00430200-Configuration Guide (V100R001 - 02)
00430200-Configuration Guide (V100R001 - 02)
00430200-Configuration Guide (V100R001 - 02)
Transmission System
V100R001
Configuration Guide
Issue 02
Date 2008-10-10
Part Number 00430200
Website: http://www.huawei.com
Email: [email protected]
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
6 Configuring LPT.........................................................................................................................6-1
6.1 Overview.........................................................................................................................................................6-2
6.2 Application......................................................................................................................................................6-2
6.3 Configuring the Point-to-Point LPT Function................................................................................................6-4
7 Configuring LCAS.....................................................................................................................7-1
7.1 Overview.........................................................................................................................................................7-2
7.2 Application......................................................................................................................................................7-2
7.3 Enabling LCAS...............................................................................................................................................7-4
A Glossary.....................................................................................................................................A-1
B Acronyms and Abbreviations.................................................................................................B-1
Index.................................................................................................................................................i-1
Figures
Tables
Purpose
This document describes how to configure various services for the OptiX OSN 500, including
the overview, engineering requirements, engineering planning, and the configuration process.
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document is intended for:
Organization
This document is organized as follows.
Topic Description
1 Starting the T2000 Describes the basic operations to quickly start of the T2000.
Topic Description
6 Configuring LPT Describes how to configure the LPT features on the T2000.
B Acronyms and Lists the acronyms and abbreviations used in this document.
Abbreviations
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving
the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a certain position.
Update History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
The following pages introduce certain preparation operations that ensure a smooth, trouble-free
launch of the T2000.
Context
l To start the computer and the T2000 application, do as follows:
1. Start the computer.
2. Start the T2000 server.
3. Start the T2000 client.
l To shut down the T2000 application and the computer, do as follows:
1. Exit the T2000 client.
2. Stop the T2000 server.
3. Shut down the computer.
1.1.1 Starting the Computer
To prevent damage to the computer or data loss, refer to the procedure provided to start the
computer. The startup procedures of the workstation are different from the startup procedures
of a normal PC. Follow the procedure correctly to perform the required operations.
1.1.2 Starting the T2000 Server
After starting the computer, you need to start the T2000 server. Then, you can log in to the
T2000 to manage the network.
1.1.3 Viewing the T2000 Process Status
When you fail to log in to the T2000 client or abnormally exit the T2000 client, you can use the
System Monitor to view the T2000 process status to decide whether the server is faulty.
1.1.4 Logging in to the T2000 Client
You can manage the network in the graphic user interface (GUI) only after logging in to the
T2000 client.
1.1.5 Exiting a T2000 Client
Before restarting the T2000 client or shutting down the T2000 server, you must exit the
T2000 client.
1.1.6 Shutting Down the T2000 Server
When the T2000 server is managing the system normally, do not perform this operation. In
special circumstances, for example, when modifying the system time of the computer where the
T2000 resides, or when upgrading the version, you can use the System Monitor Client to shut
down the T2000 server.
1.1.7 Shutting Down the Computer
Normally, do not shut down the computer. In special situations, for example, if the computer
becomes faulty, shut down the computer by following the correct sequence. The shutdown
procedures of the workstation are different from the shutdown procedures of a normal PC. Follow
the procedure correctly to perform the required operations.
Prerequisite
l The T2000 must be installed correctly.
l The power cable of the workstation or of the computer, the power cable of the monitor, the
data line, and the Ethernet line must be connected correctly.
l If there is a printer, modem, or other peripherals, their power line and data line must be
connected correctly.
Background Information
The T2000 can run on the UNIX or Windows operating system. The functions are the same on
each operating system. For more information about the recommended hardware configuration,
see the OptiX iManager T2000 Product Description.
Procedure
l On UNIX
1. Power on the printer, modem, and other peripherals.
2. Power on the workstation. The Solaris starts automatically and the Prompt dialog box
is displayed.
3. Enter the Username and Password in the Login dialog box. For example, User:
t2000 (by default); Password: t2000 (by default).
4. Click OK to open the Common Desktop Environment (CDE) window.
l On Windows
1. Power on the printer, modem, and other peripherals.
2. Power on the computer. The Windows starts automatically.
3. Enter the Username and Password in the Login dialog box. For example, User:
t2000 (by default); Password: t2000 (by default).
4. Click OK to open the Windows user interface.
----End
Prerequisite
l The computer where the T2000 is installed must be started correctly.
l The operating system of the T2000 server must be running correctly.
l The T2000 license must be in the server directory.
l The SQL server must be started and must work normally.
Procedure
Step 1 Double-click the T2000Server icon on the desktop of the T2000 server.
Step 2 In the Login dialog box, enter User Name, Password and Server. For example, User Name:
admin, Password: T2000 (T2000 is the default password of the admin user.), and Server:
Local.
NOTE
Step 3 Click Login to display the System Monitor window. Wait until the core processes (including
Ems Server, Schedulesrv Server, Security Server, Syslog Agent, Topo Server, WebLCT
Server, Tomcat Service, Client Upgrader, and Toolkit Server) and Database Server
Process are in the Running state. Now the T2000 server is started successfully.
Step 4 Optional: When required, you can also start the Northbound Interface processes (including
Northbound Interface Module(iPASSAgent) Process, Northbound Interface Module
(SNMP) Process, Naming Service, Notify Service, and itnotify) manually.
Step 5 Optional: If the System Monitor is started, you need to use it to restart the T2000 server when
required. Choose System > Start Server from the Main Menu of the System Monitor. When
the core processes and Database Server Process processes are in the Running state, the T2000
server is started properly.
----End
Background Information
To view the status of the T2000 processes by UNIX command line, run the following command:
# /T2000/server/bin/showt2000server
If each process entered has a corresponding process ID and the specific ID does not change, the
T2000 processes are normal.
Procedure
In the System Monitor, click the Process tab. View the status of the T2000 core processes
(including Ems Server, Schedulesrv Server, Security Server, Syslog Agent, Topo Server,
WebLCT Server, Tomcat Service, Client Upgrader, and Toolkit Server), Database Server
Process, and Northbound Interface processes (including Northbound Interface Module
(iPASSAgent) Process, Northbound Interface Module(SNMP) Process, Naming Service,
Notify Service, and itnotify). If all the processes are in the Running state, the T2000 process
is normal.
----End
Prerequisite
The T2000 server must be started correctly.
Procedure
Step 1 On the computer of the T2000 client, double-click the T2000 Client icon on the desktop.
Step 2 Enter the User Name and Password of the T2000 client. For example, User Name: admin;
Password: T2000.
NOTE
l By default, the initial user name is admin, and the password is T2000. To protect the T2000 from
unauthorized logins, you need to immediately change this password.
l The administrator needs to create new T2000 users and assign them to certain authority groups.
----End
Prerequisite
The T2000 client must be started normally.
Procedure
Step 1 Choose File > Exit from the Main Menu.
NOTE
If the layout of the view is changed and not saved, a Confirm dialog box is displayed, asking you whether
you want to save the changes. After you click OK in the dialog box, you automatically exit the client.
----End
Prerequisite
All the T2000 clients connected to the T2000 server must be shut down.
Context
When performing the operations related to the database (such as initializing the T2000
database, restoring T2000 databases, and restoring T2000 MO data) or when performing the
operations related to the T2000 (such as the upgrade, installing patches, and re-installing the
T2000), you need to shut down the T2000 server first. It is recommended that you shut down
the T2000 server in the same way as you shut down the T2000 server and the System Monitor
Client.
Procedure
l Shut down the T2000 server and the System Monitor.
NOTE
After shutting down the T2000 server and the System Monitor, you can perform the operations related
to the database (such as initializing the T2000 database, restoring T2000 databases, and restoring
T2000 MO data) or can perform the operations related to the T2000 (such as the upgrade, installing
patches, and re-installing the T2000).
1. In the System Monitor, choose System > Shutdown System from the Main Menu.
l Shut down the T2000 server only.
NOTE
After shutdown, you cannot perform the operations related to the database (such as initializing the
T2000 database, restoring T2000 databases, and restoring T2000 MO data) or cannot perform the
operations related to the T2000 (such as the upgrade, installing patches, and re-installing the
T2000).
1. In the System Monitor, choose System > Stop Server from the Main Menu.
2. Click OK in the confirmation dialog box. When all the processes are in the
Stopped status, the T2000 server is stopped normally.
----End
Prerequisite
The T2000 server and client applications must be stopped.
Precaution
CAUTION
To prevent damage to the equipment or data loss, perform the following steps one by one to shut
down the workstation.
Procedure
l On UNIX platform
1. Enter the following commands in the terminal window, and the UNIX workstation
shuts down automatically:
% su root
Password: rootkit
# sync;sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE
l rootkit is the default password of super user root. If the password is changed, enter the
new password.
l To restart the Sun workstation, the last command should be # shutdown -y -g0 -i6.
2. Switch off the monitor and the peripheral equipment.
l On Windows platform
1. Choose Start > Shut down from the Windows desktop.
2. Choose Shut down and click OK in the dialog box. The computer shuts down
automatically.
3. Switch off the monitor and the peripheral equipment.
----End
Prerequisite
You must be an NM user with "NE and network monitor" authority or higher.
Procedure
l To open the Main Topology, log in to the T2000.
l Choose Window > Main Topology from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE and network monitor" authority or higher.
Background Information
You can open a maximum of five NE Explorer windows at the same time.
Procedure
Right-click an NE on the Main Topology and choose NE Explorer from the shortcut menu.
----End
Prerequisite
You must be an NM user with "NE and network monitor" authority or higher.
Procedure
Choose Trail > SDH Trail Management from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE and network monitor" authority or higher.
Procedure
Choose Configuration > Clock View from the Main Menu.
----End
This topic describes how to configure the SDH/PDH services on the T2000 by providing an
example.
2.1 Engineering Requirements
In a city, a new communication network is to be constructed among nodes A, B, and C.
2.2 Engineering Planning
The engineering planning department should conduct the planning according to the related
requirements and deliver detailed planning information.
2.3 Engineering Preparation
Before configuring the equipment, check whether the required preparations on the NE side and
on the T2000 side are complete and whether the relevant documents are available.
2.4 Configuration Process
This topic describes how to configure the SDH/PDH services.
2.5 Logging in to the T2000
The T2000 is the network management system of Huawei. The T2000 provides all the
management functions at the NE layer, which contain the fault management, performance
management, configuration management, security management, communication management,
topology management, and system management. In addition, the T2000 provides certain
management functions at the network layer. This topic describes how to log in to the T2000.
2.6 Creating an NE
This topic describes how to create an NE on the T2000. To create an NE, you must search for
an NE or manually add an NE. Because the NE ID is unknown when the NE is initially
configured, searching for an NE to create it is commonly used.
2.7 Configuring Communication
By default, an NE allows the T2000 to access it over the Ethernet network. This topic describes
how to configure the Ethernet access function of the NE on the T2000.
2.8 Creating an NE User
To control the access to an NE and the configuration for this NE, an NE user is assigned with
certain NE operation authority.
2.9 Logging in to an NE
One NE user cannot be used by multiple clients at the same time to log in to an NE or to manage
an NE. If a client logs in to the NE when the NE user is already in use by another client, the first
client who has logged in to the NE exits automatically.
2.10 Creating a Board
To configure services on an NE and to manage an NE, first create a board.
2.11 Creating Fibers
This topic describes how to create fibers on the T2000. After fibers are created, they are displayed
on the T2000.
2.12 Creating a Topology Subnet
A topology subnet is created for simplifying the GUI and has no impact on the running NEs. To
facilitate management, you can place topology objects that are in the same area of a network or
have similar attributes into the same subnet for display.
2.13 Creating a Two-Fiber Bidirectional MSP Ring
In this example, NEs 1–3 form a two-fiber bidirectional MSP ring.
2.14 Configuring the Clock
Configuring the parameters of the clock can realize synchronization and clock protection. This
topic describes how to configure a clock, including the configuration of the clock source priority
list, clock source restoration parameters, clock source switching conditions, and clock subnet
on the T2000.
2.15 Configuring SDH/PDH Services by Using the Trail Management Function
The trail management function provides end-to-end service configuration between NEs. This
section describes how to configure SDH/PDH services and the server layer trail by using the
trail management function on the T2000.
2.16 Configuring SDH/PDH Services by Using the Single Station Configuration Function
This topic describes how to configure SDH/PDH services by using the single station
configuration function.
2.17 Configuring Overhead Bytes
You need to set overhead bytes when maintaining or monitoring trails. This topic describes how
to configure overhead bytes on the T2000.
2.18 Enabling/Disabling Performance Monitoring
The performance parameters are used to monitor the equipment and analyze the network. This
topic describes how to enable or disable the performance monitoring function on the T2000.
2.19 Setting Alarm Dumping Parameters
To prevent the alarm data from overflowing or to prevent damage to the alarm data, you need
to dump the alarm data in a timely manner.
2.20 Configuring Automatic Laser Shutdown
When the laser detects the LOS signal, the automatic laser shutdown (ALS) is performed to
automatically shut down the laser of the transmit port at the local end, thus to prolong the life
of the laser.
2.21 Backing Up the NE Configuration Data
To prevent data loss, back up the NE configuration data after the configuration is complete. This
topic describes how to back up the NE configuration data on the T2000.
2.22 Backing Up the T2000 Configuration Data
To prevent data loss, back up the T2000 configuration data after the configuration is complete.
This topic describes the immediate data backup and periodic data backup procedures on the
T2000.
A - 8xE1 8xE1
B 8xE1 - 8xE1
C 8xE1 8xE1 -
The distance between any two nodes of A, B, and C is not more than 50 km. The services among
these nodes require network level protection. In addition, these nodes may also require service
expansion and Ethernet data services.
As shown in Figure 2-1, three OptiX OSN 500 network elements (NEs) form an STM-4 two-
fiber bidirectional multiplex section protection (MSP) ring. NE1 is a gateway NE.
NE1 (A)
30 km
40 km
STM-4 two-fiber
NE2 (B) NE3 (C)
bidirectional MSP ring
35 km
NE1
9-1
129.9.0.1
OSN 500
30 km 40 km
129.9.0.1
NE2
9-2 NE3
STM-4 two-fiber
129.9.0.2 bidirectional MSP ring 9-3
OSN 500 129.9.0.3
129.9.0.1 OSN 500
129.9.0.1
NE name
Extended ID - NE ID
35 km
IP address
Equipment type
Gateway
Opticalport 1 Opticalport 2
NE1 TX/RX TX/RX
2#VC4
Add/Drop
Description
8-SL4D-1 indicates the first optical port on the SL4D board.
t9 indicates the E1 tributary board in slot 9 of an NE, and the numbers following the tributary
board indicate the E1 path number. For example, "t9:1-8" indicates the first to eighth E1 paths
on the tributary board in slot 9. The numbers above the horizontal line indicate the number of
timeslots occupied in the VC-4.
Consider NE1 as an example. The service in the diagram is described as follows:
l E1 paths 1–8 of the tributary board in slot 9 of NE1 interwork with E1 paths 1–8 of the
tributary board in slot 9 of NE2. The timeslots 1–8 in the first VC-4 carry the services.
l Configure the pass-through services on NE2 for the 8xE1 services from NE1 to NE3. The
timeslots 9–16 in the first VC-4 carry the services.
NOTE
Because the ISU board integrates the functions of the SCC unit, cross-connect unit, clock unit, tributary
unit, line unit, and data transparent transmission unit, the slot described in this topic refers to the logical
slot on the T2000.
BITS
NE1
BITS/
intr
NE2 NE3
SL4D-1/ SL4D-2/
SL4D-2/ SL4D-1/
intr intr
NE name
Sn: slot where the line clock source is located
Clock source priority Clock tracing
1/source priority 2/ intr: internal clock source of the NE direction
source priority 3
In this example, to prevent clock interlocking, enable the extended SSM and set the ID of the
external clock source 1 (BITS) of NE1 as 1 and the ID of the internal clock source of NE1 as 2.
Set the BITS as the external clock source 1 of NE1. The synchronization status byte uses SA4.
2.3.1 NE Side
Check the relevant items on the NE side to ensure that the equipment is able to function properly.
l The OptiX OSN 500 must be installed.
l The system commissioning for all the NEs must be complete.
l The fibers among nodes are correctly connected.
l The NE IDs and extended IDs of these NEs, and the IP address of the gateway NE must be
set as shown in Figure 2-2.
2.3.3 Document
Check whether the relevant documents are available to ensure that the correct configuration
information can be obtained quickly during the actual networking.
l The engineering planning information must be available.
l After you log in to the T2000 client, the online Help can be viewed by pressing the F1 key.
l The manuals related to the equipment and the OptiX iManager T2000 must be available.
This topic only describes the procedures for configuring the SDH services on the T2000 and the precautions
to be taken. For more details, see the OptiX iManager T2000 Operation Guide for SDH of mapping version.
Procedures for configuring SDH services on the T2000 are listed as follows.
Procedure Operation
2 2.6 Creating an NE
5 2.9 Logging in to an NE
Procedure Operation
Prerequisite
l The T2000 server and the T2000 client must start up and the server must operate normally.
l The user must know the user name and password.
Precaution
CAUTION
l If the T2000 server and the T2000 client are installed in the same computer, when you log
in to the T2000, the IP address and port number of the T2000 server is 127.0.0.1:9800.
l If the T2000 server and the T2000 client are installed in different computers, when you log
in to the T2000, enter the actual IP address for the T2000 server. The port number is 9800.
l The server is set in common mode by default, and the SSL mode can be used as required.
The user does not need to enter the port number. After you select the mode, the system
automatically selects a corresponding port number. If the client and the server are installed
in different computers, set them to the same mode. Otherwise, you cannot log in to the T2000.
Procedure
Step 1 Double-click the T2000Client icon on the desktop to enter the Login interface.
Step 3 Click , and click Add... in the displayed Server Setting dialog box.
Step 5 Click OK. Select the corresponding server, and then click OK.
CAUTION
By default, the name of the initial user of the T2000 is admin, and the password is T2000. To
ensure security, the administrator must change this password immediately after logging to the
system. The IP address of the server may be different from the IP address provided. Set the IP
address of the server according to the actual situation.
Step 6 Click Login. After the data loading is complete, the Main Topology of the T2000 is displayed.
----End
2.6 Creating an NE
This topic describes how to create an NE on the T2000. To create an NE, you must search for
an NE or manually add an NE. Because the NE ID is unknown when the NE is initially
configured, searching for an NE to create it is commonly used.
Prerequisite
l The user must log in to the T2000, and the T2000 must be correctly connected to the
equipment.
l You must be an NM user with "NM operator" authority or higher.
Procedure
Step 1 Choose File > Search for NE from the Main Menu. The Search for NE window is displayed.
Step 2 Click Add on the right of the Search Domain pane. The system displays the Input Search
Domain dialog box.
Repeat steps 2–3 to add several search domains. You can also delete the default search domain that is
provided by the system.
l If you search for an NE by IP address and the IP addresses of the T2000 and the gateway NE are in the
same network segment, select IP Address Range of GNE or IP Address of GNE.
l If the IP addresses of the T2000 and the gateway NE are in different network segments, select IP
address of GNE.
l If you search for an NE by NSAP address, select NSAP Address.
Step 7 Under Result, select the NEs to be added and then click Create. The system displays the Create
NE dialog box.
If several NEs need to be created at the same time, select All NEs use the same User and Password.
Step 9 Click OK. The icons of the created NEs are displayed on the Main Topology.
----End
Prerequisite
l The user must log in to the T2000, and the T2000 must be correctly connected to the
equipment.
l You must be an NM user with "NM maintainer" authority or higher.
Precaution
CAUTION
When the Ethernet access control is enabled, the NE communication is reset.
Procedure
Step 1 Right-click the NE1 icon on the Main Topology, and then choose NE Explorer.
Step 2 Select NE1 on the upper left pane, and then choose Communication > Access Control from
the Function Tree.
Step 3 Under Ethernet Access Control, set the network port to Enabled.
----End
Prerequisite
l The user must log in to the T2000, and the T2000 must be correctly connected to the
equipment.
l You must be with "NE and network administrator" authority or higher.
Context
There are five levels of user authority, namely, monitor, operation, maintenance, system, and
debug. These levels are in a ascending order of priority. A higher level user has the authority of
the lower level. For example, an operation level user has the authority of the monitor level, and
the highest level user has complete authority. Table 2-3 provides the authority pertaining to each
level.
Monitor level All query commands, login and logout, and modification to its own
password
Operation level All settings for fault and performance, certain security settings, and
certain configurations
Debug level All security settings, all configurations, and all debugging
commands
Different NE users are used to log in to different T2000 systems. Table 2-4 lists the NE user
flags.
LCT NE user An NE user who manages NEs on the local craft terminal (LCT)
EMS NE user An NE user who manages NEs on the element management system
(EMS), that is, on the T2000
General NE user An NE user who does not belong to any particular T2000 category
Procedure
Step 1 Choose System > NE Security Management > NE User Management from the Main Menu.
Step 2 Select NEs 1–3 from the Object Tree on the left pane, and then click .
Step 4 Enter the following attributes of the newly added NE user: user name, user level, user flag,
password, and a detailed description of the new NE user. For example, create a unified NE user
T2000 for NEs 1–3, as shown in the following figure. The user name contains 4 to 16 characters.
The password contains 6 to 16 characters, including one letter and one numeral. For description
about the user level and priority, refer to Table 2-3. For description about the user flag, refer to
Table 2-4.
Step 5 Click OK. After a dialog box prompting that the operation is successful is displayed, click
Close.
----End
2.9 Logging in to an NE
One NE user cannot be used by multiple clients at the same time to log in to an NE or to manage
an NE. If a client logs in to the NE when the NE user is already in use by another client, the first
client who has logged in to the NE exits automatically.
Prerequisite
l The NE user who needs to log in to an NE must be created.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 Choose System > NE Security Management > NE Login Management from the Main Menu.
Step 2 Select NEs 1–3 from the Object Tree on the left pane, and then click .
Step 4 Enter the name and password of the NE user to be switched to. For example, switch the NE user
of NEs 1–3 to T2000.
Step 5 Click OK. After a dialog box prompting that the operation is successful is displayed, click
Close.
----End
Prerequisite
l The NE must be installed and must work normally.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 On the Main Topology, double-click the NE1 icon to open the NE Configuration Wizard.
Step 2 Select Manual Configuration, and then click Next. A dialog box is displayed for confirmation.
Step 3 Confirm the NE attribute, and then click Next.
Step 4 Enter the NE panel. Click Query Physical Slot(s), and the board that is already installed on the
NE side is shown. Click Next.
Step 5 Select Verify and Run, and then click Finish to deliver the configuration data to the NE.
Step 6 Repeat steps 1–5 to configure NEs 2 and 3. Figure 2-3 shows the board information of each NE.
----End
Prerequisite
l The NE must be installed and must work normally.
l The NE must be already configured.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 On the Main Topology, double-click the NE1 icon to enter the NE panel.
Step 2 Right-click the slot where the board is added, and select the corresponding board. Configure the
board.
Step 3 Click to exit the NE panel.
Step 4 Repeat steps 1–3 to configure NEs 2 and 3.
----End
Prerequisite
l The fibers between the equipment must be correctly connected. The boards that are
connected to the fibers must be created.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 On the Main Topology, choose File > Search for Fiber/Cable.
Step 2 Select NEs 1–3 from the Object Tree on the left pane, and then click Search. A progress bar is
displayed to indicate the progress of the search.
Step 3 After the operation is complete, a dialog box is displayed, prompting that the operation is
successful. Click Close.
Step 4 Select one or several fibers from the Newly Searched Link pane and then click Create Fiber/
Cable.
----End
Prerequisite
l The fibers between the equipment must be correctly connected. The boards that are
connected to the fibers must be created.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 On the Main Topology, select from the shortcut icons and the cursor becomes " ".
Step 2 On the Main Topology, select the fiber source NE, that is, NE1. Then, select the source board
8-SL4D, and the source port 1.
Step 3 Select the fiber sink NE, that is, NE2. Then, select the sink board 8-SL4D and the sink port 1.
Step 4 Set the attributes of the fiber in the Create Fiber/Cable dialog box, and then click OK.
TIP
If you click Apply in the Create Fiber/Cable dialog box after setting the attributes of a created fiber, you
can continue creating other fibers without repeating step 1.
Step 5 According to Figure 2-4, repeat steps 1–4 to create fiber connection among NEs.
----End
Prerequisite
l The NEs must be created on the T2000.
l You must be an NM user with "NE and network administrator" authority or higher.
Context
NOTE
The subnet created in this topic is only a topology concept. You can place the topology objects in a network
into a subnet for display.
Procedure
Step 1 On the Main Topology, right-click and choose New > Subnet, and the system displays the Add
Object dialog box.
Step 2 Click the Properties tab, and enter the subnet name OptiX OSN 500.
Step 3 Click the Select Object tab and select NEs 1–3 from the Available Objects column. Click
to add them into the Selected Objects column.
Step 5 After the subnet is created successfully, the icon is displayed on the Main Topology.
Step 6 Double-click or right-click the icon of this subnet, and then choose Enter. You can only enter
the topology view that contains this topology only. Right-click on this topology to choose Up
and you can enter the Main Topology that contains all topology objects.
----End
Prerequisite
l The protection subnet to be created must be the same as the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > 2f_MS SPRing from the Main
Menu. The Create SDH Protection Subnet wizard is displayed.
Step 2 Set the following parameters in this wizard:
l Name: 2f_MS_SPRing_1
l Level: STM-4
Step 3 Double-click the icons of NEs 1–3 on the right topology view in turn, to add them into the
protection subnet. The Node Attributes parameter uses the default value MSP Node. Click
Next.
Step 4 Confirm the physical link information, and then click Finish.
Step 5 A dialog box is displayed, prompting that the protection subnet is created successfully.
----End
Prerequisite
l To realize clock protection, at least two clock tracing sources must be configured.
l You must be an NM user with "NE and network administrator" authority or higher.
Procedure
Step 1 On the Main Topology, right-click the NE1 icon and choose NE Explorer.
Step 2 Select NE 1 on the upper left pane, and then choose Configuration > Clock > Clock Source
Priority from the Function Tree.
Step 3 Click Create. In the Add Clock Source dialog box, select External Clock Source 1.
Step 4 Click OK.
Step 5 Select External Clock Source 1. Use the default values for External Clock Source Mode and
Synchronous Status Byte.
NOTE
In this example, set External Clock Source Mode and Synchronous Status Byte for NE1 only.
Step 6 Set External Clock Source 1 to the highest priority and then click Apply.
NOTE
Step 7 Repeat steps 1–6 to set the clock tracing source and the clock priority list for NEs 2 and 3,
according to Figure 2-6.
----End
Prerequisite
l To realize clock protection, at least two clock tracing sources must be configured.
l You must be an NM user with "NE and network administrator" authority or higher.
Context
NOTE
In this example, because all the NEs belong to the same clock subnet and use the extended SSM protocol,
set the line ports with SSM output enabled and the line ports with clock ID enabled as all line ports.
Procedure
Step 1 On the Main Topology, right-click the NE1 icon and choose NE Explorer.
Step 2 Select NE 1 on the upper left pane, and then choose Configuration > Clock > Clock Subnet
Configuration.
Step 3 Click the Clock Subnet tab and set the following parameters:
l Affiliated Subnet: 0
l Protection Status: Start Extended SSM Protocol
l Clock Source ID of Extended Clock Source 1: 1
l Clock Source ID of Internal Clock Source: 2
NOTE
In this example, only NE1 requires the setting of clock source ID.
Step 5 Click the Clock Quality tab, click the Clock Source Quality tab, and then set the Configuration
Quality parameter as follows:
l Configuration Quality of External Clock Source 1: Automatic Extraction
l Configuration Quality of Internal Clock Source: Automatic Extraction
Step 7 Click the SSM Output Control tab. Set the control status of line ports 8-SL4D-1 (SDH-1) and
8-SL4D-2 (SDH-2) to Enabled.
Step 9 Click the Clock ID Status tab. Set the enabled status of line ports 8-SL4D-1 (SDH-1) and 8-
SL4D-2 (SDH-2) to Enabled.
Step 11 Repeat steps 1–10 to set the parameters of the clock subnets for NEs 2 and 3.
----End
On the T2000, SDH/PDH services can be configured through one of the following methods:
You need to obtain the license for the trail management function. Otherwise, you can only use the station
configuration function.
NOTE
Before you configure the services, query the remaining available resources by choosing Report > TU Port
Resource Statistics .
Prerequisite
l The preceding operations must be complete.
l The license for using the trail management function must be available.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Choose Trail > SDH Trail Creation from the Main Menu.
Step 2 Set the following parameters in the SDH Trail Creation window:
l Direction: Bidirectional
l Level: VC4 Server Trail
l Resources Usage Strategy: Protected Resource
l Protection Priority Strategy: Trail Protection First
Step 3 Select the source NE and sink NE. Double-click the NE in the topology view on the right, and
select the source NE NE1 and sink NE NE2. If you double-click the NE again, the selection is
cancelled. Alternatively, you can click Browse to select the source and sink NEs. The selected
source NE is marked as , and the selected sink NE is marked as .
Step 4 Click Set Route Timeslot, set Timeslot of the trail to 1, and then click OK. Select Auto-
Calculation, and Route Information is displayed in the route information table. The trail
marked with an arrow is displayed between the source NE and the sink NE in the topology view
on the right.
Step 5 Click the General Attributes tab, and set the following parameters:
l Name: NE1-NE2-VC4 Server Trail-0001
l Order No.: 1
Step 7 Click Apply. A dialog box is displayed, indicating that the creation of the trail is successful.
Click Close.
Step 8 In the displayed Copy dialog box, set the following parameters and then click Add:
l Source: NE1-8-SL4D-1(SDH-1)-VC4:2
l Sink: NE2-8-SL4D-1(SDH-1)-VC4:2
Step 9 Select the Specify the start timeslot check box, and set it to 2. Set The start value of the trail
name suffix to 2.
Step 11 Repeat Steps 1–10 to create the VC-4 service trails for paths 1–2 between adjacent NEs: NE2
and NE3, and NE3 and NE1.
----End
Prerequisite
l The preceding operations must be complete.
l The license for using the trail management function must be available.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Choose Trail > SDH Trail Creation from the Main Menu.
Step 2 Set the following parameters in the SDH Trail Creation window:
l Direction: Bidirectional
l Level: VC12
l Resource Usage Strategy: Protected Resource.
l Protection Priority Strategy: Trail Protection First
Step 3 Select the source and the sink. See Figure 2-5 and create the service of each NE. Double-click
the icon of NE1 in the topology view on the right. In the Select Board Port-Source-NE1 dialog
box, click the SP3S board in slot 9 on the NE Panel. Select 1 for Port.
Step 5 Double-click the icon of NE2 in the topology view on the right. In the Select Board Port-Sink-
NE2 dialog box, click the SP3S board in slot 9 on the NE Panel. Select 1 for Tributary Port.
Step 7 Optional: Double-click the icon of NE3 in the topology view on the right to specify the backup
route provided by the system that does not pass through NE3. is displayed preceding NE3.
You can specify the route that should not be used to pass through a certain NE through this
method. This ensures that the routing direction conforms to the requirement. It is generally not
selected.
Step 8 Click Set Route Timeslot. When the Set Route Timeslot dialog box is displayed, click the
choice box under Timeslot to select timeslot 1[1-1-1] for the service on the VC-4.
Step 10 Set the following parameters in the SDH Trail Creation window:
l Name: NE1-NE2-VC12-0001
l Order No.: 1
Step 11 Click the Activate the trail and Copy after Creation check boxes to enable the duplication of
the remaining eight E1 services from NE1 to NE2 after the creation of this E1 timeslot.
Step 13 In the displayed Copy dialog box, set the following parameters and then click Add:
l Source: NE1-9-SP3S-2(SDH_TU-2)–NE1-9-SP3S-8(SDH_TU-8)
l Sink: NE2-9-SP3S-2(SDH_TU-2)–NE2-9-SP3S-8(SDH_TU-8)
Step 14 Select the Select Timeslots/Port check box. Set the Specify the start timeslot of the eight E1s
on the VC4 to 2: 2-1-1. Set The start value of the trail name suffix to 2. Select Activated.
Step 16 Repeat Steps 1–15 to create the E1 service from NE1 to NE3 and the E1 service from NE2 to
NE3.
----End
When using the single station configuration function to configure services, you need not configure the
VC-4 server layer trail. Instead, configure the cross-connections of services on NE1 to NE3 in turn. This
topic can be skipped if the SDH/PDH service has been configured by using the trail management function.
NOTE
Before you configure the services, query the remaining available resources by choosing Report > TU Port
Resource Statistics .
NOTE
l Before configuring add/drop services, configure bidirectional services from line boards to tributary
boards.
l Before configuring pass-through services, configure bidirectional services between line boards.
Prerequisite
l The preceding operations must be complete.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Right-click an NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select NE1 and choose Configuration > SDH Service Configuration from the Function Tree.
Click .
Step 3 See Figure 2-5 and create the E1 services from NE1 to NE2: from ports 1 to 8 of the SP3S board
in slot 9 to timeslots 1 to 8 of the first VC-4 on the SL4D board in slot 8. Click Create. Set the
following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 9-SP3S
l Source Timeslot Range(e.g. 1,3-6): 1–8
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 1–8
l Activate Immediately: Yes
Prerequisite
l The preceding operations must be complete.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Click in NE Explorer and select the NE2 icon from the Object Tree. Then, click OK.
Step 2 Select NE2 and choose Configuration > SDH Service Configuration from the Function Tree.
Click .
Step 3 See Figure 2-5 and create the E1 services from NE2 to NE1: from ports 1 to 8 of the SP3S board
in slot 9 to timeslots 1 to 8 of the first VC-4 on the SL4D board in slot 8. Click Create. Set the
following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 9-SP3S
l Source Timeslot Range(e.g. 1,3-6): 1–8
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 1–8
l Activate Immediately: Yes
Step 5 See Figure 2-5 and create the E1 services from NE2 to NE3: from ports 9 to 16 of the SP3S
board in slot 9 to timeslots 1 to 8 of the first VC-4 of the second optical port on the SL4D board
in slot 8. Click Create. Set the following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 9-SP3S
l Source Timeslot Range(e.g. 1,3-6): 9–16
l Sink Slot: 8-SL4D-2(SDH-2)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 1–8
l Activate Immediately: Yes
Step 7 See Figure 2-5 and configure the E1 service from NE1 to NE3 so that it passes through NE2:
from timeslots 9 to 16 of the first VC-4 of the first optical port on the SL4D in slot 8 to timeslots
9 to 16 of the first VC-4 of the second optical port on the SL4D in slot 8. Click Create. Set the
following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 8-SL4D-1(SDH-1)
l Source VC4: VC4-1.
l Source Timeslot Range(e.g. 1,3-6): 9–16
l Sink Slot: 8-SL4D-2(SDH-2)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 9–16
l Activate Immediately: Yes
----End
Prerequisite
l The preceding operations must be complete.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Click in NE Explorer and select the NE3 icon from the Object Tree. Then, click OK.
Step 2 Select NE3 and choose Configuration > SDH Service Configuration from the Function Tree.
Click .
Step 3 See Figure 2-5 and create the E1 services from NE3 to NE1: from ports 9 to 16 of the SP3S
board in slot 9 to timeslots 9 to 16 of the first VC-4 of the first optical port on the SL4D board
in slot 8. Click Create. Set the following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 9-SP3S
l Source Timeslot Range(e.g. 1,3-6): 9–16
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 9–16
l Activate Immediately: Yes
Step 5 See Figure 2-5 and create the E1 services from NE3 to NE2: from ports 1 to 8 of the SP3S board
in slot 9 to timeslots 1 to 8 of the first VC-4 of the first optical port on the SL4D board in slot
8. Click Create. Set the following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 9-SP3S
l Source Timeslot Range(e.g. 1,3-6): 1–8
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-1
l Sink Timeslot Range(e.g. 1,3-6): 1–8
l Activate Immediately: Yes
----End
Prerequisite
l Trails must be created and activated.
l You must be an NM user with "NE and network maintainer" authority or higher.
Procedure
Step 1 Right-click an NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select 8-SL4D from the Object Tree and choose Configuration > Overhead Management >
Regenerator Section Overhead from the Function Tree.
Step 3 Double-click J0 to be Sent([Mode]Content). Set Input in Text Format, Byte Mode, and
Input Mode for overhead bytes.
Step 5 Double-click J0 to be Received([Mode]Content). Set Input in Text Format, Byte Mode, and
Input Mode for overhead bytes.
----End
Prerequisite
l Trails must be created and activated.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
NOTE
The VC-3/VC-4/VC-12 tracing byte J1 can be queried or set only after the VC-3/VC-4 cross-connection
is created.
Procedure
Step 1 Right-click an NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select 8-SL4D from the Object Tree and choose Configuration > Overhead Management >
VC4 Path Overhead from the Function Tree.
Step 3 Click the Tracing byte J1 tab. Double-click J1 to be Sent([Mode]Content). Set Input in Text
Format, Byte Mode, and Input Mode for overhead bytes.
Step 5 Double-click J1 to be Received([Mode]Content). Set Input in Text Format, Byte Mode, and
Input Mode for overhead bytes.
----End
Prerequisite
l Trails must be created and activated.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
NOTE
l The C2 byte of this VC-3/VC-4 be set or queried only when cross-connections at the VC-3/VC-4 level
are created.
l The T2000 processes the write/read attributes of overhead bytes in the extended mode or general mode.
In the extended mode, the T2000 can process the write/read attributes of overhead bytes to a greater
extent. Set the C2 byte only after the mode is set to the extended mode.
Procedure
Step 1 Right-click an NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select 8-SL4D from the Object Tree and choose Configuration > Overhead Management >
VC4 Path Overhead from the Function Tree.
Step 3 Click the Signal Flag C2 tab and click Options. Set the mode to Extended Mode in the dialog
box that is displayed. Click OK.
Step 5 Set C2 to be Sent and C2 to be Received. Click OK in the dialog box that is displayed.
----End
Background Information
NOTE
Normally, all performance parameters are set to the default values. Hence, you only need to start the
performance monitoring. You can also set the performance parameters as required.
Procedure
Step 1 Choose Configuration > NE Time Synchronixation from the Main Menu.
Step 2 Select NE1 to NE3 from the Object Tree and click .
Prerequisite
You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
NOTE
Normally, all alarm parameters except Alarm Data are set to the default values. You can also set alarm
parameters depending on the actual situations. For details, see the setction on alarm setting in the OptiX
T2000 online Help.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 2 Select Alarm Data in the Dump Settings dialog box. Set the record types that need be dumped
periodically. Normally, set Periodic dump to Yes, set Dump interval (days) and Keep the
records of the latest to the default values. You can also set the parameters according to the
actual network situation. Set the other parameters to the default values.
----End
Prerequisite
l You must log in to the T2000, and the T2000 must be correctly connected to the equipment.
l You must be a T2000 user with "NE and network operator" authority or higher.
Procedure
Step 1 Right-click the NE1 icon in the Main Topology, and choose NE Explorer.
Step 2 Select 8-SL4D from the Object Tree and choose Configuration > Automatic Laser
Shutdown from the Function Tree. For a detailed description of the parameters for configuring
the ALS, refer to Table 2-5.
Step 3 Set the Automatic Shutdown parameter to Enabled. Set the other parameters to the default
values.
----End
Parameter Description
For a detailed description of the parameters for configuring the ALS, refer to Table 2-5.
Off Period (ms) 0–655350 60000 The time for auto laser shutdown.
Prerequisite
You must be an NM user with "NE and network maintainer" authority or higher.
Precautions
NOTE
Ensure that no abnormal alarm or performance event is generated before backing up the NE database.
Procedure
Step 1 Choose Configuration > Configuration Data Management from the Main Menu.
Step 2 Select NE1 to NE3 from the Object Tree on the left and click .
Step 3 Select NE1 to NE3 from the Configuration Data Management list and choose Back Up NE
Database > Backup to SCC . Click Yes in the dialog box that is displayed.
Step 4 A dialog box is displayed, indicating that the backup is successful. Click Close.
----End
Prerequisite
l After the configuration, check whether abnormal any alarms or performance events are
generated before performing the following operations.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
NOTE
The default password of the T2000 superuser admin is T2000. The password of the superuser should be
modified after the T2000 system is installed.
Procedure
Step 1 Optional: Choose File > Log Out from the Main Menu. Click OK in the dialog box that is
displayed.
Step 3 Choose System > NMS Security Settings > Single User Mode from the Main Menu. Click
OK in the subsequent prompt.
CAUTION
When Single User Mode is chosen, the users other than admin are forcibly logged out.
Step 4 Choose System > Database > Database Backup from the Main Menu. Click Backup and the
system backs up the NM database to the selected directory immediately.
----End
Prerequisite
l After the configuration, check whether abnormal any alarms or performance events are
generated before performing the following operations.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
NOTE
The default password of the T2000 superuser admin is T2000. The password of the superuser should be
modified after the T2000 system is installed.
Procedure
Step 1 Optional: Choose File > Log Out from the Main Menu. Click OK in the subsequent prompt.
Step 2 Optional: Enter the following information in the Login interface:
l User: admin
l Password: T2000
NOTE
Step 3 Choose System > NMS Security Settings > Single User Mode from the Main Menu. Click
OK in the subsequent prompt.
CAUTION
When Single User Mode is chosen, the users other than admin are forcibly logged out.
Step 4 Choose System > Schedule Task Management from the Main Menu. Click OK in the
subsequent prompt.
Step 5 Click New. Set Task Name to Backup periodically in the Task Creation Wizard dialog box.
Step 6 Click Next and confirm the backup directory at the server side. Click Next.
Step 7 Set Running period to Weekly and click Next.
Step 8 Click Finish. Then the system backs up the T2000 database to the selected directory periodically
according to the backup period.
----End
For information on the configuration of an MSP ring, see 2.13 Creating a Two-Fiber Bidirectional MSP
Ring.
Prerequisite
l The created protection subnet must be consistent with the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
Figure 3-1 shows the networking diagram.
NE1 (A)
30 km
40 km
STM-4 two-fiber
NE2 (B) NE3 (C)
bidirectional ring
35 km
VC12:1-8
1#VC4 t9:1-8 t9:1-8
2#VC4
Add/Drop
Procedure
Step 1 Configure the services on NE1.
1. Right-click an NE icon in the Main Topology, and choose NE Explorer.
2. Choose Configuration > SDH Service Configuration from the Function Tree. Then,
click .
3. See Figure 3-2 and configure the SNCP services from NE1 to NE2 so that they are dually
fed from NE1. Click Create SNCP Service and set the following parameters in the Create
SNCP Service dialog box:
l Service Type: SNCP
l Direction: Bidirectional
l Level: VC12
l Revertive Mode: Non-Revertive
l Source Slot for Working Service: 8-SL4D-1(SDH-1)
l Source for Working Service: VC4-1
l Source Timeslot Range(e.g.1,3-6) for Working Service: 1–8
l Source Slot for Protection Service: 8-SL4D-2(SDH-2)
l Source for Protection Service: VC4-1
l Source Timeslot Range(e.g.1,3-6) for Protection Service: 1–8
l Sink Slot: 9-SP3S
l Sink Timeslot Range(e.g. 1,3-6): 1–8
l Set the other parameters to the default values.
4. Select the Activate Immediately check box and click OK.
----End
Prerequisite
l The created protection subnet must be consistent with the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
Figure 3-3 shows the networking diagram.
NE1 NE2
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > M:N linear MSP from the
Main Menu.
Step 3 Set the following parameters in the Wizard for Creating M:N Linear MSP Chain:
l Name: 1:N_MSP_1
l Level: STM-4
Step 4 Double-click the NE1 and NE2 icons in turn in the topology view on the right to add them to
the protection subnet. Click Next.
Step 6 A dialog box is displayed indicating that the protection subnet is successfully created. Click
Close.
----End
Prerequisite
l The created protection subnet must be consistent with the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
Figure 3-4 shows the networking diagram.
NE1 NE2
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > 1+1 linear MSP from the
Main Menu. The Wizard for Creating 1+1 Linear MSP Chain window is displayed.
Step 2 Set the following parameters in the Wizard for Creating 1+1 Linear MSP Chain:
l Name: Linear 1+1_MSP_1
l Level: STM-4
l Revertive Mode: Non-Revertive
l Switching Mode: Single-Ended Switching
Step 3 Double-click the NE1 and NE2 icons in turn in the topology view on the right to add them to
the protection subnet. Click Next.
Step 4 Confirm the link information and click Finish.
Step 5 A dialog box is displayed indicating that the protection subnet is successfully created.
----End
Prerequisite
l The created protection subnet must be consistent with the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
Figure 3-5 shows the networking diagram. An SNCP service is added on an STM-4 two-fiber
bidirectional MSP ring. Hence, the SNCP service is provided with MSP and SNCP.
NE1 (A)
30 km
40 km
35 km
VC12:1-8
1#VC4 t9:1-8 t9:1-8
2#VC4
Add/Drop
Procedure
Step 1 For information on the configuration of an STM-4 two-fiber bidirectional MSP ring, see 2.13
Creating a Two-Fiber Bidirectional MSP Ring.
3. See Figure 3-6 and configure the SNCP services from NE1 to NE2 so that they are dually
fed from NE1. Click Create SNCP Service and set the following parameters in the Create
SNCP Service dialog box:
l Service Type: SNCP
l Direction: Bidirectional
l Level: VC12
l Hold-off Time(100 ms): 1
l Revertive Mode: Non-Revertive
l Source Slot for Working Service: 8-SL4D-1(SDH-1)
l Source for Working Service: VC4-1
l Source Timeslot Range(e.g.1,3-6) for Working Service: 1–8
l Source Slot for Protection Service: 8-SL4D-2(SDH-2)
l Source for Protection Service: VC4-1
l Source Timeslot Range(e.g.1,3-6) for Protection Service: 1–8
l Sink Slot: 9-SP3S
l Sink Timeslot Range(e.g. 1,3-6): 1–8
NOTE
In the case of fiber-shared virtual trail protection, set the hold-off time at the node that selectively
receives the SNCP service to 100 ms to prevent an SNCP switching when an MSP switching is
performed.
4. Select the Activate Immediately check box and click OK.
----End
Prerequisite
l The created protection subnet must be consistent with the actual topology.
l The NEs, boards, and fibers must be created on the T2000.
l You must be an NM user with "NE and network maintainer" authority or higher.
Background Information
Figure 3-7 shows the networking diagram.
NE1 NE2
Unprotected chain
Procedure
Step 1 Choose Protection Subnet > Create SDH Protection Subnet > NP Chain from the Main
Menu. Then, the Wizard for Creating Chain Without Protection is displayed.
Step 2 Set the following parameter in the Wizard for Creating Chain Without Protection:
l Name: NP_Chain_1
l Level: STM-4
Step 3 Double-click the NE1 and NE2 icons in turn in the topology view on the right to add them to
the protection subnet. Click Next.
----End
This topic describes how to configure Ethernet private line (EPL) services on the T2000.
l The two companies A and B at NE1 must transmit data services to NE3 through the MSTP
equipment.
l The services of companies A and B must be isolated completely.
l Company A requires a 10 Mbit/s bandwidth, and company B requires a 20 Mbit/s
bandwidth.
l Companies A and B must provide the 10M/100M autosensing Ethernet electrical interfaces
for the interconnection with the MSTP.
l Networking diagram
l Board information of each NE
l Service configuration diagram of each NE
l Timeslot allocation diagram
Networking Diagram
Figure 4-1 shows the Ethernet service networking and port allocation.
PORT1 PORT2
T2000
NE1
STM-4 two-fiber
NE2 bidirectional MSP ring
NE3
A B
PORT1 PORT1
A A
10M VCTRUNK1 SDH VCTRUNK1 10M
VC4-4:VC12-1~VC12-5 VC4-4:VC12-1~VC12-5
PORT2 PORT2
B B
20M VCTRUNK2 VCTRUNK2 20M
VC4-4:VC12-6~VC12-15 VC4-4:VC12-6~VC12-15
NE1 NE3
NOTE
l The ISU board integrates the SCC unit, cross-connect unit, clock unit, tributary unit, line unit, and data
transparent transmission unit. The Ethernet unit is displayed as the EFT8.
l On the EFT8, only VC4-4 can bind VC-12 paths and VC4-1 to VC4-4 can bind VC-3 paths.
l One VC-4 can be used to bind paths of only the VC-12 or VC-3 level.
Source NE NE1
Sink NE NE3
1~3#VC4
VC12:1-15
4#VC4
7-EFT8:VC4-4: 7-EFT8:VC4-4:
VC12:1-15 VC12:1-15
Add/Drop
Ethernet service can be created by using the trail function or by using the single station function. If you
purchase the license with trail management function, you can create Ethernet service by using the trail
function. Otherwise, you can only create Ethernet service by using the single station function.
Table 4-2 provides the process of creating point-to-point EPL service on the T2000.
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The license that supports the trial function must be available.
Procedure
Step 1 Choose Trail > Trunk Link Creation from the Main Menu.
Step 3 Click Browse. Select the source NE (NE1). Select the EFT8 board, select 1 for VCTRUNK
Port, and then select VC4:2-VC12(1)–VC4:2-VC12(5) for Available Timeslot. Click OK.
Step 4 Click Browse. Select the source NE (NE3). Select the EFT8 board, select 1 for VCTRUNK
Port, and then select VC4:2-VC12(1)–VC4:2-VC12(5) for Available Timeslot. Click OK.
Step 5 Select the Activate the trail check box, and adopt the default settings for other parameters.
Step 6 Click Apply to create the trunk link from NE1 to NE3 of user A.
Step 7 Repeat Steps 2–6 to create the trunk link from NE1 to NE3 of user B.
----End
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The license that supports the trial function must be available.
l The fibers and the protection subnet must be created.
l The trunk link must be created on the T2000.
l You must be an NM user with "NE and network operator" authority or higher.
Procedure
Step 1 Choose Trail > Ethernet Trail Creation > EPL Creation from the Main Menu.
Step 4 Select Use Existing Trunk Links for Trunk Link Route Strategy. Select Trunk_Link-0001
with a bandwidth of 5xVC12.
Step 5 Click Next. Set port attributes of NE1 and NE3 in the displayed interface:
l Port Enabled for PORT1: Enabled
l Enabling LCAS for VCTRUNK1: Enabled
Step 7 Repeat Steps 2–6 to create the EPL service from NE1 to NE3 of user B.
----End
l The two companies A and B at NE1 must transmit data services to NE3 through the MSTP
equipment.
l The services of companies A and B must be isolated completely.
l Company A requires a 10 Mbit/s bandwidth, and company B requires a 20 Mbit/s
bandwidth.
l Companies A and B must provide the 10M/100M autosensing Ethernet electrical interfaces
for the interconnection with the MSTP.
Networking Diagram
Figure 4-5 shows the Ethernet service networking and port allocation.
PORT1 PORT2
T2000
NE1
STM-4 two-fiber
NE2 bidirectional MSP ring
NE3
A B
PORT1 PORT1
A A
10M VCTRUNK1 SDH VCTRUNK1 10M
VC4-4:VC12-1~VC12-5 VC4-4:VC12-1~VC12-5
PORT2 PORT2
B B
20M VCTRUNK2 VCTRUNK2 20M
VC4-4:VC12-6~VC12-15 VC4-4:VC12-6~VC12-15
NE1 NE3
NOTE
l The ISU board integrates the SCC unit, cross-connect unit, clock unit, tributary unit, line unit, and data
transparent transmission unit. The Ethernet unit is displayed as the EFT8.
l On the EFT8, only VC4-4 can bind VC-12 paths and VC4-1 to VC4-4 can bind VC-3 paths.
l One VC-4 can be used to bind paths of only the VC-12 or VC-3 level.
Item A B
Source NE NE1
Sink NE NE3
Item A B
1~3#VC4
VC12:1-15
4#VC4
7-EFT8:VC4-4: 7-EFT8:VC4-4:
VC12:1-15 VC12:1-15
Add/Drop
This topic describes the procedures and precautions for configuring Ethernet services on the T2000. For
details, refer to the OptiX iManager T2000 Operation Guide for SDH.
Table 4-4 lists the procedures for configuring the point-to-point EPL service on the T2000.
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The fibers and the protection subnet must be created.
l You must be an NM user with "NE and network operator" authority or higher.
Procedure
Step 1 The Ethernet external ports must be configured.
1. Right-click the NE1 icon in the Main Topology, and choose NE Explorer.
2. Select 7-EFT8 from the Object Tree and choose Configuration > Ethernet Interface
Management > Ethernet Interface . Click .
3. Choose External Port > Basic Attributes and set the parameters of PORT1 and PORT2
as follows:
l Enabled/Disabled: Enabled
l Working Mode: Auto-Negotiation
l Maximum Frame Length: Set it according to the connected Ethernet equipment, and
adopt the default value of 1522 in normal cases.
l For other parameters, adopt the default values.
4. Click Apply.
3. Click the LCAS tab and set the attributes of VCTRUNK1 and VCTRUNK2:
l Enabling LCAS: Enabled
l For other parameters, adopt the default values.
NOTE
Ensure that the LCAS mode at the local NE is the same as the LCAS mode at the opposite NE.
l If the Huawei equipment is used at the local and the opposite stations, select Huawei Mode.
l If the Huawei equipment interconnects with the equipment from other vendors, select Standard
Mode for the equipment at the local and opposite ends.
l If the equipment from other vendors does not support Standard Mode, select Huawei Mode.
4. Click Apply.
Step 3 Configure bound paths as follows:
1. Click the Bound Path tab in the Internal Port page.
2. Click Configuration. Then, the Bound Path Configuration dialog box is displayed.
3. To set bound paths for VCTRUNK1, set the following parameters in the dialog box:
l Level: VC12-xv
l Service Direction: Bidirectional
l Available Resources: VC4-4
l Available Timeslots: VC12-1–VC12-5
4. Click .
5. To set a bound path for VCTRUNK2, set the following parameters in the dialog box:
l Level: VC12-xv
l Service Direction: Bidirectional
l Available Resources: VC4-4
l Available Timeslots: VC12-6–VC12-15
6. Click .
7. Click OK.
Step 4 Configure the cross-connections from the Ethernet boards to the SDH line boards.
1. Select NE1 from the Object Tree.
2. Choose Configuration > SDH Service Configuration from the Function Tree.
3. Click Create, and the Create SDH Service dialog box is displayed.
4. See Figure 4-8 and set the following parameters in the dialog box.
l Level: VC12
l Direction: Bidirectional
l Source Slot: 7-EFT8-1(SDH-1)
l Source VC4: VC4-4.
l Source Timeslot Range(e.g. 1,3-6): 1–15
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-4
l Sink Timeslot Range(e.g. 1,3-6): 1–15
l Activate Immediately: Yes
5. Click OK.
----End
Parameters
MAC Loopback Non-Loopback, Non-Loopback Sets the loopback state at the MAC
Inloop, Outloop layer.
PHY Loopback Non-Loopback, Non-Loopback Sets the loopback state at the PHY
Inloop layer.
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
Procedure
Step 1 Right-click the NE2 icon in the Main Topology, and choose NE Explorer.
Step 2 See Figure 4-8 and configure the service from NE1 to NE3 so that it passes through NE2: from
timeslots 1 to 15 of the forth VC-4 of the first optical port on the SL4D in slot 8 to timeslots 1
to 15 of the forth VC-4 of the second optical port on the SL4D in slot 8.
Step 3 Click Create. Set the following parameters in the Create SDH Service dialog box:
l Level: VC12
l Direction: Bidirectional
l Source Slot: 8-SL4D-1(SDH-1)
l Source VC4: VC4-4.
l Source Timeslot Range(e.g. 1,3-6): 1–15
l Sink Slot: 8-SL4D-2(SDH-2)
l Sink VC4: VC4-4
l Sink Timeslot Range(e.g. 1,3-6): 1–15
l Activate Immediately: Yes
----End
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The fibers and the protection subnet must be created.
l You must be an NM user with "NE and network operator" authority or higher.
Procedure
Step 1 Configure the Ethernet ports as follows:
1. Right-click the NE3 icon in the Main Topology, and choose NE Explorer.
2. Select 7-EFT8 from the Object Tree and choose Configuration > Ethernet Interface
Management > Ethernet Interface . Click .
3. Choose External Port > Basic Attributes and set the parameters of PORT1 and PORT2
as follows:
l Enabled/Disabled: Enabled
l Working Mode: Auto-Negotiation
l Maximum Frame Length: Set it according to the connected Ethernet equipment, and
adopt the default value of 1522 in normal cases.
l For other parameters, adopt the default values.
4. Click Apply.
5. Choose Internal Port > Encapsulation/Mapping and set the attributes of VCTRUNK1
and VCTRUNK2 as follows:
l Mapping Protocol: GFP
l For other parameters, adopt the default values.
6. Click Apply.
7. Click the LCAS tab and set the parameters as follows:
l Enabling LCAS: Enabled
l For other parameters, adopt the default values.
8. Click Apply.
4. Click .
5. To set a bound path for VCTRUNK2, set the following parameters in the dialog box:
l Configurable Ports: VCTRUNK2
l Level: VC12-xv
l Service Direction: Bidirectional
l Available Resources: VC4-4
l Available Timeslots: VC12-6–VC12-15
6. Click .
7. Click OK.
Step 3 Configure the cross-connections from the Ethernet boards to the SDH line boards.
1. Select NE3 from the Object Tree.
2. Choose Configuration > SDH Service Configuration from the Function Tree.
3. Click Create, and the Create SDH Service dialog box is displayed.
4. See Figure 4-8 and set the following parameters in the dialog box.
l Level: VC12
l Direction: Bidirectional
l Source Slot: 7-EFT8-1(SDH-1)
l Source VC4: VC4-4
l Source Timeslot Range(e.g. 1,3-6): 1–15
l Sink Slot: 8-SL4D-1(SDH-1)
l Sink VC4: VC4-4
l Sink Timeslot Range(e.g. 1,3-6): 1–15
l Activate Immediately: Yes
5. Click OK.
----End
The OptiX OSN 500 uses the RS232 broadcast data port (F2 port) to achieve universal
asynchronous receiver/transmitter (UART) full-duplex communication. The data is transmitted
transparently. Hence, you need not configure the port rate or the transmission control protocols.
The maximum bit rate can be 19.2 kbit/s. The OptiX OSN 500 uses overhead bytes (Serial1–
Serial4) as the broadcast data communication channel to broadcast the data that is received from
the data port to other NEs over the fiber.
5.1 Engineering Requirements
As described in Chapter 1, broadcast data services need to be added.
5.2 Engineering Planning
The overhead bytes, broadcast data source, and broadcast data sink should be determined
according to the service requirements.
5.3 Configuration Process
The broadcast data ports are used to access the collected monitoring data and report it to the NE
software. This topic describes how to configure broadcast data services on the T2000.
l The port must be of the RS-232 level, where logic 1 ranges from –5 V to –15 V and logic
0 ranges from +5 V to +15 V.
l The port must be of the RS-232 high level (about –9 V) when the data is not transmitted.
l Only one slave station must transmit the data to the master station at a time.
Prerequisite
l The engineering planning operations must be complete.
l You must be an NM user with "NE and network operator" authority or higher.
Precautions
CAUTION
The broadcast data ports should not form a loop.
Procedure
Step 1 Right-click the NE1 icon in the Main Topology, and choose NE Explorer.
Step 2 Select NE1 from the Object Tree and choose Configuration > Orderwire from the Function
Tree.
Step 3 Set the following parameters in the Broadcast Data Port tab:
l Overhead Byte: SERIAL3
l Working Mode: RS232
l Broadcast Data Source: SERIAL3
l Broadcast Data Sink: 8-SL4D-1 and 8-SL4D-2
NOTE
Step 5 Refer to Table 5-1 and configure the broadcast data services of NE2 and NE3 in the same manner.
----End
6 Configuring LPT
The link state pass through (LPT) function can be used to detect and report the faults that occur
in the service access point and the intermediate transmission network. It notifies the equipment
at the two ends in the transmission network of starting the backup network immediately, thus
ensuring normal transmission of important data.
6.1 Overview
This topic describes the basic concepts related to LPT.
6.2 Application
LPT is a link-based protection mode. The LPT information is provided for data communication
equipment such as routers that are interconnected with the transmission equipment.
6.3 Configuring the Point-to-Point LPT Function
The point-to-point (P2P) LPT function is applicable to the P2P services. When the access link
or the transmission network is faulty, the P2P LPT function ensures that the equipment at the
two ends starts the backup network in time to ensure normal communication.
6.1 Overview
This topic describes the basic concepts related to LPT.
Primitive
In the No. 7 signaling structure, when a higher layer requests service from a lower layer or when
a lower layer provides service to a higher layer, the service user needs to communicate with the
service provider. The signaling data communicated between two adjacent layers is known as the
primitive.
Pass-Through
"Pass-through" refers to the action of receiving the information that is transmitted as it is, in the
specific transmission direction.
Bearer Mode
"Bearer mode" refers to the trail on which the LPT protocol packets are transmitted. Different
bearer modes are used for transmitting different LPT protocol packets. If the bearer mode of the
received LPT protocol packets is inconsistent with the bearer mode at the receive end of the
equipment, the LPT protocol packets will be discarded.
6.2 Application
LPT is a link-based protection mode. The LPT information is provided for data communication
equipment such as routers that are interconnected with the transmission equipment.
The Ethernet services of the OptiX OSN 500 support point-to-point LPT, which is used to
monitor the faults that occur in the access link of the point-to-point EPL services or in the service
network.
1. After service equipment A detects a fault in the access link, it reports the alarm to inform
that the local access point is faulty and sends the Broken control frame to service equipment
B.
2. After service equipment B receives the Broken control frame, it deactivates the local link
and reports the LPT_RFI alarm.
l Restoring the link
1. After service equipment A detects that the fault in the access link is rectified, it sends the
Non_Broken control frame to service equipment B.
2. After service equipment B receives the Non_Broken control frame, it activates the local
link again.
Broken Broken
Service Service Service Access
Access
equipment equipment node 2
node 1
A
network A
Service equipment A and B can detect whether the service network is available. If the service
network is unavailable, service equipment A and B sends the Broken primitive to each other and
disconnects the connection from the local users.
NOTE
Regardless of whether a unidirectional or bidirectional fault occurs in the service network, the LPT function
can be implemented.
l If a bidirectional fault occurs in the service network, service equipment A and B can detect the fault,
and thus determines to disconnect the connection between the local end and the users and then sends
the Broken primitive to the opposite end.
l If a unidirectional fault occurs in the service network, for example, if the fault occurs in the B–>A
direction, only service equipment A can detects the fault. In this case, service equipment A disconnects
the connection between the local end and the access node 1, and uses the service network in the A–>B
direction where no fault occurs to send the Broken primitive to service equipment B. After service
equipment B receives the Broken primitive, it disconnects the connection between the local end and
the access node 2, thus to complete the fault locating process.
l Restoring the service network
Non_Broken Non_Broken
Service Service Service
Access Access
equipment equipment
node 1
A
network node 2
B
After detecting that the service network is restored, service equipment A and B sends the Non-
Broken primitive to each other to inform the opposite end that the link is restored, and restores
the connection between the local end and the local users immediately.
If service equipment A and B receives the Non_Broken primitive from each other or if the waiting
time before the Broken frame is received times out, service equipment A and B determines that
the entire link is normal and thus restores the local link of the service equipment.
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The specified port must be configured with the P2P EPL services.
l You must be an NM user with "NE and network operator" authority or higher.
Precaution
CAUTION
Before you enable the LPT function, set the mapping protocol of the VCTRUNK port to GFP.
Otherwise, the LPT function fails to be enabled.
Procedure
Step 1 Right-click the NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select the relevant Ethernet data board, and then choose Configuration > Ethernet Interface
Management > LPT Management from the Function Tree. Then, click .
Step 3 Click Query. A dialog box is displayed indicating that the operation is successful. Click
Close.
Step 4 Select PORT1 and VCTRUNK port, and then set LPT to Yes. For the parameters of the P2P
LPT, refer to Table 6-1.
Step 5 Click Apply. A dialog box is displayed, indicating that the operation is successful. Click
Close.
Step 6 Repeat Steps 1–5 to set LPT to Yes for the opposite NE in the network.
----End
Parameters
7 Configuring LCAS
The link capacity adjustment scheme (LCAS) is a technology that is applied to virtual
concatenation and enhances the performance of virtual concatenation. It can dynamically adjust
the number of virtual containers that map the required services to meet different requirements
for service bandwidth. As a result, the bandwidth utilization is increased, and the Ethernet
services are protected.
7.1 Overview
LCAS is supplementary to the virtual concatenation technology. LCAS dynamically adjusts the
number of virtual containers required for service mapping, to meet the requirements of various
service bandwidths. Thus, LCAS improves the bandwidth utilization and enhances the
robustness of virtual concatenation.
7.2 Application
The LCAS function can be used to dynamically adjust the bandwidth and protect virtual
concatenated services, thus improving the robustness and flexibility of the network.
7.3 Enabling LCAS
When you need to adjust the bandwidth or of a VCTRUNK or the Ethernet services need to be
protected, configure the LCAS function.
7.1 Overview
LCAS is supplementary to the virtual concatenation technology. LCAS dynamically adjusts the
number of virtual containers required for service mapping, to meet the requirements of various
service bandwidths. Thus, LCAS improves the bandwidth utilization and enhances the
robustness of virtual concatenation.
LCAS applies only to the virtually concatenated paths.
When the LCAS function is used in the network, the following advantages can be achieved:
l The availability of the original services is not affected when the service bandwidth is
dynamically adjusted (added or deleted).
l If failed physical paths exist in the virtual concatenation, the LCAS function can shield the
failed paths. In this case, the other paths can still transmit the services normally, thus
preventing service interruption due to failure of certain physical paths. After the failed
physical paths are restored, they can be used to transport services again.
7.2 Application
The LCAS function can be used to dynamically adjust the bandwidth and protect virtual
concatenated services, thus improving the robustness and flexibility of the network.
MSTP network
Add a 10 Mbit/s
bandwidth
Member
Branch Member
Headquarters
Member
Member
Branch Headquarters
New member
MSTP
MSTP network
Member
Member
Branch Headquarters
Failed member
Member
Branch Member
Headquarters
Delete the failed member
MSTP
As shown in the preceding figure, assume that in the normal state, a VCTRUNK maps three
VC-12 virtual concatenations and the bandwidth of the services is 6 Mbit/s. When one channel
in VC12-3v fails, LCAS suppresses this failed member and adjusts the capacity of the
VCTRUNK. In this case, the bit rate of the services decreases and the system reports an alarm
to inform the loss of partial bandwidth. The services of the entire VCTRUNK, however, are not
interrupted.
After the failed member is restored, LCAS reuses the restored member to transmit data and the
bandwidth of the services is restored to 6 Mbit/s.
Prerequisite
l The Ethernet boards must be created correctly on the T2000.
l The Ethernet services must be successfully created.
l You must be an NM user with "NE or network operator" authority or higher.
Background Information
l The configuration that complies with the LCAS protocol should meet the following two
requirements:
– The configured services must be bidirectional services that adopt virtual concatenation.
– The networking topology should be of the point-to-point mode.
l When configuring the LCAS function, you must set the LCAS parameters to the same
values for the equipment at .
– The LCAS enable/disable attribute of the equipment at must be the same.
– The equipment at must be set to the same LCAS mode.
Procedure
Step 1 Right-click the NE icon in the Main Topology, and choose NE Explorer.
Step 2 Select the relevant Ethernet data board, and then choose Configuration > Ethernet Interface
Management > Ethernet Interface .
Step 3 Click the LCAS tab, and then set the parameters for the VCTRUNK port. For the LCAS
parameters, refer to Table 7-1.
Step 4 Click Apply. A dialog box is displayed, indicating that the operation is successful.
----End
Parameters
LCAS Mode Huawei Mode, Huawei Mode To use the LCAS function, you
Standard Mode must set the equipment at to the
same LCAS mode.
l If the equipment at is Huawei
equipment, set LCAS Mode for
the equipment at to Huawei
Mode.
l If the Huawei equipment is
interconnected with the third-
party equipment, set LCAS
Mode for the equipment at to
Standard Mode.
l If the Huawei equipment is
interconnected with the third-
party equipment that does not
support the standard mode, set
LCAS Mode for the equipment
at to Huawei Mode.
WTR Time(s) 0–720 300 The WTR time refers to the time for
the timeslot to wait to be added to
the virtual concatenation group
after the timeslot suppressed by the
LCAS is restored to normal.
Set the WTR time to the default
value, unless otherwise specified.
A Glossary
A
Administr A user who has authority to access all the Management Domains of the
ator EMLCore product. He has access to the entire network and to all the
management functionalities.
Alarm A visible or an audible indication to notify the person concerned that a failure
or an emergency has occurred.
ALS Automatic Laser Shutdown. Laser automatic shutdown means laser automatic
shutdown is permitted when the optical interface board does not bear services
or the optical fiber is faulty. Its life can be prolonged by decreasing the on time
of the laser.
Auto- The rate/work mode of the communication party set to self-negotiation is
Negotiatio specified through negotiation according to the transmission rate of the opposite
n party.
B
Backup A method to save the data to prevent damage to the original data.
Binding In virtual concatenated payload configuration, to specify one binding number
to identify the VC-4s of the same virtual concatenated payload. If a fault occurs
on one of the bound services, all bound services will switch as a whole.
BITS Building Integrated Timing Supply System. A building timing supply that
minimizes the number of synchronization links entering an office. Also referred
to as a synchronization supply unit.
Bound Also referred to as VCTRUNK. The 2 Mbit/s paths are bound together to
Path transmit Ethernet data. The VCTRUNK is an entity between the Ethernet port
and the 2 Mbit/s path.
Broadcast The act of sending a frame addressed to all stations on the network
Clock The method to maintain the time on each node so that they are synchronized
Tracing with a clock source in a network.
Configurat Configuration management enables inventory query of network configuration
ion resources, including relevant configuration of NMS or SNMS, NE, subnet,
Manageme links, SNC, route, TP, edge point, equipment, and so on. Real-time inventory
nt change report can also be provided through this resource, it will be timely
reported to the upper NMS to notify the carrier of the current network operation
status and ensure data consistency of the upper NMSs.
F
Failure A condition in which a fault persists in a component for a specific period of
time and thus this component is considered as unable to implement its basic
functions. In a failed component, a fault should be detected.
G
GNE Gateway NE (GNE) refers to the NE that communicates with the T2000 through
Ethernet or serial port cable. The non-gateway NE communicates with the
gateway NE through ECC and communicates with the T2000 through the
gateway NE. The GNE is the necessary communication route for the T2000 to
manage the entire network.
L
Layer A concept used to allow the transport network functionality to be described
hierarchically as successive levels; each layer being solely concerned with the
generation and transfer of its characteristic information.
Loopback The fault of each path on the optical fiber can be located by setting loopback
for each path of the line. There are three kinds of loopback modes: No loopback,
Outloop, Inloop.
M
Main The default T2000 client interface, a basic component of the human-machine
Topology interactive interface. The topology clearly shows the structure of the network,
the alarms of different NEs, subnets in the network, the communication status
as well as the basic network operation status. All topology management
functions are accessed here.
Mapping A procedure by which tributaries are adapted into virtual containers at the
boundary of an SDH network.
MSP Multiplex Section Protection. The MSP function provides the capability for
switching a signal from a working section to a protection section.
Multiplexi A procedure by which multiple lower order path layer signals are adapted into
ng a higher order path or the multiple higher order path layer signals are adapted
into a multiplex section.
P
Pass- The action of transmitting by a node exactly what is received by that node for
Through any given direction of transmission. A pass-through can be unidirectional or
bidirectional. For BLSRs, a pass-through refers to the K1 and the K2 bytes and
the protection channels. Three types of pass-throughs are used in BLSRs: K
byte passthrough, unidirectional full pass-through, and bidirectional full pass-
through.
Path A transmission entity to transmit information from the source end to the sink
end, providing monitoring all the way.
Protection A topology-based interface in the T2000. In the Protection Subnet, you can:
Subnet 1. Search, view, create, set and manage protection subnets. 2. Manage isolated
nodes and SDH NNIs. See also Trail View, Clock View.
R
Regenerati The process of receiving and reconstructing a digital signal so that the
on amplitudes, waveforms and timing of its signal elements are constrained within
specified limits.
Route The path a trail takes.
S
SDH NNI SDH Network Node Interface. It is applied to build communications connection
with the equipment beyond the T2000 management area. Generally, the NM
creates an SDH NNI by creating a logical system on the port of an idle line
board, and the NE must be a TM without protection and fiber connection.
Section A trail in the segment layer.
SNCP Sub-Network Connection Protection. If the working subnet fails to be
connected or if its performance is inferior to the required level, the connection
of the working subnet is taken over by that of the protection subnet.
Subnet The logical entity in the transmission network and comprises a group of network
management objects. A subnet can contain NEs and other subnets. A subnet
planning can enhance the organization of a network view.
T
TCP/IP Transmission Control Protocol/Internet Protocol. Common name for the suite
of protocols developed to support the construction of worldwide internetworks.
V
VC-4 The path rate of the VC-4 server trail is 150. 336 Mbit/s. The VC-4 server trail
Server provides transparent channels (circuit group) for circuit-layer network nodes
Trail (such as a switch) in a path-layer network, and acts as the basic unit of inter-
office communication path. When the VC-4 server trail is configured, only the
higher order cross-connection of VC-4 is generated in the intermediate NE, but
no cross-connection is generated at the two ends, that is, no service is added/
dropped. Therefore, the VC-4 server trail is not a traditional service. It is only
the basis for VC-3 and VC-12 trail creation.
Virtual The payload whose transmission bandwidth is larger than VC-4. Virtual
Concatena concatenation combines multiple VC-4 payloads (successive or non-
tion successive) to form a virtual large structure VC4-Xv in cascade mode for
transmission. The transmission of the broadband cascaded payload is
implemented through the virtual concatenation, thus improving the SDH
transmission payload bandwidth capability from VC-4 to VC4-4C.
Virtual The information structure used to support path layer connections in the SDH.
Container It consists of information payload, and path overhead (POH) information fields
organized in a block frame structure which repeats every 125 or 500
microseconds.
W
WTR Wait to Restore. This command is issued when working channels meet the
restoral threshold after an SD or SF condition. It is used to maintain the state
during the WTR period unless it is pre-empted by a higher priority bridge
request.
WTR Time A period of time that must elapse before a – from a fault recovered – trail/
connection can be used again to transport the normal traffic signal and/or to
select the normal traffic signal from.
A
ADM Add/Drop Multiplexer
APS Automatic Protection Switch
B
BITS Building Integrated Timing Supply
D
DCC Data Communication Channel
E
ECC Embedded Control Channel
EPL Ethernet Private Line
G
GFP Generic Framing Procedure
H
HDLC High level Data Link Control
IEEE Institute of Electrical and Electronics Engineers
L
LAPS Link Access Procedure-SDH
LCAS Link Capacity Adjustment Scheme
M
MSP Multiplex Section Protection
N
NM Network Management
O
OAM Operation Administration and Maintenance
P
PDH Plesiochronous Digital Hierarchy
S
SNCP Sub-Network Connection Protection
SSM Synchronization Status Marker
Index
startingT2000computer, 1-3
system monitor, 1-4
T
T2000 client
exiting, 1-5
login, 1-4
T2000 main topology
main topology, 1-8
T2000 main window
clock view, 1-9
NE Explorer, 1-8
trail view, 1-8
T2000 server
running status, 1-4
shutdown, 1-6
starting, 1-3
topology subnet creation, 2-19
V
VC-12 trail creation, 2-25
VC-4 server trail creation, 2-24