VRRP alarms.
Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, managing VGMP members, and managing VGMP
alarms.
VPN Management
The specific functions are as follows:
Support tunnel policies.
Support PW templates.
Manage PWs.
Manage VSIs.
Manage VRFs.
MSE Management
This function enables routers to support MSE features, such as configuring MSE globally,
managing AAA, managing users, and configuring interface services.
Multicast Management
This function enables routers to support multicast features, such as configuring IGMP
Snooping, configuring SSM Mapping, managing multicast CAC, and configuring channel
group.
E-Trunk Management
This function supports E-Trunk search and discovery, configure E-Trunk and member of
E-Trunk.
ANCP Management
This function enables routers to support ANCP services, such as configuring global ANCP
information, configuring ANCP template, and configuring access management.
Device Management
This function identifies the software versions of devices and adapts to different types of
devices automatically.
Entity Management
This function allows you to perform the following operations:
Obtain the data about device entities, including frames, boards, power supplies, fans, and
ports automatically.
Refresh entity data and monitor the entity status.
LLDP Management
This function supports the configuration of LLDP globally or on ports.
Interface Management
This function allows you to configure a variety of media interfaces, including:
Ethernet interfaces
POS interfaces
Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and VT
interfaces
OAM Management
To realize the OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With
IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and
locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last
mile, and notify the related faults.
BFD is used to detect the communication fault between forwarding engines. To be
specific, BFD detects the connectivity of a data protocol on the same path between two
systems. The path can either be a physical link or a logical link.
The specific OAM management functions are as follows:
Manage global information.
Support IEEE 802.1ag-related functions, such as managing the configurations of the
MD, MA, local MEP, remote MEP, and MIP, and managing test diagnosis (including
loopback, link trace, MAC ping, and MAC trace).
Support IEEE 802.3ah-related functions, such as configuring protocols, querying
ports, and detecting loopback.
Configure BFD attributes, manage BFD sessions and BFD alarms, and perform BFD
in VRF, PW, and VSI services.
QoS Management
The specific functions are as follows:
Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
Manage the configurations of interface QoS and system QoS.
Configure DS domain policies.
Manage the configurations of mirrored traffic and mirrored ports.
Route Management
This function allows you to configure the public network, routing information, routing policy,
and private network of static routes, BGP routes, IS-IS routes, and OSPF routes.
MPLS Management
This function supports NE-level MPLS management, including:
Enable MPLS-related protocols.
Configure MPLS TE tunnel.
Configure MPLS interface parameters.
Configure static LSPs.
Configure MPLS OAM detection and protection groups.
ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.
BFD Management
The specific functions are as follows:
Configure BFD attributes.
Manage BFD sessions.
VRRP/VGMP Management
The specific functions are as follows:
Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring the global VRRP attributes, interface attributes, and interface VR, and
managing VRRP alarms.
Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, and managing VGMP members and VGMP alarms.
VPN Management
The specific functions are as follows:
Support tunnel policies.
Support PW templates.
Manage PWs.
Manage VSIs.
Manage VRFs.
EPON Management
This function supports PON interface management and ONU management.
NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:
Configure VTYs.
Configure FTP services.
Manage local users.
Configure log services.
Configure alarm services.
Configure SSH services.
Set SNMP parameters.
DLDP Management
This function supports the management on the DLDP working mode, packet authentication
mode, and statistics.
MSTP Management
This function supports the management on the MSTP domain, MSTP protection, and
statistics.
DHCP Management
This function supports the management on the DHCP server, DHCP relay, client address, and
DHCP statistics.
Mirroring Management
This function supports the management on the local/remote interface mirroring, VLAN
mirroring, MAC address mirroring, flow mirroring, CPU mirroring, and CPU buffer statistics.
PPPoE+ Management
This function supports the management on the PPPoE+ function.
Template Features
Template Management provides some default configuration templates. When you reference a
template, the attribute settings on the template automatically apply to the configured resource.
Main Templates
The main templtes are as follows:
ACL template
ACLs can be used to control the access of user packets that flow into ports. Configuring
ACLs in batches simplifies the configuration of the defense against attacks on the
network access side. When you configure the firewall on the network access side, you
need to configure ACL matching rules, such as the restriction on a MAC address and the
restriction on an IP address. If a rule needs to be applied to multiple interfaces on
different routers, configuring the rule at every point is time-consuming and increases the
costs of management and maintenance.
QoS template
The main applications of network QoS are as follows:
CBQoS template, and it can be applied to interfaces on NEs in batches.
DS domain template, and it can be applied to interfaces on NEs in batches.
HQoS template, and it can be applied to interfaces on NEs in batches.
PQ template, and it can be applied to interfaces on NEs in batches.
Interface CAR template, and it can be applied to interfaces on NEs in batches.
VPN service template
The service template is used to perform batch configurations for multiple devices when a
VPN service is created or configured. In this manner, the efficiency of service
deployment is greatly improved.
Switch EPON template
When you configure multiple ONU services, you can manage ONUs uniformly by
configuring templates to improve configuration efficiency.
The U2000 provides multiple running policies for test suites. You can run the test suite
associated with a certain running policy at a specified time daily, weekly, or monthly.
Network scanning
It collects network information through network synchronization and tests the
connectivity of partial types links on the network. The U2000 provides real-time
scanning and allows you to stop running scanning tasks. The U2000 also provides the
traceroute function for you to locate faults.
History data
The history data is the records of test suite operations. You can filter and query history
data according to conditions such as the test suite name, test result, or test time, and
export query results.
Diagnosis result analysis
It provides intelligent result analysis. You can manually customize the thresholds of test
case indicators such as delay, jitter, and packet loss ratio in the result analysis template
and the result analysis policy according to the related service level. In this manner, you
can quickly determine the network status.
Service Deployment
The U2000 provides a user-friendly service configuration GUI on which you can complete all
configuration operations. The parameters of multiple sets of equipment can be automatically
generated through related service templates. User configuration results can be previewed
through the topology before being delivered.
Customer management
The U2000 supports the operations of adding, deleting, and modifying customers, and
binding customers to VPN services.
L3VPN service management
Service Monitoring
The U2000 provides the visual topology display function for L3VPN, VPLS, and PWE3
services. The running status of the resources used by the current service, such as an
interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping
you to quickly locate faults.
You can quickly locate a faulty service based on the alarm generated by the related NE.
Service Diagnosis
The diagnosis tools are used to detect the connectivity of networks and locate faults.
Through the service diagnosis function, you can generate diagnosis tasks according to
the selected services and directly operate equipment nodes in topology views. The
diagnosis results can be directly displayed.
Tunnel Deployment
Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in
batches
Implement the planning of traffic on MPLS core networks by supporting the deployment
of end-to-end MPLS TE tunnel services
Facilitating the implementation of the MPLS access scheme by supporting the
deployment of static LSP services
Implementing the end-to-end MPLS OAM protection by supporting the configuration of
end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, and
monitoring of related alarms
Tunnel Monitoring
Supporting the networkwide tunnel view and displaying multiple types of tunnels, such
as static, RSVP, LDP, and IP tunnels, and their alarms in the topology view
Collecting and displaying the performance data of tunnels
Switching to the related tunnel from an alarm
Tunnel Diagnosis
The U2000 supports LSP ping and LSP tracert functions through which you can diagnose
deployed MPLS TE tunnels and static tunnel services.
Function without modifying or affecting the usage of local browsers such as IE and
Firefox.
the service topology view. Remote access services include L2TP service, L2TP over
IPSec service and IPSec (IKEv2) service three types.
Service monitoring
The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can
manage and monitor the online users of remote access services. It also provides the
functions of displaying the statuses of online users in real time, restricting the number of
online users, and forcing users to log out.
Display of the service topology
The remote access service management provides the function of visualizing the service
topology. In the topology view, you can view service alarms, service statuses, and
service-related device alarms.
Service audit
The remote access service management supports to audit the differences of service
configuration between the NMS and device.
Service resource management
The remote access service management provides the function of radius template
management and user domain management.
Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.
Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.
Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.
Layer 3 Management
By using the U2000, you can configure the DHCP relay and the ARP function and perform
MPLS management.
ACL&QoS
By using the U2000, you can manage ACLs, QoS, time segments, and HQoS.
GPON Management
By using the U2000, you can manage GPON optical ports, ONTs, GEM ports, TDM private
line services, and GPON profiles.
EPON Management
By using the U2000, you can manage EPON optical ports, ONTs, CESoP connections, TDM
private line services, and EPON profiles.
Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.
Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.
Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.
Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.
xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.
Sheet Pre-deployment
The U2000 provides the sheet pre-deployment solution. Therefore, you can bulk import
devices to the U2000 and implement the functions of software-commissioning-free and
remote acceptance. In addition, only one site visit is required and the plug and play (PnP)
feature is supported. These features greatly improve the deployment efficiency and reduce
network construction costs.
Remote Acceptance
In FTTx network construction, the U2000 supports remote acceptance of deployed ONUs to
implement one site visit and reduce operation and maintenance costs.
Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.
Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.
Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.
Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.
xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.
Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.
Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.
Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP and LACP.
Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.
xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, EFM SHDSL ports, and VDSL2 profiles and ports.
14 ONT Management
The U2000 supports the management of EPON terminals in the OAM mode and GPON
terminals in the OMCI mode. In this manner, the terminals are managed in a centralized
manner, which saves the maintenance workload.
To manage xPON terminals, the U2000 adopts two solutions, namely, SNMP+OMCI and
FTP+OMCI.
The objects managed by the ONT L2 protocol and protocols at lower layers provision
multicast IPTV and data services by using the SNMP+OMCI solution.
The VoIP services are provisioned through the FTP+OMCI solution. The N2000 BMS
generates a .xml configuration file and then uploads the file to the FTP server. The OLT
obtains the configuration file from the FTP server, loads it, and then sends it to the ONT
through the OMCI. Finally, the service configuration of the ONT is complete.
The U2000 supports the automatic batch upgrade of ONTs.
Supports the batch upgrade of ONTs.
Supports the scheduled task upgrade management.
Supports the upgrade of offline ONTs, that is, automatic upgrade when the ONT is
connected.
15 Reliability
15.2 HA System
The high availability (HA) system helps you improve the running reliability of the U2000
server.
The non-distributed U2000 server uses a 1+1 scheme. If the active site fails, the U2000 can be
switched to the standby site so that the U2000 application is not interrupted.
The U2000 supports distributed cluster. For better stability and risk resistance capability, the
distributed cluster uses a 1+1 scheme. If a slave server fails, the master server fails, the
database is faulty, IP addresses conflict, or the key process fails to be switched, you can
switch the distributed cluster to the standby distributed cluster without interrupting the U2000.
The protection mechanism of an HA system has two aspects:
Database synchronization and backup between the active and standby sites
Switching the application program between the active and standby sites
The U2000 provides the following HA schemes:
HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the
non-distributed system, featuring automatic switching.
HA system (Veritas distributed hot standby): Applicable to remote hot standby of the
distributed system on SUSE Linux OS, featuring automatic switching.
16 Performance Indicators
17 Management Capability
The management capability of the U2000 also depends on the hardware and varies with
the hardware configuration.
The system limits the number of physical nodes. Hence, the number of physical nodes is
a restriction for the management capability.
The management capability refers to the maximum number of equivalent NEs that can
be managed by the U2000 on certain hardware configuration conditions.
If a client also runs on the computer where the server is running, the management
capability is reduced by 50%. Hence, it is recommended that you run the client and
server on different computers.
Virtual NEs are not included in the management capability. A pre-configured NE is equal
to a real NE. One third-party NE is equal to one equivalent NE, and can only be
discovered instead of being managed. The equivalent coefficient of the OEM equipment
is calculated in the way similar to Huawei equipment.
Generally, the number of equivalent NEs that the U2000 can manage is calculated according
to the following rules:
Number of equivalent NEs = <Number of equivalent NEs in the transport domain> +
<Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the
access domain>
<Number of equivalent NEs in the transport domain> = (Number of transport NEs of
type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent
coefficient)
For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent
coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the
number of equivalent NEs in the transport domain as follows:
Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565
<Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x
Equivalent coefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)
For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),
and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs
in the IP domain as follows:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
<Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent
NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs +
Number of DSLAM equivalent NEs + Number of equivalent NEs of other access
equipment
Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of
MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)
Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ...
+ (Number of ports of type n x Equivalent coefficient)
Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type n x Equivalent coefficient)
Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type_n x Equivalent coefficient)
Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent
coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)
The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.
PC HP 2000 32 Yes
Server DL380G6-2P*2.0G-8G
HP 6000 64 Yes
DL580G5-4P*2.13G-16G
SUN 1500 32 No
V445-4P*1.6GHz-8G
SUN 800 24 No
V440-2P*1.6GHz-4G
SUN 600 16 No
V240-2P*1.5GHz-4G
SUN 600 16 No
V245-2P*1.5GHz-4G
HP ML350-2P*2.0G-4G 2000 64 No
HP ML110-1P*2.4G-2G 600 24 No
HP ML570-4P*2.0G-4G 2000 48 No
DELL 2000 48 No
R900-4P*2.13G-4G
DELL 2000 48 No
PE6800-4P*2.0G-4G
DELL 1500 32 No
PE2900-2P*2.0G-4G
DELL 600 24 No
PE840-1P*2.4G-2G
HP 6000 64 No
DL380G5-2P*2.0G-8G
HP 10000 100 No
DL580G5-4P*2.13G-16G
The management capability of the U2000 varies with OptiX NE equivalents, as shown in
Table 17-2.
The management capability of the U2000 varies with IP NE equivalents, as shown in Table
17-3.
USG9120 2
USG9210 3
USG9220 6
USG9310 4
USG9320 8
USG5000 series 0.75
USG3030 0.25
USG3040 0.25
USG2100 series 0.25
USG2200 series 0.25
USG50 0.25
SRG SRG1200 0.25
SRG20-10 0.25
SRG20-11 0.25
SRG20-12 0.25
SRG20-15 0.25
SRG20-20 0.25
SRG20-21 0.25
SRG20-30 0.25
SRG20-31 0.25
SRG20-31-D 0.25
SIG SIG9810 4
SIG9820 8
SIG9800 Server 0.25
SVN SVN3000 0.25
Broadband access MA5200E/F series 1.5
MA5200G series 10
ME60 series 10
Voice gateway VG1040/1041 series 0.25
WLAN AP AP 0.25
The management capability of the U2000 varies with access NE equivalents, as shown in
Table 17-4.
Metro WDM series OptiX Metro 6020 OptiX Metro 6020 compact
container CWDM system
V100R001
OptiX Metro 6040 OptiX Metro 6040 compact
container WDM system
V100R001
OptiX Metro 6040 V2 OptiX Metro 6040 compact
container DWDM system
V200R001 or higher
OptiX Metro 6100 OptiX Metro 6100 DWDM
multi-service transmission
system V100R002
OptiX Metro 6100V1 OptiX Metro 6100 DWDM
multi-service transmission
system V100R003
The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX
BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.
18 Standards Compliance
This topic describes the standards that the U2000 is compliant with.
The U2000 is developed according to the network management system model that the ITU-T
TMN series standards define. The information model is constructed based on the
object-oriented concept. Complying with multiple standards, the U2000 has good
expandability and reusability. The U2000 complies with the following international standards
and protocols:
RFC 793 Telnet/TCP/IP standards
RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards
RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC
2571, RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC
2580 SNMP V2 series standards
RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and
RFC 3418 SNMP V3 series standards
RFC 3164 Syslog standards
ISO 8824 and ISO 8825 ASN.1 standards
ITU-T standards for managing the telecommunications management network: M.3000,
M.3010, M.3020, M.3100, and M.3400 (without accounting)
HTTP and JAVA interface protocols and standards
W3C SOAP 1.1/WSDL
TL1 (Telcordia GR-811, GR-831, etc.)
The XML service delivery and inventory query are based on the MTOSI standards as
follows: TMF 517, TMF 608, and TMF 854
CORBA 2.5 protocol
ISO 8824 and ISO 8825 ASN.1 standards
The CORBA alarm northbound interface complies with the MTNM standards as
follows: TMF 513, TMF 608, and TMF 814
Table 18-1 lists the details of the standards and protocols.
Standards
and
Protocols Description
RFC 793 Transmission Control Protocol (Darpa Internet Program Protocol
Specification)
RFC 1155 Structure and Identification of Management Information for TCP/IP-based
Internets
RFC 1212 Concise MIB Definitions
RFC 1213 Management Information Base for Network Management of TCP/IP-based
Internets: MIB-II
RFC 1215 A Convention for Defining Traps for use with the SNMP
RFC 1905 Protocol Operations for Version 2 of the Simple Network Management
Protocol
RFC 1906 Transport Mappings for Version 2 of the Simple Network Management
Protocol
RFC 1907 Management Information Base for Version 2 of the Simple Network
Management Protocol
RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard
Network Management Framework
RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using
SMIv2
RFC 2012 SNMPv2 Management Information Base for the Transmission Control
Protocol using SMIv2
RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol
using SMIv2
RFC 2571 An Architecture for Describing SNMP Management Frameworks
RFC 2572 Message Processing and Dispatching for the Simple Network Management
Protocol
RFC 2573 SNMP Applications
RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network
Management Protocol
RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the
Internet-standard Network Management Framework
RFC 2578 Structure of Management Information Version 2 (SMIv2)
RFC 2579 Textual Conventions for SMIv2
RFC 2580 Conformance Statements for SMIv2
RFC 3411 An Architecture for Describing Simple Network Management Protocol
(SNMP) Management Frameworks
Standards
and
Protocols Description
RFC 3412 Message Processing and Dispatching for the Simple Network Management
Protocol (SNMP)
RFC 3413 Simple Network Management Protocol (SNMP) Applications
RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network
Management Protocol (SNMPv3)
RFC 3415 View-based Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)
RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management
Protocol (SNMP)
RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)
RFC 3418 Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP)
RFC 3164 BSD syslog Protocol
ISO Information Technology - Abstract Syntax Notation One (ASN.1):
8824-4-200 Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semantic
0 model
ISO Information Technology - ASN.1 Encoding Rules: Specification of Packed
8825-2-199 Encoding Rules (PER) Second Edition; Technical Corrigendum 1:
8 12/15/1999; Amendment 1: 12/01/2000
ITU-T Overview of TMN recommendations
M.3000
ITU-T Principles for a telecommunications management network
M.3010
ITU-T Considerations for a telecommunications management network
M.3013
ITU-T Framework for the integrated management of hybrid circuit/packet networks
M.3017
ITU-T TMN interface specification methodology
M.3020
ITU-T Generic network information model
M.3100
ITU-T Managed Object Conformance statements for the generic network
M.3101 information model
ITU-T Catalogue of TMN management information
M.3180
ITU-T TMN management services and telecommunications managed areas:
M.3200 overview
Standards
and
Protocols Description
ITU-T TMN F interface requirements
M.3300
ITU-T TMN management functions
M.3400
ITU-T Management information model
X.720
ITU-T Definition of management information
X.721
ITU-T Guidelines for the definition of managed objects
X.722
ITU-T Information technology - Open Systems Interconnection - Systems
X.733 Management: alarm reporting function
ITU-T Information technology - Open distributed processing - Reference Model:
X.903 architecture
ITU-T Network node interface for the synchronous digital hierarchy (SDH)
G.707
ITU-T Protocol suites for Q-interfaces for management of transmission systems
G.773
ITU-T Synchronous digital hierarchy (SDH) - Management information model for
G.774 (01, the network element view
02, 03, 04)
ITU-T Characteristics of synchronous digital hierarchy (SDH) equipment
G.783 functional blocks
ITU-T Synchronous digital hierarchy (SDH) management
G.784
ITU-T Architecture of transport networks based on the synchronous digital
G.803 hierarchy (SDH)
ITU-T Management capabilities of transport networks based on the synchronous
G.831 digital hierarchy (SDH)
ITU-T Management of the transport network - Application of the RM-ODP
G.851.1 framework
ITU-T Enterprise viewpoint for simple subnetwork connection management
G.852.1
ITU-T Enterprise viewpoint description of transport network resource model
G.852.2
ITU-T Enterprise viewpoint for topology management
G.852.3
Standards
and
Protocols Description
ITU-T Enterprise viewpoint for trail management
G.852.6
ITU-T Common elements of the information viewpoint for the management of a
G.853.1 transport network
ITU-T Subnetwork connection management information viewpoint
G.853.2
ITU-T Information viewpoint for topology management
G.853.3
ITU-T Information viewpoint for trail management
G.853.6
ITU-T Computational interfaces for basic transport network model
G.854.1
ITU-T Computational viewpoint for topology management
G.854.3
ITU-T Computational viewpoint for trail management
G.854.6
Rational Rational Unified Process
Unified
Process 5.5
Sif99025 EML-NML interface models
TMF513 Multi-Technology Network Management Business Agreement NML-EML
V2.0 Interface Version 2.0
TMF608 Multi-Technology Network Management Information Agreement
V2.0 NML-EML Interface Version 2.0
TMF814 Multi Technology Network Management Solution Set Conformance
V2.0 Document Version 2.0
TMF814 Multi Technology Network Management Solution Set Conformance
V2.0 Document Version 2.0
A Glossary
A
Abnormal Resource When the NMS carries out the operation of device resource polling
on the device management module or the module is refreshed
manually, the physical resources of some devices, such as the card,
sub-card and port, cannot be accessed because they have been
deleted or have some faults. So, after the NMS carries out the
operation of device resource polling on the device management
module or the module is refreshed manually again, the result of
polling the physical resources differ from the first time. The
physical resources that cannot be polled in the second time are
called the abnormal resource.
AIS insertion If there are excessive errors in a channel, AIS can be inserted in this
channel to indicate it is unavailable. For a line board, you can set
whether to insert AIS when there are excessive errors in the B1, B2
and B3 bytes. For a tributary board at the E1 or T1 level, you can
set whether to insert AIS when there are excessive errors in BIP-2.
For a tributary board at the E3 level or higher, you can set whether
to insert AIS when there are excessive errors in the B3 byte.
AIS Alarm Indication Signal. A signal sent downstream in a digital
network if an upstream failure has been detected and persists for a
certain time.
Alarm correlation In the case alarm2 is raised within five seconds after alarm1 is
analysis raised, and alarm2 complies with the conditions defined in the
alarm correlation analysis rule, you can either suppress the alarm2
or raise its severity level according to the behavior defined in the
alarm correlation rule. Such a process is called alarm correlation
analysis.
Alarm Level Alarm level is to identify the severity of an alarm or event. It is
divided up into four levels: critical, major, minor, warning alarm.
Alarm Status Device reports the trap information to NMS. NMS displays the
received information on the alarm start on the topological view.
The alarm state contains four types: urgent alarm, important alarm,
subordinate alarm and prompt alarm.
Auto Discovery NMS tests the remote device by using PING or the SNMP
parameter module configured in advanced to discover the IP device
or the device that supports SNMP and to add the discovered devices
automatically.
Alarm reversion For the port that has already been configured but not actually loaded
with services, this function can be used to avoid generating relevant
alarm information, thus preventing alarm interference.
Alarm severity According to ITU-T recommendations, the alarm is classified into
four severities: Critical, Major, Minor, and Warning.
Alarm suppression The suppressed alarm of a specific object is not reported. The object
here may be the networkwide equipment, a specific NE, a specific
board and even a specific function module of a specific board.
Alarm A visible or an audible indication to notify the person concerned
that a failure or an emergency has occurred. See also Event.
ATM protection An ATM protection group refers to the logically bound ATM VP
group network or subnetwork connections that share the same physical
transmission channel. In the VP group (VPG), a pair of VP
connections (working connection and its protection connection) is
used for monitoring the automatic protection switching, called
monitoring connections (APS VPCs). If the monitoring connections
switch over, the whole VPG will switch over to quicken the ATM
protection switching (as quick as the protection switching of the
SDH layer.
ALS Automatic Laser Shutdown. ALS is turned on when the optical
interface board does not carry services or the optical fibre is faulty.
Its service life can be prolonged by decreasing the duration during
which laser is on.
Attribute Property of an object.
Automatic switching When the active board or path fails, the standby one can
automatically take over the job of the active one.
B
Band Width In the data communication area, bandwidth specifies the maximum
value of the rate when the data passes through some data channel.
Baseline Select the test result when the line is in good condition as the line
test baseline, to provide a basis of comparison and analysis for the
following line test result.
Baseline collection One of the test types for submarine line. In the case of deployment
test or fault restoration, or when updating the baseline is required, you
need to collect the baseline, to provide reference for comparison
tests, and alerts or alarms.
Binding In virtual concatenated payload configuration, designating one
binding number to identify the VC4s of the same virtual
concatenated payload is called "bind". If a fault occurs to one of the
bound services, all bound services will switch as a whole.
Bit error alarm When the bit error reaches a specific limit, the equipment will
threshold report an alarm. This limit is the bit error alarm threshold. The
threshold can be divided into crossing threshold and defect
threshold.
C
Comparison test in One of the test types for submarine line. Carry out polling tests for
periodic mode multiple lines on the same LMU board periodically, compare the
test result with the baseline data in in-service mode, and provide
alerts or alarms for the line.
Comparison test in One of the test types for submarine line. Test a line by using test
single-test mode parameters of the baseline collection test in in-service mode,
compare the test result with the baseline data, and provide alerts or
alarms for the line.
Check alarms The check feature compares one (or more) uncleared alarm on the
NMS with that on the NE. If an alarm is included in the current
alarms on the NE, it is kept on the NMS. If not, it will be removed
from the NMS.
Client A kind of terminal (PC or workstation) connected to a network that
can send instructions to a server and get results through a user
interface. See also server.
Clock View The Clock View provides a visible platform to enable:1. NE clock
settings2. Networkwide clock synchronisation status query3. Clock
tracing and search functions
Configuration data The data that configures the NE hardware for coordination between
this NE and other NEs in the entire network and operation of
specified services. Configuration data is the instruction file of NEs,
and it is the key for efficient network running. The typical
configuration data includes board configuration, clock configuration
and protection relationship.
Configuration Configuration management enables inventory query of network
management configuration resources, including relevant configuration of NMS
or SNMS, NE, subnet, links, SNC, route, TP, edge point,
equipment, and so on. Real-time inventory change report can also
be provided through this resource, it will be timely reported to the
upper NMS to notify the carrier of the current network operation
status and ensure data consistency of the upper NMS or SNMS.
Configure To set the basic parameters of an operation object.
Connection point A reference point where the output of a trail termination source or a
connection is bound to the input of another connection, or where the
output of a connection is bound to the input of a trail termination
sink or another connection. The connection point is characterized by
the information which passes across it. A bidirectional connection
point is formed by the association of a contradirectional pair.
D
DCC Within an STM-N signal there are two DCC channels, one is the
192 kbit/s DCC-R channel composed of bytes D1-D3, and the other
is the 576 kbit/s DCC- channel composed of bytes D4-D12. All
NEs can communicate with one another through the DCC-R. The
DCC-M is not the regenerator section overhead and does not
support communications among regenerators, and it is used to
support communication channels of more universal purpose.
DNI Dual Node Interconnection. The protection mode defined in G. 842
Recommendation for the inter-ring service . By using the
recommended protection modes, the protection of the
interconnecting service between two ring networks composed of the
devices from different manufacturers and in different protection
modes can be realised. Moreover, in case of fibre failure or node
failure, services can also be protected.
Domain The domain of the NMS specifies the scope of address or functions
which are available to a certain user.
Dump Dump is a process of exporting alarm data from the database to the
customized file and meanwhile the exported data is cleared in the
database.
F
Failure The fault cause persisted long enough to consider the ability of an
item to perform a required function to be terminated. The item may
be considered as failed; a fault has now been detected.
Fault A fault is the inability of a function to perform a required action.
This does not include an inability due to preventive maintenance,
lack of external resources, or planned actions.
Filter The filter is used to filter the matched logs and have the unmatched
one left.
Forced switch This command performs the ring switch from working channels to
the protection channels. This switch occurs regardless of the state of
the protection channels, unless the protection channels are
satisfying a higher priority bridge request.
H
History alarms Alarms that have cleared and been acknowledged.
History performance The performance data stored in the history register and the
data auto-report performance data stored on the NMS are called history
performance data in a unified way.
I
Intermediate office It refers to the equipment used for optical fibre management and
dispatch in the metropolitan area. It has multiple pairs of interfaces
for the optical fibre connection. Every two interfaces in a pair are
connected with each other to form a longer physical optical fibre
path. The physical optical fibre path connecting the transmission
equipment can comprise two or more sections of optical fibre
cascaded via the intermediate office. There is an intermediate office
information list for some fibre & cable connections, which shows
the section information about the fibre & cable.
In-Service Mode One of the test modes for submarine line. By using the in-service
test mode , you can test submarine cables and repeaters without
damaging the existing services of the submarine system.
Image (OS) Binary file, equivalent to the OS of the device and a part of the
device version.
IP address In the TCP/IP protocol, it is used to uniquely identify the address of
the communication port, which consists of four bytes in decimal
digits, for example, 129.9.161.55.
J
Jitter This index shows the delay stability of many Ping operations with
the unit of ms.
L
Label A mark on a cable, a subrack, or a cabinet for identification.
Layer A concept used to allow the transport network functionality to be
described hierarchically as successive levels; each layer being
solely concerned with the generation and transfer of its
characteristic information.
LCT Local Craft Terminal. The LCT provides the user with single-layer
management network solutions to the transmission network of up to
five NEs to realise integrated management of multi-service
transmission network. Usually it uses the cross-over cable or serial
port cable to connect one NE, so as to configure and maintain a
single NE. See also U2000 LCT.
Licence A permission provided by a vendor to authorise the use of specific
functions of a product. Usually the licence consists of encrypted
codes, and the operation authority varies with different level of
licence.
Link The link is responsible to transmit the data from one station to next
neighbour station correctly.
Lock NE login This function prohibits the users at lower levels from logging in NE
and forces logged NE users with lower level to log out.
M
Main Topology The default NMS client interface and all topology management
functions are accessed here.
Management The signal passing across an access point.
information
Manual switch When the protection channel is efficient and there is no higher-level
switching request, this mode switches the service from the working
channel to the protection channel, thus testing whether network still
has the protection capability.
Manual test One of the test types for submarine line. You need to set test
parameters manually, start the test, and save the test result as the
baseline of the in-service mode.
MO Managed Object. The management view of a resource within the
telecommunication environment that may be managed via the agent.
Examples of SDH managed objects are: equipment, receive port,
transmit port, power supply, plug-in card, virtual container,
multiplex section, and regenerator section.
MS Multiplex Section. A multiplex section is the trail between and
including two multiplex section trail termination functions.
MSP Multiplex section protection. The nodes online achieve protection
switching through the K1 and K2 bytes in the multiplex section,
including linear 1+1 MS protection switching link, linear 1:n MS
protection switching link, dedicated MS protection ring and shared
MS protection ring.
N
NE database There are three types of database on NE SCC board as following:
(1) DRDB: a dynamic database in a dynamic RAM, powered by
battery; (2) SDB: a static database in a power-down RAM; (3)
FDB0, FDB0: permanently saved databases in a Flash ROM. In
efficient operation, the NE configuration data is saved in DRDB
and SDB at the same time. Backing up an NE database means
backing up the NE configuration data from SDB to FDB0 and
FDB1.
NE Explorer NE Explorer is the main operation interface of the NMS. For easy
navigation, the NE Explorer window presents an expandable
directory tree (Function Tree) in the lower left pane. The
configuration, management and maintenance of the equipment are
accessed here.
NE Network Element. NE includes the hardware unit and the software
running on it. Usually, one NE has at least an SCC (system control
and communication) board which responsible for the management
and monitoring of the NE. The NE software runs on the SCC board.
NM Network Management. In the telecommunication management
network structure, the NMS is located between the NE level and
network level, which can supports all functions at NE level and part
of the network level management functions. See also U2000.
NNI Network Node Interface. NNI identifies the interface between the
ATM network nodes. See also SDH NNI.
Node Node is one of the topology objects and the minimum unit that
represents the device displayed on the topological view. The device
is displayed with the node icon on the topological view. The type of
the node includes the router, the switch and the 3rd-party device and
the virtual node.
O
Online help An indexed collection of information on all aspects of the NMS.
They can be accessed at any time from the Help menu or by
pressing the F1 key.
Optical time domain OTDR is an optical fault locator and analysis tool for optical fiber
reflectormeter networks. The OTDR features a light, compact, hand-held design
with an intelligent user interface that is easy and quick to use. The
color LCD display and backlight design makes testing work more
comfortable and convenient, whether during daylight or at night.
Out-of-Service One of the test modes for submarine line. By transmitting detection
Mode light with high power, the out-of-service test can detect the fiber
status and repeater status, to realize the status detection and fault
point location after fiber cut. In general, when detecting that a line
is abnormal during a test in in-service mode, you can carry out a test
in out-of-service mode to locate the fault.
OWSP Optical Wavelength Shared Protection. OWSP is a bidirectional
ring, where each node is equipped with an OWSP. There are two
channels (1 and 2) in the main optical path on the internal and
external rings in each span on a ring. The fibre and the OWSP on
the main optical path are connected with the optical ports inputting
1 and 2 on the mux/demux board (unnecessary to be connected
with the OTU), and thus 1 and 2 can be added and dropped at
every node.
P
Path protection The working principle of path protection: When the system works
in path protection mode, the PDH path uses the dual-fed and signal
selection mode. Through the tributary unit and cross-connect unit,
the tributary signal is sent simultaneously to the east and west lines.
Meanwhile, the cross-connect matrix sends the signal dually sent
from the opposite end to the tributary board through the active and
standby buses, and the hardware of the tributary board will
selectively receive the signal from the two groups of buses
automatically according to the AIS number of the lower order path.
Path A trail in a path layer.
Performance register Performance register is the memory space for performance event
counts, including 15-min current performance register, 24-hour
current performance register, 15-min history performance register,
24-hour history performance register, UAT register and CSES
register.
Performance Performance events usually have upper and lower thresholds. When
threshold the performance event count value exceeds the upper threshold, a
performance threshold-crossing event is generated; when the
performance event count value is below the upper threshold for a
period of time, the performance threshold-crossing event is ended.
In this way, performance jitter caused by some sudden events can
be shielded.
R
ROADM Reconfiguration Optical Add/Drop Multiplexing. ROADM helps
you to terminate or pass through any one wavelength at every node
without affecting the existing services. At the same time, ROADM
can change wavelengths through the NMS remotely, to adjust
wavelengths added or dropped in a quick and convenient manner. In
addition, ROADM enables power equalization at path level through
a built-in power equalization function, and thus adjusts power for
pass-through paths in a better way than a band-based dynamic gain
equalizer (DGE) does.
Route The IP route selection is in table driving mode. In each host and
each router of the Internet, there is a routing table that contains
information about how the service is transmitted from the source to
the sink, providing a basis for route selection. Ethernet static
routing in ET1 refers to the mapping relationship between the
Ethernet port and the bound path. Its routing type includes port
routing and VLAN routing. Port routing: It means configuring a
route between the Ethernet port and the bound path port, which is
usually used for point-to-point networking communication; VLAN
routing: It means configuring a route between the Ethernet port and
the bound path port based on the VLAN service. It can be used
flexibly in point-to-point, point-to-multipoint or
multipoint-to-multipoint communication. The implementation is to
divide and converge the data stream according to the VLAN flag of
the packet. As a VLAN flag can be added to the Ethernet port, the
equipment can be applied more flexibly.
Report The report that is generated manually in a real-time fashion.
RTT RTT is the round trip time, which is the time delay of the ping task.
S
Script file It is the text file describing the physical information and
configuration information of the entire network, including the NE
configuration file, port naming file, end-to-end configuration file,
NE physical view script file, NM information file and service
implementation data script file.
Schedule Task The report on schedule task that is generated at a interval along with
the periodical running of the schedule tasks.
Script A list of instructions for performing a specific task or action,
written in a scripting language.
SDH NNI SDH Network Node Interface. It is applied to build
communications connection with the equipment beyond the NMS
management area. Usually, the NM creates an SDH NNI by
creating a logical system on the port of an idle line board, and the
NE must be a TM without protection and fibre connection.
Section A trail in a section layer.
Settings Parameters of an operation that can be selected by the user.
Severity See Alarm Severity.
Subnet mask Also referred to as the network mask off code, it is used to define
network segments, so that only the computers in the same network
segment can communicate with one another, thus suppressing
broadcast storm between different network segments.
Subnet number Subnetwork number is used to differentiate the different network
sections in the sub-network conference. Actually it is the first
several digits (one or two) of the user phone number. An orderwire
phone number is composed of the sub-network number and the user
number.
T
TDA clock source TDA is short for Tone Data Access. For the 2500+ NE equipment,
it can be installed with the external TDA board for which the clock
source must be set so that the TDA board can switch according to
the set clock source sequence when clock source switching occurs.
TMN Telecommunications Management Network. The entity which
provides the means used to transport and process information
related to management functions for the telecommunications
network.
Topology The NMS topology is a basic component of the man-machine
interactive interface. The topology clearly shows the structure of the
network, the alarms of different NEs, sub-networks in the network,
the communication status as well as the basic network operation
status.
Trail management A network level management function of the NMS. Through trail
function management, you can configure end-to-end services, view graphic
interface and visual routes of a trail, query detailed information of a
trail, filter, search and locate a trail quickly, manage and maintain
trails in a centralised manner, manage alarms and performance data
by trail, and print a trail report.
Trail A trail is a kind of transport entity, mainly engaged in transferring
signal from the input of the trail source to the output of the trail
sink, and monitoring the integrality of the transferred signal.
According to the different levels of the trail, the trail includes
various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail,
VC4, VC3 and VC12). Among them, OTS, OCH and OMS
represent the trails in a DWDM layer network. For the ADM and
TM equipment in the SDH network, each optical fibre connection
corresponds to an SPI, RS or MS trail, and a trail is the general
name for service carriers, including SDH and PDH services.
Tributary loopback A fault can be located for each service path by performing loopback
to each path of the tributary board. There are three kinds of
loopback modes: No loopback, Outloop and Inloop.
Threshold The alarm range will be defined after the performance data is
collected. The threshold contains the upper and lower one, related
with the unit and index.
U
U2000 To be oriented to the future network trend, the iManager U2000 that
is the unifed network management system (NMS) combines all-IP
and FMC, and manages carrier equipment and access equipment in
a centralized manner.
UAT Unavailable Time. A UAT event is reported when the monitored
object generates 10 consecutive severely errored seconds (SES) and
the SESs begin to be included in the unavailable time. The event
will end when the bit error ratio per second is better than 10-3
within 10 consecutive seconds.
UNI UNI is the abbreviation for User Network Interface. It identifies the
interface between the user and the ATM network node.
Unprotected Services transmitted through an ordinary way, once a failure or
interruption occurs, the data cannot be restored for lack of
protection mechanism.
Upload Report all or part of the configuration data of the NE to the NM and
overwrite the configuration data saved in the NE layer on the NM
side.
User group User set refers to the set of NMS users with the same management
authorities. The default user group includes: system administrator,
system maintainer, system operator and system supervisor. The
attributes of user set include name and detailed description.
User The user of the NMS client, and the user and his/her password
define the corresponding authority of operation and management of
the NMS.
V
VC4 loopback The fault of each VC4 path on the optical fibre can be located by
setting loopback for each VC4 path of the line. There are three
kinds of loopback modes: No loopback, Outloop, Inloop.
VC4 server trail The path rate of the VC4 server trail is 150.336Mbit/s. The VC4
server trail provides transparent channels (that is, circuit group) for
circuit-layer network nodes (for example, a switch) in a path-layer
network, and acts as the basic unit of inter-office communication
path. When the VC4 server trail is configured, only the higher order
cross-connection of VC4 is generated in the intermediate NE, but
no cross-connection is generated at the two ends, that is, no service
is added/dropped. Therefore, the VC4 server trail is not a traditional
service. It is only the basis for VC3 and VC12 trail creation.
VCI The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in
both NNI cell or UNI cell. It indicates the virtual channel in the
path. The VPI and VCI together indicate a virtual connection.
View Organize and display rules and filter conditions of the topology
data. Customize the view according to requirements of every
product and organize the data in the view displayed by the topology
module, such as the layer 2 view, VPN view and IP view. By
default, the platform provides the physical view. The topology view
can be planned according to the domain, maintenance relationship
and so on.
Edits and displays the rule of the topology data or the filter
conditions. It can be tailored according to the requirements
Virtual fibre A virtual fibre is created between SDH equipment that has WDM
equipment in between. From SDH equipment perspective, creation
of virtual fibres disassociates its fibre connection with WDM
equipment and prevents impact on the auto fibre search function,
ensuring independence of SDH trail management.From WDM
equipment perspective, its service bearer layer is a virtual fibre
instead of a true one after the virtual fibre is created. Deletion of the
true fibre does not affect trail management.
Virtual NE Like a common NE, a virtual NE is also displayed with an icon on a
view, but it is only an NE simulated according to the practical
situation, which does not represents an actual NE. Therefore, the
actual status of this NE cannot be queried and its alarm status
cannot be displayed with colours. Usually, when the trail
management function is used for the NEs or sub-networks the NMS
cannot manage, or the equipment is interconnected with other
vendors' NEs for service configuration, the end-to-end service
configuration method and the trail management capability are
provided.
VLAN ID Namely, it is the virtual LAN identifier. One Ethernet port can
support 4K VLAN routes, and one NE can support up to 8K VLAN
routes.
VPI The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the
NNI cell, and 8 bits in the UNI cell.
W
Wavelength The wavelength protection group is important to describe the
protection group wavelength protection structure. Its function is similar to that of the
protection sub-network in the SDH NE. The wavelength path
protection can only work with the correct configuration of the
wavelength protection group.
WDM service The WDM service is accessed at the client side of the OTU board
that can access SAN services.
Web LCT In the TMN architecture, the Web LCT is located in the NE
management level, which can manage the RTN series and NG
WDM series equipment.
Working path A specific path that is part of a protection group and is labelled
working.
WTR time A period of time that must elapse before a - from a fault recovered -
trail/connection can be used again to transport the normal traffic
signal and/or to select the normal traffic signal from.
WTR Wait to Restore. This command is issued when working channels
meet the restoral threshold after an SD or SF condition. It is used to
maintain the state during the WTR period unless it is pre-empted by
a higher priority bridge request.
WXCP Wavelength Cross-Connection Protection. It is a path protection
type for ring networks. In this protection mode, services are
switched between the primacy and secondary rings through
cross-connection based on the dual fed signal selection principle.
A
AAA Authorization, Authentication and Accounting
ACE Adaptive Communication Environment
ACL Access Control List
AIS Alarm Indication Signal
ALC Automatic Level Control
APE Automatic Power Equilibrium
ARP Address Resolution Protocol
ASN.1 Abstract Syntax Notation One
ASON Automatically Switched Optical Network
ATM Asynchronous Transfer Mode
B
BFD Bidirectional Forwarding Detection
BGP Border Gateway Protocol
BML Business Management Layer
BRAS Broadband Remote Access Server
C
CAR Committed Access Rate
CC Continuity Check
CORBA Common Object Request Broker Architecture
CLI Command Line Interface
CoS Class of Service
D
DC Data Center
DCC Data Communications Channel
DCN Data Communication Network
DDN Digital Data Network
DHCP Dynamic Host Configuration Protocol
DNI Dual Node Interconnection
DNS Domain Name System
DPPS Dual Path Protection Switching
DWC Dynamic Wavelength Control
DMS Datacom network Management System
DWDM Dense Wavelength Division Multiplexing
E
ECC Embedded Control Channel
EML Element management Layer
EMS Element Management System
EPL Ethernet Private Line
EPLAN Ethernet Private LAN
ESCON Enterprise System Connection
EVPL Ethernet Virtual Private Line
F
FCAPS Fault Management, Configuration Management, Accounting
Management, Performance Management, Security Management
FTP File Transfer Protocol
G
GNE Gate Network Element
GUI Graphical User Interface
H
HA High-Availability
HGMP HUAWEI Group Management Protocol
HQoS Hierarchical QoS
HSI High Speed Internet
HTML Hyper Text Markup Language
HTTP Hyper-Text Transmission Protocol
I
ID IDentification
IEEE Institute of Electrical and Electronics Engineers
IF Intermediate Frequency
IGMP Internet Group Management Protocol
IMA Inverse Multiplexing for ATM
iMAP Integrated Management Application Platform
ION Intelligent Optical Network
IP Internet Protocol
IPA Intelligent Power Adjustment
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISP Internet Service Provider
ITU-T International Telecommunication Union- Telecommunication
Standardization Sector
L
LAN Local Area Network
LCAS Link Capacity Adjustment Scheme
LCD Liquid Crystal Display
LCT Local Craft Terminal
LLID Locate Loopback ID
LPT Link-state Pass Through
L2TP Layer 2 Tunneling Protocol
M
MA Maintenance Association
MAC Media Access Control
MCA Multi-channel Spectrum Analyzer Unit
MEP Maintenance association End Point
MD Maintenance Domain
MDI Multi-Document Interface
MDP Message Dispatch Process
Mgr Manager
MIB Management Information Base
MIP Maintenance association Intermediate Point
MIT Managed Object Instance Tree
MML Man Machine Language
MO Managed Object
MPLS Multiprotocol Label Switching
MS Multiplex Section
MSP Multiplex Section Protection
MSTP Multi-Service Transmission Platform
MTBF Mean Time Between Failures
MTTR Mean Time to Repair
NBI Northbound Interface
N
NE Network Element
NEL Network Element Level
NML Network Management Layer
NMS Network Management System
NSAP System Network Service Access Point
P
PC Personal Computer
PSTN Public Switched Telephone Network
PDH Plesiochronous Digital Hierarchy
PP Path Protection
PPP Point-to-Point Protocol
PRBS Pseudo-Random Binary Sequence
PSTN Public Switched Telephone Network
Q
QoS Quality of Service
R
RAID Redundant Array of Inexpensive Disk
RAS Reliability, Availability, Survivability
RDBMS Relational Database Management System
RPR Resilient Packet Ring
RMON Remote Monitoring
ROADM Reconfiguration Optical Add/drop Multiplexer
RPT Repeater
RS Regenerator Section
RSVP Resource Reservation Protocol
RTN Radio Transmission Node
RUP Rational Unified Process
S
SDH Synchronous Digital Hierarchy
SLM Submarine Line Monitor
SLTE Submarine Line Terminal Equipment
SML Service Management Layer
SMS Service Management System
SNCMP Sub-Network Connection Multiple Protection
SNCP Sub-Network Connection Protection
SNCTP Sub-Network Connection Tunnel Protection
SNML Sub-Network Management Layer
SNMS Subnetwork Management System
SONET Synchronous Optical Network
SSL Security Socket Layer
SAP Service Access Point
SNMP Simple Network Management Protocol
STP Spanning Tree Protocol
T
TCM Tandem Connection Measurement
TCP/IP Transmission Control Protocol / Internet Protocol
TDA Tone & Data Access Unit
TFTP Trivial File Transfer Protocol
TM Terminal Multiplexer
TMF TeleManagement Forum
TMN Telecommunication Management Network
TPS Tributary Protection Switching
U
UML Unified Modeling Language
UPS Uninterrupted Power Supply
V
VB Virtual Bridge
VCI Virtual Channel Identifier
VCS Veritas Cluster Server
VOA Variable Optical Attenuator
VPI Virtual Path Identifier
VLAN Virtual Local Area Network
VPN Virtual Private Network
VGMP VRRP Group Management Protocol
VRRP Virtual Router Redundancy Protocol
VVR Veritas Volume Replication
VVR VERITAS Volume Replicator
VxVM Veritas Volume Manager
W
WDM Wavelength Division Multiplexing
WSF Work Station Function
WTR Wait-to-Restore
WXCP Wavelength Cross-Connection Protection