Professional Documents
Culture Documents
Huawei Imanager U2000 Web LCT V200R018C60 User Guide 03
Huawei Imanager U2000 Web LCT V200R018C60 User Guide 03
V200R018C60
User Guide
Issue 03
Date 2019-09-02
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Related Version
The following table lists the product version related to this document.
Intended Audience
The iManager U2000 Web LCT User Guide describes how to install and start the iManager
U2000 Web LCT (Web LCT) , and also describes the features and functions of the Web LCT.
This document guides the user to understand basic operations of the U2000 Web LCT.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Contents
2 Product Description.................................................................................................................... 27
2.1 System Overview..........................................................................................................................................................27
2.1.1 Network Position....................................................................................................................................................... 27
2.1.2 Function Comparison Between U2000 Web LCT and U2000 LCT..........................................................................28
2.1.3 Manageable Equipment............................................................................................................................................. 29
2.1.3.1 MSTP Series Equipment........................................................................................................................................ 29
4 Creating NEs...............................................................................................................................139
4.1 Creating NEs Through NE Search..............................................................................................................................139
4.2 Creating NEs Manually.............................................................................................................................................. 142
B Glossary...................................................................................................................................... 163
1 Installation Guide
This chapter describes how to install the U2000 Web LCT on the Windows operating systems.
Hardware Requirements
Memory 4 GB 4 GB
Software Requirements
OS l Recommended: Windows 10
Professional (64-bit)
l Compatible: Windows 10 Professional
(32-bit)
l Recommended: Windows 7 Professional
(64-bit)
l Compatible: Windows 7 Professional
(32-bit)
Item Requirement
NOTE
The U2000 Web LCT can be installed only on the simplified Chinese and English editions of Windows
OS.
In Windows, it is advisable to install the antivirus software and update it in time. The Trend OfficeScan
antivirus software is preferred.
The U2000 Web LCT uses port 13443 by default. Ensure that these ports are not occupied by other
programs or blocked by firewalls.
NOTE
Version indicates the detailed version number of the U2000 Web LCT.
Context
l Each software package corresponds to a signature file. They are placed in the same
directory and released together.
l Signature files are in the .asc format and share names with software packages. If a
package is U2000LCTxxxxxx.zip, its signature file will be U2000LCTxxxxxx.zip.asc.
l PGPVerify is a digital signature verification tool released by Huawei. Users can choose
third-party verification tools as needed.
Tool OS Tool Description
Procedure
Step 1 Visit the PGPVerify tool.
l For carrier: visit http://support.huawei.com/carrier/digitalSignatureAction.
l For enterprise: visit http://support.huawei.com/enterprise/en/tool/software-digital-
signature-validation-tool-(pgp-verify)-http://support.huawei.com/enterprise/en/tool/
software-digital-signature-validation-tool--pgp-verify--TL1000000054.
Step 2 Download the OpenPGP Signature Verification Guide package and public key file KEYS.
Step 3 Decompress the package. Decompress the resulting VerificationTools.zip to obtain the
PGPVerify tool whose name varies according to the OS, as follows:
l Windows: PGPVerify.exe
l Solaris: PGPVerify-sparc.tar.bz2
l Linux: PGPVerify-x86_64.tar.gz
Step 4 Verify software packages.
Windows supports GUI-based verification and CLI-based verification.
l GUI-based verification on Windows OS:
a. Double-click PGPVerify.exe to start PGPVerify.
b. Click Select Public Key, select the obtained public key file KEYS, and load it.
c. Click Multiple Verify and select the C:\PGP directory to verify all files in it.
NOTE
n This step assumes that signature files and software packages are stored in C:\PGP.
n To verify a single file, click Single Verify and select the file to be verified.
The verification result may be one of the following:
n Green: PASS
n Yellow: WARN (For example, the signature file or software version does not
exist.)
n Red: FAIL
If no "WARN" or "FAIL" result appears, the signature file is valid.
If a version has multiple signature files to be verified, the version is secure only
when the verification results of all files are "PASS". If any verification result is
"WARN" or "FAIL", re-download the software package.
NOTE
– This step assumes that signature files and software packages are stored in C:\PGP and that the
PGPVerify tool and the KEYS file are stored in C:\ directory.
– To verify a single file, run the C:\PGPVerify.exe" -k "C:\KEYS" -f "C:
\V200R015C50.zip.asc command.
NOTE
In the preceding characters, the bold Rivest-Shamir-Adleman (RSA) key ID is consistent with the
public key ID. For a certain file, if no "WARN" or "FAIL" result appears, the signature file is
valid.
If a version has multiple signature files to be verified, the version is secure only when the
verification results of all files are "PASS". If any verification result is "WARN" or
"FAIL", re-download the software package.
----End
Procedure
Step 1 Log in to the OS as an administrator.
Step 2 Check that the Windows OS and related patches have been installed. For details, see section
1.1.1 Hardware and Software Requirements.
Step 3 Check that disk C and the disk to which the U2000 Web LCT will be installed both have more
than 10 GB free space.
Step 4 Check that the current language for non-Unicode programs is English (United States).
----End
Prerequisites
l The Windows OS and related patches have been installed. For details about the OS and
patches, see section 1.1.1 Hardware and Software Requirements.
Procedure
Step 1 Log in to the OS as an administrator.
Step 2 To use a green version of U2000 Web LCT, obtain the green installation package
U2000WebLCTversion_en_win32_x86.zip. For example, if you are using WinRAR, select
the package, right-click and choose Extract Here from the shortcut menu.
Step 3 Optional: To keep the U2000 Web LCT secure, you can set the U2000 Web LCT installation
directory to be read-only. As the U2000 Web LCT needs to write some files during running,
you need to specify another directory and deploy the environment variable
U2000_DATA_ROOT.
1. Create a directory (for example, C:\data_weblct) that is writable when the U2000 Web
LCT is running.
NOTE
This directory must not be the one to which the U2000 Web LCT software package is
decompressed.
2. Right-click Computer and choose Properties from the shortcut menu.
3. Click Advanced system setting and click the Advanced tab.
4. Click Environment Variables. In the dialog box that is displayed, add the environment
variable U2000_DATA_ROOT and change its value to the directory specified in Step
3.1.
5. Follow instructions provided in 1.3 (Optional) Configuring Script Parameters in the
U2000 Web LCT Read and Write Permission Environment to modify related
parameters in the U2000 Web LCT read and write permission environment.
NOTE
If the U2000_DATA_ROOT environment variable has been deployed on the U2000 Web LCT, clicking
Print in some windows will open a dialog box where you can select the desired files to print.
----End
NOTE
Skip this topic if you do not need to deploy a read and write permission environment.
Procedure
Step 1 After the U2000 Web LCT installation is complete, go to the directory containing the file that
starts the U2000 Web LCT, as shown in Figure 1-1.
data_weblct is the folder you need the write permission for U2000 Web LCT. Be sure to enter the
double quotation marks. Do not enter an absolute path.
----End
Procedure
Step 1 After the U2000 Web LCT installation is complete, go to the directory containing the file that
shuts down the U2000 Web LCT, as shown in Figure 1-4.
data_weblct is the folder you need the write permission for U2000 Web LCT. Be sure to enter the
double quotation marks. Do not enter an absolute path.
----End
Procedure
Step 1 Rename the U2000 Web LCT installation directory program_weblct, as shown in Figure
1-7.
NOTE
program_weblct is read-only. It stores read-only files that are required for running the U2000 Web
LCT.
----End
Procedure
Step 1 Open the C:\program_weblct\weblct\dc\server\etc\conf\setting.cfg file to modify the path
to server logs. Add the following contents to the file, as shown in Figure 1-8.
[TraceDir]CRLF
tracedir=c:\data_weblct\dc\server\var\log
NOTE
data_weblct is the folder you need the write permission for U2000 Web LCT.
data_weblct is the folder you need the write permission for U2000 Web LCT.
----End
Procedure
Step 1 Open the C:\program_weblct\weblct\conf\bundles.info file to modify com.huawei.vmf.res,
4 to c:\data_weblct\weblct\plugins\com.huawei.vmf.res,4, as shown in Figure 1-10.
NOTE
data_weblct is the folder you need the write permission for U2000 Web LCT.
----End
Procedure
Step 1 Right-click program_weblct and choose Properties from the shortcut menu.
Step 2 In the dialog box that is displayed, select the Read-only (Only applies to files in folder)
check box, as shown in Figure 1-11.
Step 4 In the dialog box that is displayed, click the Apply changes to this folder, subfolders and
files option button, as shown in Figure 1-12.
----End
Procedure
Step 1 Go to C:\program_weblct (which is read-only).
Step 2 Double-click startweblct.bat script. The CLI pops up, indicating that some files are copied to
a writable directory.
Step 3 Check the folders parallel to program_weblct. You can find that the writable folder
data_weblct has been created.
NOTE
By default, NE Software Management saves NE backup files to drive D. Perform the following steps to
change the path to C:\data_weblct.
1. Log in to the U2000 Web LCT.
2. Click the Start DC icon in the upper right corner and log in to NE Software Management.
4. In the FTP Settings dialog box, click the File Transfer Service Settings tab. File Transfer Service
Root Directory is set to D: by default.
5. Change the value of File Transfer Service Root Directory to C:\data_weblct. Then NE backup
files will be generated in C:\data_weblct.
----End
Procedure
Step 1 Right-click and choose Apps and Features from the shortcut menu. Then choose Default
apps.
----End
Context
The U2000 Web LCT support IE browser compatibility view, if no browser compatibility
view is configured, GUIs of the U2000 Web LCT may not be displayed properly. You must
configure a browser compatibility view before using the U2000 Web LCT.
Procedure
Step 1 In the toolbar of Internet Explorer, choose Tools > Compatibility View Settings.
The Compatibility View Settings dialog box is displayed.
Step 2 In the Compatibility View Settings dialog box, add localhost to Compatibility Views and
select Display intranet sites in Compatibility View check box. See Figure 1-14.
----End
Procedure
Step 1 Double-click the Internet Explorer shortcut icon on the desktop.
Step 2 Choose Tools > Internet Options from the main menu.
Step 3 In the Internet Options dialog box, click the Security tab and click Default Level
Step 4 Optional: If the security level of Internet Explorer is set to High, change it to Medium-high
or Medium.
Adjust the security level in the Security level for this zone area and click Apply.
Step 5 In the Internet Options dialog box , select the Local Intranet and click Custom level.
Step 6 In the Security Settings - Local Intranet Zone dialog box, select the Initialize and script
ActiveX controls not marked as safe for scripting para and check Enable. Click OK.
Step 7 In the Internet Options dialog box , select the Trusted sites and click Custom level.
Step 8 In the Security Settings - Trusted Sites Zone dialog box, select the Initialize and script
ActiveX controls not marked as safe for scripting para and check Enable. Click OK.
Step 9 In the Internet Options dialog box, click OK.
----End
Context
Security certificates need to be installed only at the first startup of the U2000 Web LCT.
Procedure
Step 1 Double-click the Decompression directory\WebLCT\startweblct.bat script to start the
U2000 Web LCT.
The There is a problem with this website's security certificate message is displayed.
Step 2 Click Continue to this website (not recommended).
The USER LOGIN dialog box is displayed.
Step 3 Click Certificate Error and View certificates.
Step 4 In the Certificate dialog box, click the Certification Path tab.
Step 5 On the Certification Path tab, select huaweiossCA and click View Certificate.
Step 6 Click Install Certificate.
Step 7 In the Certificate Import Wizard, click Next.
Step 8 Optional: Click Local Machine in Store Location area and click Next.
NOTE
This operation is required only in Windows 10.
Step 9 In the Certificate Store dialog box, select Place all certificate in the following store and
click Browse.
The Select Certificate Store dialog box is displayed.
Step 12 In the Completing the Certificate Import Wizard dialog box, click Finish.
Step 15 Choose Tools > Internet Options from the main menu.
Step 16 In the Internet Options dialog box, click the Advanced tab.
Step 17 On the Advanced tab, clear the selection of the Warn about certificate address mismatch
check box.
----End
Installation Method
Prerequisites
The U2000 Web LCT must have been shut down.
Procedure
Step 1 Double-click decompression directory\WebLCT\stopweblct.bat, stop the U2000 Web LCT
service.
Step 2 Delete the decompression directory of the U2000 Web LCT.
----End
2 Product Description
The U2000 Web LCT is an NE-layer management system for the transport network. It is able
to manage the following NEs: OSN 9560, NG WDM, NG WDM (NA), RTN and submarine
NEs.
2.1 System Overview
This section describes the position, functions, and manageable NEs of the U2000 Web LCT.
2.2 Features and Functions
This section describes the NE management features and functions provided by the U2000
Web LCT.
The U2000 Web LCT manages a maximum of 32 NEs. The U2000 Web LCT accesses local
NEs through local area networks (LANs) or serial ports and accesses remote NEs through
data communications channels (DCCs). The U2000 Web LCT can be integrated into the
U2000.
Data Management
The U2000 Web LCT does not have its own database. All operations take effect directly on
NEs. Therefore, the U2000 Web LCT does not allow users to preconfigure NEs, upload or
download NE data, and acknowledge and synchronize alarms.
Manageable Equipment
The U2000 Web LCT is able to manage:
l OptiX OSN 9560
l NG WDM series NEs
l RTN series NEs
l NG WDM (NA) series NEs
l Submarine series NEs
GUI Style
The U2000 Web LCT uses the browser/server architecture. That is, it is Web-based and users
can access it from a browser for configuring and maintaining NEs.
Data Management
The U2000 Web LCT does not have its own database. All operations take effect directly on
NEs. Therefore, the U2000 Web LCT does not allow users to preconfigure NEs, upload or
download NE data, and acknowledge and synchronize alarms.
NOTE
Rules for defining commercial versions of NE software: a.bb.cc.dd. "a" indicates the NE platform
version. Currently, 4, 5 and 8 are supported. "bb" indicates the product name. "cc" indicates the R
version of the product. To be specific, 01 represents R001, 02 represents R002, and so on. "dd" indicates
the C version of the product. Mapping principle:
1. If the mapping table provides only the information that a.bb.cc.20 is supported by version A of the
U2000 Web LCT, a.bb.cc.2x is supported by version A of the U2000 Web LCT.
2. If the mapping table provides only the information that a.bb.cc is supported by version A of
theU2000 Web LCT, a.bb.cc.xx is supported by version A of the U2000 Web LCT.
5.153.07.31(F1SCC) V200R017C50
(V100R007C10)
5.141.07.31(F3SCC) V200R017C50
(V100R007C10)
5.153.07.11(F1SCC) V200R016C60
(V100R007C00)
5.141.07.11(F3SCC) V200R016C60
(V100R007C00)
5.67.03.88~5.67.03.89 V200R016C50
(F1SCC)
5.141.06.31(F3SCC) V200R016C50
(V100R006C20)
5.67.03.86~5.67.03.87 V200R015C60
(F1SCC)
5.141.06.21(F3SCC) V200R015C60
(V100R006C10)
5.67.03.20~5.67.03.90 V200R015C50
(F1SCC) (V100R006C00)
5.141.06.11(F3SCC) V200R015C50
(V100R006C00)
5.67.03.20~5.67.03.90 V200R014C60
(F1SCC) (V100R005C20)
5.141.05.11(F3SCC) V200R014C60
(V100R005C20)
5.67.03.20~5.67.03.90 V200R001C00
(V100R005C00)
5.174.6.80 V200R018C60
(V100R007C00SPC600)
5.174.06.60 V200R018C60
(V100R007C00)
5.172.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.172.06.30 V200R018C50
(V100R006C10)
5.172.06.10 V200R017C60
(V100R006C00)
5.172.06.10 V200R017C50
(V100R006C00)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.111.01.60 V200R001C00
(V100R001C20)
5.111.01.30 V100R009C00
(V100R001C01)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.111.01.60 V200R001C00
(V100R001C20)
5.111.01.30 V100R009C00
(V100R001C01)
5.174.6.80 V200R018C60
(V100R007C00SPC600)
5.174.06.60 V200R018C60
(V100R007C00)
5.172.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.172.06.30 V200R018C50
(V100R006C10)
5.172.06.10 V200R017C60
(V100R006C00)
5.172.06.10 V200R017C50
(V100R006C00)
5.200.06.30 V200R018C50
(V100R006C10)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.111.01.60 V200R001C00
(V100R001C20)
5.111.01.30 V100R009C00
(V100R001C01)
5.171.06.80 V200R018C60
(V100R007C00SPC600
UTS)
5.111.06.82 V200R018C60
(V100R007C00SPC700
VRP)
5.111.05.30 V200R017C50
(V100R005C10)
5.111.05.10 V200R017C50
(V100R005C00)
5.111.03.50 V200R017C50
(V100R003C10)
5.111.03.30 V200R017C50
(V100R003C10)
5.111.03.10 V200R017C50
(V100R003C00)
5.111.02.30 V200R017C50
(V100R002C10)
5.111.01.80 V200R017C50
(V100R001C30)
5.111.01.60 V200R001C00
(V100R001C20)
5.111.01.30 V100R009C00
(V100R001C01)
5.67.03.40 (V100R003C03) -
5.67.03.30 (V100R003C02) -
5.67.03.20~5.67.03.90 -
(V100R005C00)
5.67.03.20 (V100R003C01) -
5.67.03.10 (V100R003C00) -
5.67.02.10 (V100R002C00) -
5.70.01.20 (V100R001C01) -
5.70.01.19 (V100R001C01) -
5.51.10.30 (V100R009C10) -
5.51.10.10 (V100R009C00) -
5.51.09.30 (V100R008C10) -
5.51.09.10 (V100R008C00) -
5.51.08.30 (V100R007C02) -
5.51.08.10 (V100R007C00) -
5.51.07.60 (V100R006C03) -
5.51.07.30 (V100R006C01) -
5.51.07.10 (V100R006C00) -
5.51.06.10 (V100R005C00) -
5.71.01.20 (V100R001C01) -
5.71.01.19 (V100R001C01) -
5.51.10.30 (V100R009C10) -
5.51.10.10 (V100R009C00) -
5.51.09.30 (V100R008C10) -
5.51.09.10 (V100R008C00) -
5.51.08.30 (V100R007C02) -
5.51.08.10 (V100R007C00) -
5.51.07.60 (V100R006C03) -
5.51.07.30 (V100R006C01) -
5.51.07.10 (V100R006C00) -
5.51.06.10 (V100R005C00) -
5.51.10.10 (V100R009C00) -
5.51.09.30 (V100R008C10) -
5.51.09.10 (V100R008C00) -
5.51.08.30 (V100R007C02) -
5.51.08.10 (V100R007C00) -
5.51.07.60 (V100R006C03) -
5.51.07.30 (V100R006C01) -
5.51.07.10 (V100R006C00) -
5.51.10.10 (V100R009C00) -
5.51.09.30 (V100R008C10) -
5.51.09.10 (V100R008C00) -
5.51.08.30 (V100R007C02) -
5.51.08.10 (V100R007C00) -
5.51.07.60 (V100R006C03) -
5.51.07.30 (V100R006C01) -
5.51.07.10 (V100R006C00) -
5.51.06.10 (V100R005C00) -
5.51.05.21 (V100R002C02) -
5.51.05.20 (V100R002C00) -
5.51.10.10 (V100R009C00) -
5.51.09.30 (V100R008C10) -
5.51.09.10 (V100R008C00) -
5.51.08.30 (V100R007C02) -
5.51.08.10 (V100R007C00) -
5.51.07.60 (V100R006C03) -
5.51.07.30 (V100R006C01) -
5.51.07.10 (V100R006C00) -
5.51.06.10 (V100R005C00) -
5.51.05.21 (V100R002C02) -
NOTE
Rules for defining commercial versions of NE software: a.bb.cc.dd. "a" indicates the NE platform
version. Currently, 4, 5 and 8 are supported. "bb" indicates the product name. "cc" indicates the R
version of the product. To be specific, 01 represents R001, 02 represents R002, and so on. "dd" indicates
the C version of the product. Mapping principle:
1. If the mapping table provides only the information that a.bb.cc.20 is supported by version A of the
U2000 Web LCT, a.bb.cc.2x is supported by version A of the U2000 Web LCT.
2. If the mapping table provides only the information that a.bb.cc is supported by version A of
theU2000 Web LCT, a.bb.cc.xx is supported by version A of the U2000 Web LCT.
5.151.09.20 V200R018C60
(V100R009C10)
5.151.09.10 V200R018C50
(V100R009C00)
5.151.08.20 V200R017C60
(V100R008C10)
5.151.08.10 V200R017C50
(V100R008C00)
5.151.07.20 V200R016C60
(V100R007C10)
5.151.07.10 V200R016C50
(V100R007C00)
5.151.06.10 V200R015C60
(V100R006C00)
5.151.05.10 V200R015C50
(V100R005C00)
5.138.09.10 V200R018C50
(V100R009C00)
5.138.08.20 V200R017C60
(V100R008C10)
5.138.08.10 V200R017C50
(V100R008C00)
5.138.07.20 V200R016C60
(V100R007C10)
5.138.07.10 V200R016C50
(V100R007C00)
5.138.06.10 V200R015C60
(V100R006C00)
5.138.05.10 V200R015C50
(V100R005C00)
5.138.03.10 V200R014C60
(V100R003C00)
5.138.01.10 V200R014C50
(V100R001C00)
5.115.09.10 V200R018C50
(V100R009C00)
5.115.08.20 V200R017C60
(V100R008C10)
5.115.08.10 V200R017C50
(V100R008C00)
5.115.07.20 V200R016C60
(V100R007C10)
5.115.07.10 V200R016C50
(V100R007C00)
5.115.06.10 V200R015C60
(V100R006C00)
5.115.05.10 V200R015C50
(V100R005C00)
5.115.03.10 V200R014C60
(V100R003C00)
5.115.02.10 V200R014C50
(V100R002C00)
5.115.01.20 V200R001C00
(V100R001C10)
5.203.09.10 V200R018C50
(V100R009C00)
5.206.09.20 V200R018C60
(V100R009C10)
5.180.09.10 V200R018C50
(V100R009C00)
5.180.08.20 V200R017C60
(V100R008C10)
5.180.08.10 V200R017C50
(V100R008C00)
5.180.07.20 V200R016C60
(V100R007C10)
5.160.09.20 V200R018C60
(V100R009C10)
5.190.09.10(MXXI5) V200R018C50
(V100R009C00)
5.160.09.10 V200R018C50
(V100R009C00)
5.190.08.20(MXXI5) V200R017C60
(V100R008C10)
5.160.08.20 V200R017C60
(V100R008C10)
5.190.08.10(MXXI5) V200R017C50
(V100R008C00)
5.160.08.10 V200R017C50
(V100R008C00)
5.160.07.20 V200R016C60
(V100R007C10)
5.160.07.10 V200R016C50
(V100R007C00)
5.160.06.10 V200R015C60
(V100R006C00)
5.194.02.10 V200R018C50
(V100R002C00)
5.194.01.20 V200R017C60
(V100R001C10)
5.183.11.10 V200R018C50
(V100R011C00)
5.183.10.20 V200R017C60
(V100R010C10)
5.183.10.10 V200R017C50
(V100R010C00)
5.183.09.20 V200R016C60
(V100R009C10)
5.152.11.10 V200R018C50
(V100R011C00)
5.152.10.20 V200R017C60
(V100R010C10)
5.152.10.10 V200R017C50
(V100R010C00)
5.152.09.20 V200R016C60
(V100R009C10)
5.152.09.10 V200R016C50
(V100R009C00)
5.152.08.20 V200R015C60
(V100R008C10)
5.152.08.10 V200R015C50
(V100R008C00)
5.196.11.20(CSHUF) V200R018C60
(V100R011C10)
5.196.11.10(CSHUF) V200R018C50
(V100R011C00)
5.114.11.20 V200R018C60
(V100R011C10)
5.114.11.10 V200R018C50
(V100R011C00)
5.114.10.20 V200R017C60
(V100R010C10)
5.114.10.10 V200R017C50
(V100R010C00)
5.114.09.20 V200R016C60
(V100R009C10)
5.114.09.10 V200R016C50
(V100R009C00)
5.114.08.20 V200R015C60
(V100R008C10)
5.114.08.10 V200R015C50
(V100R008C00)
5.114.07.20 V200R014C60
(V100R007C10)
5.114.07.10 V200R014C50
(V100R007C00)
5.114.06.20 V200R001C00
(V100R006C10)
5.114.06.10 V100R009C00
(V100R006C00)
5.178.11.20(CSHNU) V200R018C60
(V100R011C10)
5.178.11.10(CSHNU) V200R018C50
(V100R011C00)
5.178.10.20(CSHNU) V200R017C60
(V100R010C10)
5.178.10.10(CSHNU) V200R017C50
(V100R010C00)
5.178.09.20(CSHNU) V200R016C60
(V100R009C10)
5.140.11.20 V200R018C60
(V100R011C10)
5.179.11.10(CSHLU) V200R018C50
(V100R011C00)
5.140.11.10 V200R018C50
(V100R011C00)
5.179.10.20(CSHLU) V200R017C60
(V100R010C10)
5.140.10.20 V200R017C60
(V100R010C10)
5.179.10.10(CSHLU) V200R017C50
(V100R010C00)
5.140.10.10 V200R017C50
(V100R010C00)
5.179.09.20(CSHLU) V200R016C60
(V100R009C10)
5.140.09.20 V200R016C60
(V100R009C10)
5.140.09.10 V200R016C50
(V100R009C00)
5.140.08.20 V200R015C60
(V100R008C10)
5.140.08.10 V200R015C50
(V100R008C00)
5.140.07.20 V200R014C60
(V100R007C10)
5.140.07.10 V200R014C50
(V100R007C00)
NOTE
Rules for defining commercial versions of NE software: a.bb.cc.dd. "a" indicates the NE platform
version. Currently, 4, 5 and 8 are supported. "bb" indicates the product name. "cc" indicates the R
version of the product. To be specific, 01 represents R001, 02 represents R002, and so on. "dd" indicates
the C version of the product. Mapping principle:
1. If the mapping table provides only the information that a.bb.cc.20 is supported by version A of the
U2000 Web LCT, a.bb.cc.2x is supported by version A of the U2000 Web LCT.
2. If the mapping table provides only the information that a.bb.cc is supported by version A of
theU2000 Web LCT, a.bb.cc.xx is supported by version A of the U2000 Web LCT.
5.181.03.01 V200R016C60
(V100R003C00)
NOTE
Rules for defining commercial versions of NE software: a.bb.cc.dd. "a" indicates the NE platform
version. Currently, 4, 5 and 8 are supported. "bb" indicates the product name. "cc" indicates the R
version of the product. To be specific, 01 represents R001, 02 represents R002, and so on. "dd" indicates
the C version of the product. Mapping principle:
1. If the mapping table provides only the information that a.bb.cc.20 is supported by version A of the
U2000 Web LCT, a.bb.cc.2x is supported by version A of the U2000 Web LCT.
2. If the mapping table provides only the information that a.bb.cc is supported by version A of
theU2000 Web LCT, a.bb.cc.xx is supported by version A of the U2000 Web LCT.
NOTE
If the U2000 has logged in to the NE that you are going to manage through the U2000 Web LCT, enable
LCT Access Control and select Serial Port Access Control or Ethernet Access Control on the
U2000.
Browsing Alarms
On the U2000 Web LCT, users can:
Alarm Deletion
On the U2000 Web LCT, users can delete current alarms of NEs.
Monitoring Performance
Specifically, users can perform the following operations on the U2000 Web LCT:
l Browse the current performance data, historical performance data, unavailable time
events (UATs), and threshold crossing records.
l Monitor Ethernet remote monitor (RMON) performance.
l Query the advanced statistical items selected to monitor the packet loss condition of
ports.
l Browse the microwave link performance of RTN NEs.
l Monitor Ethernet port traffic.
l Monitor service flow traffic.
NE Security Management
l NE user management: Create, modify, and delete NE users.
l NE user group management: Query the NE users included in each NE user group.
l LCT access control: Determine whether the LCT can log in to and manage NEs.
l Online user management: Query online users and force online users out.
l NE security parameter: Query and set NE security parameters, including the warning
displayed upon logins to NEs.
NOTE
l For plesiochronous digital hierarchy (PDH) microwave NEs, select 1 byte (D1-D1) or 3 bytes
(D1-D3).
l NG WDM NEs do not support 1 byte (D1-D1).
l Set DCC transparent transmission. When Huawei OptiX series equipment is
interconnected with other vendors' equipment, D1-D3 bytes can be set to transparently
transmit the D bytes of other vendors' equipment and D4-D12 bytes can be set to process
the D bytes of Huawei OptiX series equipment.
l Manage IP protocol stacks, including:
Specifically, users can perform the following operations on the U2000 Web LCT.
Basic NE Configurations
l Modify NE attributes, including:
– NE name
– NE ID
– Extended NE ID
– Remarks
– Preconfiguration attributes
NOTE
l NE IDs that need to be set using a DIP switch can be modified on the U2000 Web LCT.
l When the preconfiguration function is enabled for an NE, all configurations are performed
offline on the NE without affecting any services. These configurations will not be applied to
the NE but only saved in the U2000 Web LCT database. This function is mainly used for
training, or when the NE has not been physically installed.
l Synchronize NE time: Specify the interval or exact time to automatically align the time
of all NEs with the system time of the U2000 Web LCT server, NTP server, or standard
NTP server. You can also set the time and period for automatic NE time synchronization.
– If you use the scheme of synchronizing with the U2000 Web LCT server, all NEs
use the U2000 Web LCT server time as the standard time. The NE time can be
synchronized with the U2000 Web LCT server time manually or automatically. The
U2000 Web LCT server time refers to the system time of the workstation or
computer where the U2000 Web LCT server is located. This scheme features easy
operation, and is applicable in networks that require a low accuracy with regard to
time.
– If you use the scheme of synchronizing with the NTP server or synchronizing with
the standard NTP server, the NE time and the U2000 Web LCT time are
synchronized with the NTP server time or the standard NTP server time
automatically. The NTP server can be the U2000 Web LCT server or a special time
server. This scheme enables the U2000 Web LCT and NEs to have a time accuracy
of one nanosecond in theory, and applies to a network with high requirement for
time accuracy.
l Display boards in plug-and-play (PnP) mode: After being inserted into slots, boards
along with their information are automatically displayed in the NE Panel.
l Automatically disable NE functions: NE functions that affect services, such as loopback
and automatic laser shutdown (ALS), are disabled at the scheduled time.
l Set environmental monitoring-related parameters, including:
– PMU interface
– EMU interface
– CAU interface
– TCU interface
– Temperature attributes
l Support the management of inband DCN.
l Graphically display performance events related to optical power.
l Create boards with adjustable bandwidths for preconfigured NEs.
l Support outdoor racks.
l Support auxiliary interfaces.
NE License Authorization
In the NE License Authorization window provided by the U2000 Web LCT, you can control
the basic functions, enhanced functions, and service access licenses of the TP Assistant,
which greatly increases device O&M efficiency.
Orderwire Configuration
l Set and query the orderwire phone numbers, call waiting time, and orderwire phone port
availability.
l Set and query network-wide conference call numbers.
l Set and query the length of subnet numbers and the related subnet of an optical interface.
l Set and query the SDH network node interface (NNI) orderwire phone numbers.
l Set and query the F1 data port.
l Set and query the broadcast data port.
– Out-ring route
l Configure the interface of an optical amplifier board.
l Manage the optical power of a board.
l Set tone and data access (TDA) interfaces, including:
– TDA clock source
– TDA power feeding
l Query and set overhead bytes, including:
– Regenerator section overhead (J0)
– Lower-order path overhead (V5, J2)
– VC4 higher-order path overhead (J1, C2) and its pass-through or termination
– VC3 higher-order path overhead (J1, C2)
l Support pseudo-random binary sequence (PRBS).
l Support pre-alerts for port optical power.
l Set and query TUG structures in transmit and receive directions.
l Support lower-order loopback.
l Query the port status of line boards and data boards.
l Manage power consumption.
l Set and query the optical power threshold of line boards.
l Support automatic laser shutdown.
l Configuring Service Mapping for an SDH Port: The port mapping function enables the
U2000 Web LCT to mount traditional SDH and packet services on lower-order ODUk
trails dynamically and map virtual ports to physical ports.
l Configure REG. If REG is configured for a line board on the U2000 Web LCT, each pair
of optical ports (receiving port and transmitting port) of the line board provides more
functions than normal. With REG, SDH signals received by the receiving port are
directly passed through the regeneration section layer, amplified, and then sent to the
transmitting port. The whole process is completed on the board alone without any help
from the SCC board or a cross-connect board.
l Query the capacity of higher order and lower-order cross-connections of an NE.
– Bound path
– Advanced attributes
l Configure Ethernet external interfaces, including:
– Basic attributes
– Traffic control
– Tag attributes
– Network attributes
– Advanced attributes
l Configure point-to-point link-state pass through (LPT) or point-to-multipoint LPT.
l Configure or create E-Line services (including Ethernet private line (EPL) services and
Ethernet virtual private line (EVPL) services) and configure the bound paths.
l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)
and set the following parameters:
– Service mounting
– VLAN filtering table
– VLAN unicast
– MAC address disabling
– Bound paths
– Self-learning MAC address
– MAC address table capacity of the VB port
– MAC address table capacity of the VLAN
l Configure Ethernet Layer 2 switching, including:
– Aging time
– Spanning Tree Protocol
– Multiple Spanning Tree Protocol
– IGMP Snooping Configuration
l Configure QinQ services: QinQ is a VLAN stacking technology that marks users with
stacked VLAN tags to expand VLAN resources. You can add, strip, or exchange VLAN
tags depending on the scenario.
l Configure Ethernet link aggregation groups (LAGs) that can be divided into intra-board
LAGs and inter-board LAGs, including:
– Creating and deleting a LAG.
– Adding and deleting ports to a LAG.
– Querying ports in a LAG and the aggregation status.
l Configure the quality of service (QoS), including:
– Flow
– Committed access rate (CAR)
– Class of service (CoS)
– Flow shaping
– Port shaping
– Port policy of the differentiated service (DiffServ) domain
– CAR policy
– Weighted random early detection (WRED) policy of ports
– V-UNI ingress policy
– V-UNI egress policy
– PW policy
– WRED congestion and discarding policy of services
– QinQ policy
– Weighted fair queuing (WFQ) scheduling policy
– WRR scheduling policy
– CoS mapping
l Check frame receiving and transmitting on Ethernet boards.
l Query information about the peer NE of a data service.
l Provide a QoS template to simplify the QoS configuration for Ethernet services on a per-
NE basis.
l Automatically report RMON performance events on Ethernet boards.
l Dump historical RMON performance events on Ethernet boards.
l Perform protocol diagnoses.
l Enable alarms in the event of no traffic at Ethernet ports.
l Configure Ethernet port mirroring and flow mirroring. In this manner, the product does
not resolve or process the captured data.
l Set and query the MAC address of a data board.
l Collect traffic statistics for a port.
l Monitor Ethernet port traffic and generate reports.
l Enable the board to respond to ping commands.
l Create flows in batches.
l Manage multi-protocol label switching Label Switching (MPLS) tunnels. The MSTP
equipment sets up a label switched path (LSP) to a PE router, identifies LSP labels and
service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for
transmission.
l Configure the control plane, including static routes and address resolution.
l Manage VPLS services.
Ethernet OAM
l Create and configure maintenance nodes.
l Perform a CC check.
l Perform a loopback (LB) check.
l Perform a link trace (LT) check.
l Perform performance detection.
l Enable OAM automatic discovery.
l Query the peer OAM parameters.
l Notify link events.
l Set link monitoring parameters for detecting frame error events, frame error periods, and
frame error seconds.
l Implement remote loopback.
l Implement the reporting of Ethernet OAM loopback events.
Clock Configuration
l Configuration of physical clocks
– Query the clock synchronization status.
– Set clock source priority, including:
n Priority table for system clock sources
n Priority table for phase-locked sources of the first external clock output
n Priority table for phase-locked sources of the second external clock output
– Set clock source switching, including:
n Clock source restoration parameters
n Clock source switching conditions
n Performing clock source switching
– Configure clock subnets, including:
n Clock subnet
n Clock quality
n Synchronization status message (SSM) output control
n Enable status of clock IDs
– Set phase-locked sources of external clock output, including:
n Phase-locked sources of external clock output
n Attributes of 2M phase-locked sources of external clocks
l Configuration of IEEE 1588 clocks
– Set the selection mode of frequency sources.
– Set the PTP clock source.
– Set the quality level of PTP clock sources.
– Set the priority table of PTP clock sources.
– Configure a PTP clock service.
– Configure the clock interface.
– Set the external clock interface output.
l Configuration of CES ACR clocks
The CES adaptive clock recover (ACR) function, based on CES services, uses the
adaptive mode to recover the source clock at the sink. Specifically, the sink equipment
can recover the TDM clock (in FIFO mode) according to changes in the buffer for CES
services (the buffer changes when receiving packets from the network side). In this
manner, clock synchronization can be maintained for services at the sink.
l Unified configuration of clock domains
General attributes are physical attributes of the interface. Layer 2 attributes are data link layer
attributes of the interface, such as ATM attribute, VLAN attribute, and QinQ attribute. Layer
3 attributes are network layer attributes of the interface, such as the IP attribute.
Table 2-7 lists the Hybrid MSTP service interface types that the U2000 Web LCT supports.
The MC LAG supports the ability to share load between aggregation group equipment.
The U2000 Web LCT supports the ability to set the following LAG/MC LAG attributes:
LMSP Configuration
Linear MSP protection contains 1+1 linear MSP and 1:N linear MSP. They use the protection
channel to protect services that are transmitted on the working channel. When the working
channel fails, services are switched to the protection channel. The linear MSP applies to the
POS interface and structured STM interface.
The U2000 Web LCT supports the following functions of LMSP configuration:
l Creates a linear MSP.
l Checks the linear MSP switching status.
l Performs linear MSP switching.
MSTP Configuration
The multiple spanning tree protocol (MSTP) can be used to clear loops on a network. Using
an algorithm, the MSTP blocks redundant trails so that the loop network can be trimmed as a
non-loop tree network. In this case, broadcast storms caused by the proliferation and endless
cycling of packets on the loop network do not occur. Different from the STP and RSTP that
use only one spanning tree to correspond to all VLANs, the MSTP introduces the mapping
between VLANs and multiple spanning trees, and therefore can forward data according to
VLAN packets and achieve load balance of VLAN data.
l Configure parameters of port groups and network bridges.
l Configure CIST and MSTI parameters.
l Query CIST status and MSTI status.
LPT Configuration
LPT is used to return the remote-end link status to the near end. The near-end equipment
performs operations depending on the remote-end link status. When the intermediate
transmission network of the services becomes faulty, the LPT informs the access equipment at
both ends of the transmission network to enable the backup network. This ensures the normal
transmission of the important data.
The Hybrid MSTP NEs support configuring point-to-point LPT and point-to-multipoint LPT.
QoS Configuration
QoS indicates the performance of the data flow that travels through a network. The QoS is
used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can
minimize the delay and jitter in the network by appropriately allocating and monitoring
network resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 Web LCT supports the following QoS functions:
l Configures QoS profiles.
l Configures DiffServ domains.
l Configures ATM CoS mapping.
l Configures simple flow classification and complex flow classification.
l Configures CAR and Shaping.
l Configures the WFQ scheduling policy.
l Configures the port WRED policy.
l Configures the service WRED policy.
l Configures WRR scheduling policy.
l To simplify the operation and share some common QoS configuration parameters, the
U2000 Web LCT supports creating QoS function point policies as follows: port policy,
ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy and QinQ policy. By
using these function point policies, you can bind the CAR configuration attribute,
shaping configuration attribute, flow classification configuration attributes, WFQ
Schedule policy, WRED policy and WRR scheduling policy.
l Configure CoS queue mapping.
l Supports the application of the QoS policy to multiple NEs by configuring QoS profile.
MS-PW Configuration
By creating multi-segment pseudo wires (MS-PWs) to transmit services, you can transmit
services over different networks while saving tunnel resources.
PW APS Configuration
As a network protection mechanism, PW automatic protection switching (APS) is intended to
protect the services on the working PW with a protection PW. That is, when the working PW
is faulty, the services on the working PW are switched to the protection PW. In this manner,
the services on the working PW are protected.
CES Configuration
CES configuration is mainly used for transparent transmission of TDM circuit switching data
on the PSN network.
The U2000 Web LCT provides the following configuration functions for ATM service
creation:
See Figure 2-2. Company A has branches in City 1 and City 3. Company C has branches in
City 1 and City 2. Branches of Company A or Company C that are in different cities have data
communication requirements. The Hybrid MSTP equipment can provide E-line services for
Company A and Company C, to meet their communication requirements. In addition, the
service data can be completely isolated.
The U2000 Web LCT supports the following functions of configuring E-line services on a
per-NE basis:
The U2000 Web LCT supports the following functions of configuring E-AGGR services on a
per-NE basis:
See Figure 2-5. The HQ of Company A is in City 3. Company A has Branch A in City 1, City
2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have
business with each other. The data should be isolated between the two branches. The HQ has
requirements of communicating with each branch and accessing the Internet.
Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 Web LCT supports the following functions of configuring E-LAN services on a
per-NE basis:
The U2000 Web LCT provides the following functions of configuring MPLS OAM:
The U2000 Web LCT provides the following functions of configuring ATM OAM:
Users can communicate with each other by just picking up the phone, that is, no dialing
is required.
l 2-wire/4-wire AF EM regeneration: The PBXs are connected to transport NEs through
the 2-wire/4-wire + EM interfaces. The EM interfaces transmit signaling and the 2-
wire/4-wire ports transmit voice data. The transport NEs act as the regenerators of
signaling and voice data.
l End-to-end control signal transmission: EM ports are used independently to transmit
connection and disconnection signals through only one channel. In this manner, switch
signals are transmitted remotely to implement remote control.
Basic NE Configurations
l Synchronize NE time: Specify the interval or exact time to automatically align the time
of all NEs with the system time of the U2000 Web LCT server, NTP server, or standard
NTP server. You can also set the time and period for automatic NE time synchronization.
– If you use the scheme of synchronizing with the U2000 server, all NEs use the
U2000 server time as the standard time. The NE time can be synchronized with the
U2000 server time manually or automatically. The U2000 server time refers to the
system time of the workstation or computer where the U2000 server is located. This
scheme features easy operation, and is applicable in networks that require a low
accuracy with regard to time.
– If you use the scheme of synchronizing with the NTP server or synchronizing with
the standard NTP server, the NE time and the U2000 time are synchronized with the
NTP server time or the standard NTP server time automatically. The NTP server
can be the U2000 server or a special time server. This scheme enables the U2000
and NEs to have a time accuracy of one nanosecond in theory, and applies to a
network with high requirement for time accuracy.
l Inform users of board replacement by blinking an indicator on the control board.
l If you set Automatic Disabling of NE Function, service-affecting operations, such as
loopback and ALS, will be automatically disabled after the specified period. When the
time for performing a service-affecting operation exceeds a certain period, the operation
is disabled automatically.
l Modify the following NE attributes:
– NE name
– NE ID
– NE extended ID
– Remarks
l Environment monitor information: Set the NE fan speed and monitor the temperature
and voltage.
l Search for and create NEs by automatically discovering NE IP addresses.
l When a faulty board is replaced, related indicators on the U2000 Web LCT will blink.
l View board legends and the meanings of different colors in the NE panel.
l Create the virtual WDM NE to simulate the network NE during the network planning.
l Configuration rollback management: If the NE is improperly operated and becomes
unreachable to U2000 Web LCT, you can use the configuration rollback function to roll
the NE configuration back to the state before the NE is unreachable.
NE License Authorization
In the NE License Authorization window provided by the U2000 Web LCT, you can control
the basic functions, enhanced functions, and service access licenses of the TP Assistant,
which greatly increases device O&M efficiency.
Orderwire Configuration
l Set a board as an orderwire board and query the orderwire board information.
l Set and query the orderwire phone numbers, call waiting time, dialing mode, and
orderwire phone port availability.
l Set and query network-wide conference call numbers.
l Set and query the length of subnet numbers and the related subnet of an optical interface.
l Configure automatic commissioning at the optical layer for OptiX OSN 1800: The
commissioning aims to establish data communication network (DCN) communication
between the U2000 Web LCT and OptiX OSN 1800s, discover the adjacent nodes of
each OptiX OSN 1800, and maintain high optical performance of main optical routes.
Each wavelength channel name supports a maximum of 127 characters, 84 of which can be
Japanese characters. (Verification is required.)
Overhead Configuration
Configure OTN overheads.
l Configure and query section monitoring (SM) overheads.
l Configure and query optical transmission section (OTS) overheads.
l Configure and query path monitoring (PM) overheads.
l Configure and query tandem connection monitoring (TCM) overheads.
l Query optical channel payload unit (OPU) overheads.
l Configure and query fault type and fault location reporting channel (FTFL) overheads.
l Configure and query mulitframe structure identifier (MSI) overheads.
l Configure and query reserved for future international standardisation (RES) overheads.
l QinQ is a VLAN stacking technology that mark users with stacked VLAN tags to expand VLAN
resources. Currently, the U2000 Web LCT can add, split, and exchange VLAN tags.
l A VLAN SNCP service is a VLAN-based E-Line service that is configured with SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between
VLAN services and common Ethernet services.
l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)
and set parameters including service mounting, VLAN filtering, VLAN unicast, MAC
address disabling, bound path, and self-learning MAC address.
l Set the quality of service (QoS), including:
– Flow
– Committed access rate (CAR)
– Class of service (CoS)
– Flow shaping
– Port shaping
l Configure the link capacity adjustment scheme (LCAS): LCAS can dynamically adjust
the number of virtual containers required for service mapping to satisfy bandwidth
requirements of different services. In this manner, bandwidth usage and robustness of
virtual concatenation are improved.
l Configure OAM for Ethernet services.
l Configure OAM for Ethernet ports.
l Implement the intra-board LAG function.
l Configure several WDM service boards in specified slots to form a cross-connect board
group.
l Enable the add/drop, pass-through, and loopback functions for GE/FC services in each
cross-connect board group.
l Configure electrical cross-connections, which allows you to control service flow at the
electrical layer, and to dynamically groom, converge, or split sub-wavelength services. In
this manner, the networking capability and network survivability are greatly enhanced.
l Implement unified grooming based on GE, ODU0, ODU1, ODU2, ODU3, ODU4 and
ODUflex services through the XCS board.
l Implement distributed grooming based on GE services, ODU0, ODU1, ODU2, ODU3
and ODU4 services, and Any services.
l Configure unidirectional and bidirectional SNCP at the ODU3, ODU2, ODU1, ODU0,
ODUflex and ODU4 level.
Configure optical cross-connections.
ROADM Configuration
By using the reconfigurable optical add/drop multiplexer (ROADM) function, you can
perform add/drop and pass-through configurations for optical channels. The WDM equipment
can use the wave selective switch (WSS) to implement the ROADM function.
l Configure ROADM based on the WSS, including the WSSD + WSSM and WSS +
RMU/ROAM networks. This mode applies to cross-connect nodes on a ring.
l Configure ROADM based on multiplexer and demultiplexer boards: Wavelengths cannot
be groomed dynamically. This mode applies to common nodes on chain networks.
Clock Configuration
l Specify the clock source that the SCC board traces.
l Define clock source priorities.
l Configure a clock source for a board.
l Configure transparent transmission for an external clock.
Dispersion Compensation
Perform 40 Gbit/s dispersion compensation configurations. The tunable dispersion
compensator (TDC) can be used for precise dispersion adjustment.
Wavelength Monitoring
On the U2000 Web LCT, you can perform wavelength monitoring management for the OptiX
OSN 6800, the OptiX OSN 1800 series and the OptiX OSN 8800 series.
WDM PRBS
On the U2000 Web LCT, you can perform pseudo-random binary sequence (PRBS) tests on
boards to check the path quality. You can also verify that the WDM link is functioning
properly before service provisioning.
MS PW Configuration
By creating multi-segment pseudo wires (MS-PWs) to transmit services, you can save tunnel
resources and transmit services over different networks.
Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
QoS Configuration
Quality of service (QoS) refers to the performance of the data flow transmission in a network.
The QoS is used to ensure end-to-end service quality. The QoS cannot enhance the
bandwidth, but it can minimize the delay and jitter in a network by properly allocating and
monitoring network resources. In this way, the service quality is ensured.
The DiffServ (DS) domain consists of a group of network nodes with the DiffServ function.
Nodes of this type are also called DS nodes. In a DS domain, all DS nodes adopt the same
service provisioning policy to achieve the same per-hop behavior (PHB). DS nodes are
classified into edge DS nodes and internal DS nodes. Edge DS nodes usually perform
complex flow classification on the traffic that enters the DS domain. Traffic of different types
is marked with different PHB service types. Internal DS nodes only need to perform simple
flow classification based on PHB service types.
The submarine line terminal equipment OptiX BWS 1600S T16 provides electrical-layer
services access and management. The U2000 Web LCT provides the following functions for
the submarine line terminal equipment:
BU Management
l Create BUs.
l Maintain BUs.
l Switch power supply over BUs.
l Delete BUs.
FC Service Test
You can perform FC service tests on the U2000 Web LCT with the 12LOM board, instead of
the FC test instrument (such as the SmartBits). By performing such tests, you can determine
whether FC service lines and the devices under test are working properly.
Basic NE Configurations
l Synchronize NE time: Specify the interval or exact time to automatically align the time
of all NEs with the system time on the U2000 Web LCT or NTP server.
l Automatically disable NE functions: NE functions that affect services, such as loopback
and automatic laser shutdown (ALS), are disabled at the schedule time.
l Modify NE attributes, including:
– Setting NE name
– Entering remarks
– Enabling or disabling automatic board installation
– Enabling or disabling LAN port access control
– Auto-board installation
– Enabling or disabling a serial port, and modifying a serial port and its baud rate
– Setting start time for 24-hour performance monitoring
– Enabling or disabling the daylight saving time (DST)
– Modifying the IP address and subnet mask of an NE
– Enabling or disabling the address resolution protocol (ARP) proxy
– Enabling or disabling the open system interconnection (OSI) protocol
l QinQ is a VLAN stacking technology that marks users with stacked VLAN tags to expand VLAN
resources. Currently, the U2000 Web LCT supports only the function of adding VLAN tags.
l A VLAN SNCP service is a VLAN-based E-Line service that is configured with SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between
VLAN SNCP services and common Ethernet services.
l Configure Ethernet private LAN (EPLAN) services: You can create a virtual bridge (VB)
and set parameters including service mounting, VLAN filtering, VLAN unicast, MAC
address disabling, bound path, and self-learning MAC address.
l Configure QoS, including:
– Flow
– Committed access rate (CAR)
– Class of service (CoS)
– Port shaping
l Configure OAM for Ethernet services.
l Configure OAM for Ethernet ports.
l Implement the intra-board LAG function.
l Implement the DLAG function.
l Implement the VLAN group function.
l Filter port MAC addresses.
l Test frame receiving and transmitting on Ethernet boards.
l Perform protocol diagnoses.
l Configure QinQ type domains.
l Configure Ethernet Layer 2 switching, including:
– Aging time
– Spanning tree
– IGMP snooping protocol
l Automatically report RMON performance events on Ethernet boards.
l Dump historical RMON performance data of Ethernet boards.
Overhead Configuration
l Configure and query section monitoring (SM) overheads.
l Configure and query path monitoring (PM) overheads.
l Configure and query tandem connection monitoring (TCM) overheads.
l Query optical channel payload unit (OPU) overheads.
l Configure and query fault type and fault location reporting channel (FTFL) overheads.
l Configure and query mulitframe structure identifier (MSI) overheads.
l Configure overheads at the OCh overhead management-SONET interface.
l Configure OTS overheads at the OCh overhead management-OTN interface.
ROADM Configuration
By using the reconfigurable optical add/drop multiplexer (ROADM) function, you can
perform add/drop and pass-through configurations for optical channels.
Configure ROADM based on the WSS. This mode applies to cross-connect nodes in a ring to
groom multi-dimensional optical cross-connections. A maximum of eight dimensions are
supported.
Optical cross-connection broadcast services: Support broadcasting optical cross-connections
on a per-NE basis.
Dispersion Compensation
l This function supports 40 Gbit/s dispersion compensation configuration. It uses the TDC
to precisely adjust the dispersion.
WDM PRBS
You can perform PRBS on a board to check the path quality. You can also verify that the
WDM link is functioning properly before provisioning a service.
Housekeeping Configuration
l Set and query the environmental alarm attributes, including:
– Adding environmental alarm attributes
– Setting the normal state of environmental attributes
– Querying environmental alarm attributes
– Modifying environmental alarm attributes
– Deleting environmental alarm attributes
l Set and query external control attributes, including:
– Adding external control attributes
– Querying external control attributes
– Modifying external control attributes
– Deleting external control attributes
– Setting the control time of the external control relay
Basic NE Configurations
l Modify NE attributes, including:
– NE name
– NE ID
– Extended NE ID
– Remarks
– Gateway IP address
– Gateway port
l Synchronize NE time: Specify the interval or exact time to automatically align the time
of all NEs with the system time of the U2000 Web LCT server, NTP server, or standard
NTP server. You can also set the time and period for automatic NE time synchronization.
– If you use the scheme of synchronizing with the U2000 Web LCT server, all NEs
use the U2000 Web LCT server time as the standard time. The NE time can be
synchronized with the U2000 Web LCT server time manually or automatically. The
U2000 Web LCT server time refers to the system time of the workstation or
computer where the U2000 Web LCT server is located. This scheme features easy
operation, and is applicable in networks that require a low accuracy with regard to
time.
– If you use the scheme of synchronizing with the NTP server or synchronizing with
the standard NTP server, the NE time and the U2000 Web LCT time are
synchronized with the NTP server time or the standard NTP server time
automatically. The NTP server can be the U2000 Web LCT server or a special time
server. This scheme enables the U2000 Web LCT and NEs to have a time accuracy
of one nanosecond in theory, and applies to a network with high requirement for
time accuracy.
l Implement automatic NE function disabling: NE functions that affect services, such as
loopback and automatic laser shutdown (ALS), are disabled at the scheduled time.
l Set environment monitoring interfaces.
l Implement automatic creation of RTN NEs: Creating a USB-Connected NE, Creating an
NE Connected by Wi-Fi, Creating an NE (Searching for the NE), Creating an NE
Manually.
l Support the license management function for equipment.
l Support the press-to-install function for logical boards.
l Search for the opposite NE.
l Query the microwave performance events.
l Query physical bandwidth and bandwidth usage of the port.
l Perform IP Address-based Ping tests and traceroute tests.
l Test the fade margin.
l Manage outdoor racks.
USB Access
An NE can be connected to the Web LCT through an USB port. The Web LCT can configure
the RTN NEs through the USB port.
NE License Authorization
In the NE License Authorization window provided by the U2000 Web LCT, you can control
the basic functions, enhanced functions, and service access licenses of the TP Assistant,
which greatly increases device O&M efficiency.
Orderwire Configuration
l Set and query the order wire phone numbers, call waiting time, and orderwire phone port
availability.
l Set and query the bytes occupied by orderwires.
l Set and query the F1 data interface.
l Set and query the broadcast data interface.
Interface Configuration
l Set the parameters for an SDH interface.
l Set automatic laser shutdown.
l Set the parameters for a PDH interface.
l Configure the NE and link attributes for both the local and remote NEs of a single-hop
microwave link.
l Configure the IF attribute, RF attribute and IF protection for both the local and remote
NEs of a single-hop microwave link.
l Configure the PLA, LAG, XPIC based on a single-hop microwave link.
l View the optical power of the microwave link in graph.
l View the radio link performance: Collect statistics on power and bit error rates (BERs) of
the NEs at both ends of a radio link and view the statistics in a graph or table. You can
also quickly query the current and historical performance of the two NEs, which
improves routine maintenance efficiency.
l View the radio link alarm: Browse radio link alarms to obtain the important intermediate
frequency information and alarm information of the NEs on both ends of a radio link.
l Configure loopback based on radio link: View or set the loopback status of the IF
interface or ODU interface at the two ends of a radio link.
l View the microwave link frequency scan: Scan frequencies for IF 1+1 protection groups
and XPIC groups in cascading and non-cascading scenarios at the two ends of a radio
link.
NE Offline Configuration
During new deployment, NEs can be created in offline mode. The general process is as
follows: create and configure an NE on the U2000 in offline mode, export the NE data to a
script, import the script into the Web LCT, and apply configuration data in the script to the
NE. Multiple NEs can be created in this manner at the same time, which significantly
improves the NE configuration efficiency.
LLDP Configuration
LLDP is a link layer communication protocol. LLDP allows a piece of equipment attached to
an Ethernet to advertise, to its adjacent equipment attached to the same Ethernet, information
such as its major capability, management address, equipment identifier, and interface
identifiers. The information distributed by this protocol is stored by its recipients in a standard
management information base (MIB), making it possible for the information to be accessed
by a network management system (NMS).
Clock Configuration
l Query the clock synchronization status.
l Set clock source priority, including:
– Priority for system clock sources
– Priority for phase-locked sources of the first external clock output
LAG Configuration
A link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical
link with a faster data transmission rate. This configuration improves link availability and
increases link capacity.
The U2000 Web LCT supports the configuration of the following LAG attributes:
l Configure the load sharing type, including sharing and non-sharing.
l Configure the LAG type, including manual and static.
l Configure the service distribution algorithm of the LAG.
l Configure the port priority and system priority of the LAG.
BFD Configuration
The bidirectional forwarding detection (BFD) protocol can be used to check the Ethernet link
BFD is a simple Hello protocol. It is similar to the neighbor detection of well-known
protocols in many aspects. A pair of systems periodically sends detection packets on the
bidirectional channel where sessions between the two systems were created. If one system
does not receive any detection packets from the other within a specified period, that system
assumes that there is a failure on the bidirectional channel.
QoS Configuration
Quality of service (QoS) refers to the performance of the data flow transmission in a network.
The QoS is used to ensure end-to-end service quality. The QoS cannot enhance the
bandwidth, but it can minimize the delay and jitter in a network by properly allocating and
monitoring network resources. In this way, the service quality is ensured.
The DiffServ (DS) domain consists of a group of network nodes with the DiffServ function.
Nodes of this type are also called DS nodes. In a DS domain, all DS nodes adopt the same
service provisioning policy to achieve the same per-hop behavior (PHB). DS nodes are
classified into edge DS nodes and internal DS nodes. Edge DS nodes usually perform
complex flow classification on the traffic that enters the DS domain. Traffic of different types
is marked with different PHB service types. Internal DS nodes only need to perform simple
flow classification based on PHB service types.
The U2000 Web LCT supports the following QoS configurations:
l Configure Diffserv domains.
l Configure ATM CoS mapping.
l Configure simple flow classification and complex flow classification.
l Configure CAR and shaping.
l Configure WFQ scheduling policies.
l Configure port WRED policies.
l Configure WRR scheduling policies.
l Simplify operations and share some common QoS configuration parameters. The U2000
Web LCT enables users to create QoS function point policies. The function point policies
consist of port policies, ATM policies, and V-UNI ingress policies. By using these
function point policies, you can bind configurations for CAR attributes, shaping
attributes, flow classification attributes, WFQ scheduling policies, WRED policies and
WRR scheduling policies.
MS PW Configuration
By creating multi step (MS)-PW to transmit services, you can transmit services over different
networks while saving tunnel resources.
The U2000 Web LCT supports the following configurations and operations on MPLS tunnels
on a per-NE basis:
l Configure basic attributes of the MPLS.
l Configure static unicast MPLS tunnels.
l Create forward and backward MPLS tunnels at the same time.
l Create the E-LSP.
l Manage PWs.
l Manage tunnel labels and PW labels.
IP tunnels and GRE tunnels mainly apply to the offload scenarios of mobile communication.
The U2000 Web LCT supports the configuration of bidirectional IP tunnels and GRE tunnels
on a per-NE basis.
The U2000 Web LCT supports the offload protection between MPLS and IP or GRE tunnels.
Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 Web LCT supports the following functions of configuring E-LAN services on a
per-NE basis:
The U2000 Web LCT supports the following configurations for E-AGGR services on a per-
NE basis:
l Configure VLAN forwarding table items of an E-AGGR service.
l Configure QoS for the PWs of an E-AGGR service.
l Configure V-UNI groups.
The U2000 supports the configuration of IGMP snooping for E-LAN services, and provides
the following operations:
The U2000 Web LCT provides the following configurations for MPLS OAM:
The U2000 Web LCT provides the following configurations for ATM OAM:
Configuring PLA
Physical link aggregation (PLA) allows all Ethernet transmission paths in several Integrated
IP radio links connected to the same equipment to be aggregated as a PLA. For MAC users, a
PLA works as a single link.
l Checking, discovering, and locating a defect inside the network at the MPLS layer.
l Reporting and handling the defect.
l Triggering protection switching when a fault occurs.
This feature provides the following functions for tunnels and PWs:
NE Loop
You can loop back all ports and query loopback ports on an NE.
Configuring CA
Carrier Aggregation (CA) allows multiple channels to be aggregated as a CA group to achieve
higher logical bandwidth.
3 Getting Started
To help you better understand the U2000 Web LCT, this chapter describes some basic
operations on it.
Procedure
l Method 1: Through a network cable
a. Insert a network cable into the U2000 Web LCT server.
b. Route the cable to the desired NE and connect its RJ-45 connector to the NMS
interface of the NE.
The positions of the interfaces mentioned earlier are described in the equipment-specific
Hardware Description.
----End
Prerequisites
The U2000 Web LCT has been correctly connected to NEs.
Context
l By default, if four incorrect passwords are entered consecutively, the current account will
be locked. Five minutes later, it will be automatically unlocked.
l If three incorrect passwords are entered consecutively, the verification code will show on
the login page.
l If a password has expired or will expire in 10 days, the U2000 Web LCT prompts users
to change the password when the users log in to the U2000 Web LCT.
l By default, the NE data configuration window of the U2000 Web LCT can be left
inactive for 15 minutes. If no operation is performed within 15 minutes, the U2000 Web
LCT automatically returns to the login page. Users have to re-log in to the U2000 Web
LCT and reconnect to NEs because NEs have automatically gone offline.
Procedure
Step 1 Start the computer.
NOTE
The default user name is admin, and its initial password is Changeme_123. To ensure system security,
change the password immediately and keep the new password secure.
----End
Follow-up Procedure
l To ensure user security, click after logging in to the U2000 Web LCT and set
account and password polices in the Set Security Policy dialog box. For details, see Set
Security Policy.
l To ensure user security, click after setting the security policies and change the
password in the Changing Password dialog box. For details, see Changing Password.
Prerequisites
l The U2000 Web LCT server is running correctly.
l The pop-up blocker of Internet Explorer is turned off.
Context
l The U2000 Web LCT server can be accessed only on the local computer. Therefore, keep
the default server address of 127.0.0.1.
l By default, if four incorrect passwords are entered consecutively, the current account will
be locked. Five minutes later, it will be automatically unlocked.
l If three incorrect passwords are entered consecutively, the verification code will show on
the login page.
l If a password has expired or will expire in 10 days, the U2000 Web LCT prompts users
to change the password when the users log in to the U2000 Web LCT.
l By default, the NE data configuration window of the U2000 Web LCT can be left
inactive for 15 minutes. If no operation is performed within 15 minutes, the U2000 Web
LCT automatically returns to the login page. Users have to re-log in to the U2000 Web
LCT and reconnect to NEs because NEs have automatically gone offline.
Procedure
Step 1 Open Internet Explorer.
Step 2 Optional: To set the compatibility view in Internet Explorer 10, do as follows:
1. Choose Tools > Compatibility View Setting from the main menu.
2. In the Compatibility View Setting dialog box, enter localhost in the Add this website
text box and click Add. Select Display intranet sites in Compatibility View and
Include updated website lists from Microsoft.
3. Click Close.
4. Re-open Internet Explorer.
Step 3 Enter https://127.0.0.1:13443/weblct in the IP address box.
NOTE
l 127.0.0.1 is the IP address of the server computer and 13443 is the port number.
l This uniform resource locator (URL) is case-sensitive.
The default user name is admin, and its initial password is Changeme_123. To ensure system security,
change the password immediately and keep the new password secure.
----End
Follow-up Procedure
l To ensure user security, click after logging in to the U2000 Web LCT and set
account and password polices in the Set Security Policy dialog box. For details, see Set
Security Policy.
l To ensure user security, click after setting the security policies and change the
password in the Changing Password dialog box. For details, see Changing Password.
Prerequisites
You have logged in to the U2000 Web LCT.
Procedure
----End
3.5.1 NE List
The home page of the U2000 Web LCT is an NE list. This list contains all the NEs managed
by the U2000 Web LCT and supports the following operations: adding NEs, logging in to
NEs, logging out of NEs, deleting NEs, backing up NE database, browsing system logs,
setting the time format.
NOTE
l The NE list is displayed after you successfully log in to the U2000 Web LCT client.
l The NE List is automatically refreshed every 5 seconds.
l A tooltip is displayed after the pointer hovers over any shortcut icon in the NE list for 2 seconds.
l The U2000 Web LCT can back up NE databases to control boards so that NE configuration data can
be saved.
GUI
Figure 3-1 shows the European NE list on the U2000 Web LCT.
Figure 3-2 shows the RTN NE (NA) list on the U2000 Web LCT.
Figure 3-3 shows the WDM NE (NA) list on the U2000 Web LCT.
Shortcut Icons
Icon Name Description
Buttons
Button Description
Parameters
Field Value Description
Alarm Status (WDM NA) Unknown, Normal, Critical Indicates the alarm status of
Major, Minor, Not Alarmed a NE (NA), which is
determined by the highest
alarm severity.
3.5.2 NE Explorer
The NE Explorer is the main window for operating NEs on the U2000 Web LCT. It is NE-
specific. In the NE Explorer, users can configure, manage, and maintain the current NE at the
NE, board, or port level. Therefore, it is the primary window for NE commissioning and
configuration. The NE Explorer provides an object tree and a function tree on the left, which
helps quickly open the correct window at the correct level.
GUI
To open the NE Explorer, select an NE in the NE List and click NE Explorer; alternatively,
double-click the NE.
Figure 3-4 shows the MSTP NE Explorer.
Navigation Path
The NE Panel is displayed by default when you open the NE Explorer.
NE Panel
Figure 3-9 shows the NE Panel.
NOTE
l For the OptiX OSN 8800 T64, the U2000 Web LCT displays the NE Panel for front and rear boards.
l If you want the NE Panel to always stay on top, select the Always On Top check box.
l When a board occupies two slots, the slot ID of the main slot is boldfaced, and the slot ID of the
slave slot is gray. For example, in Figure 3-9, slot is the main slot, and slot is the slave slot.
l A board may take one of the following indicators:
Features
l To add a board, right-click a vacant slot and choose a board type from the shortcut menu.
l To delete a board, right-click it and choose Delete from the shortcut menu.
l To view board and port legends and the meanings of different colors, click on the
toolbar.
NOTE
The relationships among different board states are illustrated in Board States.
l To perform an operation on an installed board, right-click the board and choose an item
from the shortcut menu. For example, to open the path view for an FIU board, right-click
the board and choose Path View from the shortcut menu. Figure 3-11 shows the path
view.
Navigation Path
The NE Panel is displayed by default when you open the NE Explorer.
NE Panel
l To add a board, right-click a vacant slot and choose a board type from the shortcut menu.
To delete a board, right-click it and choose Delete from the shortcut menu.
l To view board and port legends and the meanings of different colors, click on the
toolbar. Figure 3-12 shows the legends for an WDM NE (NA).
NOTE
The relationships among different board states are illustrated in Board States.
l To perform an operation on an installed board, right-click the board and choose an item
from the shortcut menu. For example, to open the path view for an FIU board, right-click
the board and choose Path View from the shortcut menu. Figure 3-13 shows the path
view.
Shortcut Icons
Icon Name Description
Navigation Path
The NE Panel is displayed by default when you open the NE Explorer.
NE Panel
Figure 3-14 shows the NE Panel.
NOTE
If you want the NE Panel to always stay on top, select the Always On Top check box.
Features
NOTE
For split OptiX RTN 310s, the NE Panel displays ODU boards. Choosing Board Manufacturer
Information from the shortcut menu of an ODU board will expand details about the board.
l To add a board, right-click a vacant slot and choose a board type from the shortcut menu.
l To delete a board, right-click it and choose Delete from the shortcut menu.
l To reset an installed board, right-click the board and choose RF Reset from the shortcut
menu.
l To view board and port legends and the meanings of different colors, click on the
toolbar. Figure 3-15 shows the legends for an OptiX RTN 620.
NOTE
The relationships among different board states are illustrated in Board States.
l To perform an operation on an installed board, right-click the board and choose an item
from the shortcut menu. For example, to open the path view for a PH1 board, right-click
the board and choose Path View from the shortcut menu. Figure 3-16 shows the path
view.
Button Functionality
Button Functionality
Context
l If a parameter is gray, it is non-editable.
l If a parameter is olive, its value has been changed but not applied.
l If the value of a parameter is "/", the value is unknown.
l If the value of a parameter is "-", the parameter is not supported by the object.
Sorting
You can sort records in a table in a certain order and quickly locate the type of information
you want to view. Clicking a column header will sort records automatically and clicking it
again will sort records in reverse order. The column header by which records are sorted is
marked with or . Figure 3-17, records are sorted by NE ID.
Multi-selection
To select a consecutive group of rows, select the first row, hold down the Shift key and then
select the last row.
To select non-consecutive rows, hold down the Ctrl key and select the each row needed.
Paging
Some tables, such as the alarm and log tables, can be displayed in different pages. Users can
set the number of records to be displayed in each page. Figure 3-18 illustrates the paging
function.
4 Creating NEs
Actual OptiX series devices are represented as NEs on the U2000 Web LCT. Before the
U2000 Web LCT manages an actual device, users need to create a corresponding NE on the
U2000 Web LCT.
Context
There are two methods for creating NEs:
l Creating NEs through NE search: Use this method when a large number of NEs need to
be created, for example, during deployments.
l Creating NEs manually: Use this method in some special situations (for example,
communication failure) or when only a few NEs need to be created.
NOTE
Prerequisites
l The U2000 Web LCT is properly communicating with NEs.
Context
There are two methods for creating NEs: creating NEs through NE search and creating NEs
manually. Generally, NE IDs are unknown during the initial NE configuration. These NEs
must be created through NE search
NE search is divided into quick search, search NE by WIFI and advanced search.
l Quick search: After this search, the Web LCT automatically adds the found NEs to the
NE list and logs in to them. From the Search NE dialog box, you can switch to the NE
Explorer directly, which facilitates NE management.
l Search NE by WIFI: This search is used to search for the RTN NEs accessed through
Wi-Fi.
l Advanced search: After this search, you need to manually add and log in to the found
NEs.
NOTE
Before searching for NEs, add the related GNEs on the U2000 Web LCT. Otherwise, the U2000 Web
LCT cannot log in to the found NEs.
Procedure
l Quick search:
a. In the NE List, click NE Search and choose NE Search.
b. In the Search NE dialog box, click the NMS Port or User Port option button to
start an automatic search.
NOTE
l If you click NMS port, the NEs in the same network segment as the local IP address will
be found.
l If you click User port, the NEs whose user ports are directly connected to the U2000
Web LCT will be found. It is generally used to search for OptiX RTN 310s.
The IP addresses of the found NEs are displayed in the NE IP Address drop-down
list.
c. Select an NE from the NE IP Address drop-down list, enter the correct user name
and password, and click Apply.
The NE Explorer is displayed. The U2000 Web LCT automatically adds the NE to
the NE list and logs in to it.
e. Click OK.
NOTE
Use IP auto discovery when GNE IP Domain or GNE IP Address cannot be correctly entered.
l IP auto discovery can obtain the GNE IP address and search out all the NEs connected to the
GNE.
l IP auto discovery applies only when the U2000 Web LCT and NEs are connected directly.
l If the U2000 Web LCT and a NE are connected through a router, you need to create an NE by
using the IP address of the GNE.
a. In the NE list, click NE Search and choose Advanced Search.
b. In the Search NE dialog box, select IP auto discovery from the Manage Domain
drop-down list box.
c. Set User name and Password.
NOTE
The default NE user name is lct and default password is Changeme_123. If the NE user
name or password has been changed, use the actual user name or password of the NE.
d. Click Search
NOTE
When the search is in progress, you can click End Search as needed.
IF some NEs can not be obtain by IP auto discovery , possible reasons are as follows:
l The NEs are connected to the U2000 Web LCT through a router.
l Firewall or antivirus software is set incorrectly.
l The port 8001 or 8002 for the NE search is occupied.
l There are tow or more network cards exists in the PC that U2000 Web LCT installed,
and the network card that connected with the NE is not the current default card.
e. After the search is completed, select an NE in the search results and click Add NE.
A message is displayed, indicating that the NE is successfully added.
f. Click OK.
The NE is displayed in the NE list.
g. Optional: In the Search NE dialog box, select one or more non-gateway NEs and
click Set Gateway NE to set them as GNEs.
----End
Follow-up Procedure
To prevent unauthorized operations on the newly created NE, change the password for the NE
user immediately. During routine maintenance, change the password regularly.
If login failure occurs on the newly created NE, possible causes are:
l The password for the NE user is incorrect. In this situation, enter the correct password.
l The NE user is invalid or has logged in. In this situation, switch to another NE user.
Prerequisites
l The U2000 Web LCT is properly communicating with NEs.
l The NE ID is known.
Context
l There are two methods for creating NEs: creating NEs through NE search and creating
NEs manually. Generally, NE IDs are unknown during the initial NE configuration.
These NEs must be created through NE search.
l SSL Gateway is recommended because of its higher security than others.
NOTE
Procedure
Step 1 In the NE list, click Add NE.
Step 2 In the Add NE dialog box, set NE attributes based on Table 4-1.
User Name l For global NEs, the MSTP, WDM, WDM (NA),
default NE user is lct and RTN, RTN (NA), Submarine
Password the initial password is
Changeme_123.
l For WDM (NA) NEs ,
the default NE user is
SONET and the initial
password is
Changeme_123.
----End
Follow-up Procedure
To prevent unauthorized operations on the newly created NE, change the password for the NE
user immediately. During routine maintenance, change the password regularly.
If login failure occurs on the newly created NE, possible causes are:
l The NE cannot communicates with the U2000 Web LCT. In this situation, check the
communication parameters of the NE, such as the NE ID and IP address.
l The password for the NE user is incorrect. In this situation, enter the correct password.
l The NE user is invalid or has logged in. In this situation, switch to another NE user.
5 Logging In to an NE
After an NE is created, you need to log in to the NE before managing the NE.
Prerequisites
l The NE has been created.
l The U2000 Web LCT is properly communicating with the NE.
Procedure
Step 1 In the NE List, select an NE and click NE Login.
NOTE
Step 2 In the NE Login dialog box, set User Name and Password and click OK.
The Login Status of the NE changes from Not Logged In to Logged In. The Alarm Status
of the NE changes from Unknown to the actual alarm status.
Step 3 Click NE Explorer.
NOTE
l View legends to understand the meanings of different colors and symbols in the slot layout diagram.
----End
Parameters
Parameter Value Range Default Value Description
User Name - lct Indicates the user name of the NE. Keep
the default name during your first-time
login.
Use same user Selected or cleared Cleared Specifies whether to use the same user
name and password name and password to log in to all NEs.
to login
Use the user name Selected or cleared Cleared Specifies whether to use the last user name
and password that and password to log in to the NE.
was used last time
6 FAQs
6.1 What Do I Do If the U2000 Web LCT Login Page Does Not Open up Automatically?
6.2 What Do I Do If My Browser Is Closed Unexpectedly upon U2000 Web LCT Login?
6.3 What Do I Do If "There is a problem with this website's security certificate" Is Displayed
upon U2000 Web LCT Login?
6.4 Why Cannot I Access U2000 Web LCT Through a Browser?
6.5 How Do I Switch Among Different U2000 Web LCT Versions?
6.6 What Do I Do If Internet Explorer Cannot Display Elements or Information Completely?
6.7 What Do I Do If Internet Explorer Cannot Be Correctly Refreshed or Gives No Response?
6.8 What Do I Do If the U2000 Web LCT Displays "LCT access disabled" When I Add an
NE?
6.9 Why Is NE Communication Status Abnormal in the NE List?
Answer
l Internet Explorer settings are incorrect.
a. Double-click the Internet Explorer icon on the desktop.
b. Choose Tools > Internet Options from the main menu.
c. On the General tab of the Internet Options dialog box, click Settings in the
Browsing history area.
d. In the Temporary Internet Files and History Settings dialog box, click the Every
time I visit the webpage option button and click OK.
e. In the Internet Options dialog box, click the Privacy tab, clear the Turn on Pop-
up Blocker check box, and click Apply.
f. In the Internet Options dialog box, click the Connections tab and click LAN
settings.
g. In the Local Area Network (LAN) Settings dialog box, clear the Use a proxy
server for your LAN (These settings will not apply to dial-up or VPN
connections) check box in the Proxy server area and click Apply.
NOTE
If your computer demands a proxy server, click Advanced in the Proxy server area. In the
dialog box that is displayed, add the IP address of the U2000 Web LCT server to the text box
in the Exceptions area and click OK.
h. Optional: In the Internet Options dialog box, click the Programs tab, select the
Tell me if the Internet Explorer is not default web browser. check box, and click
Apply. Skip this step in Windows 10.
i. In the Internet Options dialog box, click OK.
j. Restart Internet Explorer and set Internet Explorer as the default browser when
prompted.
l Environment variable settings are incorrect. To start U2000 Web LCT, explorer.exe is
invoked. explorer.exe is located in %SystemRoot% by default, and %SystemRoot%
is contained in the environment variable Path. Due to some reasons, the directory of
explorer.exe may be missing from Path. In that event, the U2000 Web LCT login page
cannot open up.
a. Search for explorer.exe and record its location, which is C:\WINDOWS by
default.
b. Right-click Computer on the desktop and choose Properties from the shortcut
menu.
c. Click Advanced system settings.
d. On the Advanced tab of the System Properties dialog box, click Environment
Variables.
e. In the Environment Variables dialog box, check for Path in the System variables
area.
n If Path does not exist, create it and set it to %SystemRoot%
\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;D:
\PROGRA~1\ULTRAE~1.
n If Path exists, check whether its value contains %SystemRoot%
\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;D:
\PROGRA~1\ULTRAE~1. If not, add these environment variables. Then add
the directory (C:\WINDOWS by default) of explorer.exe to Path.
----End
Answer
Possible causes:
l The U2000 Web LCT decompression directory contains Chinese characters, spaces, or
other special characters.
l Internet Explorer settings are incorrect.
Step 1 Check the name of the U2000 Web LCT decompression directory. Ensure that the name
contains only letters and digits and is free of Chinese characters, spaces, and other special
characters.
7. In the Local Area Network (LAN) Settings dialog box, clear the Use a proxy server
for your LAN (These settings will not apply to dial-up or VPN connections) check
box in the Proxy server area and click Apply.
NOTE
If your computer demands a proxy server, click Advanced in the Proxy server area. In the dialog
box that is displayed, add the IP address of the U2000 Web LCT server to the text box in the
Exceptions area and click OK.
8. Optional: In the Internet Options dialog box, click the Programs tab, select the Tell
me if the Internet Explorer is not default web browser. check box, and click Apply.
Skip this step in Windows 10.
9. In the Internet Options dialog box, click OK.
10. Restart Internet Explorer and set Internet Explorer as the default browser when
prompted.
Step 3 If Internet Explorer settings are correct, check whether third-party plug-ins and antivirus
software are installed and whether the pop-up window and advertisement blocker is enabled.
If yes, uninstall the plug-ins and software and disable the pop-up window and advertisement
blocker.
1. Choose Start > Control Panel.
2. Select Large icons or Small icons from the View by drop-down list and click Programs
and Features.
3. Select the desired plug-in or software and click Uninstall.
----End
Answer
Possible causes:
HTTPS certificates have not been installed.
Step 1 Follow section 1.4.4 Installing Security Certificates to install HTTPS certificates.
----End
Answer
Probable cause:
The current browser version is not supported by the U2000 Web LCT.
Step 1 Select a supported browser version. Supported browser versions are listed in section 1.1.1
Hardware and Software Requirements.
Step 2 If none of these supported browser versions is available, install a supported version.
----End
Answer
Probable cause:
The cache of Internet Explorer is not cleared or the U2000 Web LCT server runs abnormally.
l Method 1: Clear the cache of Internet Explorer. The following procedure uses Internet
Explorer 8.0 as an example.
a. Choose Tools > Internet Options from the main menu of Internet Explorer.
b. In the Internet Options dialog box, click Settings in the Browsing history area.
c. In the Temporary Internet Files and History Settings dialog box, click the Every
time I visit the webpage option button and click OK.
d. In the Internet Options dialog box, click Delete in the Browsing history area.
e. In the Delete Browsing History dialog box, select all check boxes.
f. Click Delete.
g. In the Internet Options dialog box, click OK.
l Method 2: Restart the U2000 Web LCT server. Take this method if method 1 does not
work.
a. Shut down the U2000 Web LCT. For details, see section 3.4 Shutting Down U2000
Web LCT.
b. Start the U2000 Web LCT. For details, see section 3.2 Starting U2000 Web LCT.
l Method 3: Contact Huawei engineers to replace the OS or server and then reinstall the
U2000 Web LCT. Take this method if methods 1 and 2 do not work.
----End
Answer
l Method 1: Open Internet Explorer and maximize it.
l Method 2: Change the screen resolution to 1680*1050. The following procedure uses
Windows 7 as an example.
a. On the desktop, right-click in a blank area and choose Screen resolution from the
shortcut menu.
b. Select 1680*1050 from the Resolution drop-down list.
c. Click OK.
----End
Answer
l Method 1: Restart Internet Explorer.
a. Close Internet Explorer.
b. Start Internet Explorer.
l Method 2: Restart the U2000 Web LCT.
a. Double-click the Decompression directory\WebLCT\stopweblct.bat script.
b. Double-click the Decompression directory\WebLCT\startweblct.bat script.
----End
Answer
Step 1 Log in to another NMS (such as U2000 or other U2000 Web LCT) to which the NE has been
successfully added.
Step 2 Open the NE Explorer and choose Security > LCT Access Control from the navigation tree.
Step 3 In the right pane, click Access Allowed to enable the U2000 Web LCT to access the NE.
Step 4 Log in to the U2000 Web LCT and add the NE again.
----End
Answer
The U2000 Web LCT is disconnected from the NE. Because the U2000 Web LCT cannot
automatically reconnect to NEs, Communication Status of the disconnected NE is always
Abnormal.
To resolve this problem, do as follows:
Step 2 In the NE list, right-click the NE and choose Reconnect from the shortcut menu.
l After the U2000 Web LCT successfully reconnects to the NE, Communication Status
of the NE changes to Normal.
l If Communication Status is still Abnormal, verify that the NE has been started and its
network connection is normal.
----End
This appendix describes service ports of the U2000 Web LCT, related precautions, and how to
query the service ports.
A.1 Background
This section describes the service ports used by U2000 Web LCT.
To ensure the network security, the customer's network needs to take security hardening
measures. The following are the two cases that affect the network security:
l Security filtering settings such as routers or firewalls are configured in the network
environment where the U2000 Web LCT runs. When carrying out the project, avoid the
service ports used by the U2000 Web LCT being filtered out by those security filtering
settings.
l Some service ports providing system services are disabled to prevent network or virus
attacks. Note that the service ports used by the U2000 Web LCT should not be disabled.
Otherwise, the U2000 Web LCT will fail to run properly.
A.2 Precautions
In the practical communication process, the source end (server) and the sink end (client) use
relevant ports. Usually you only need to specify the source port, and the sink port is
dynamically created.
Note the following during the project implementation:
l The service ports used by the U2000 Web LCT cannot be disabled.
l If there are routers or firewalls between the source and sink ends, check all ports used by
the source and sink ends and ensure that they can be enabled, so that the source end can
communicate with the sink end properly.
Procedure
Run the following command to view the Windows system service ports:
netstat -a
B Glossary
Numerics
4K See 4K resolution.
4K resolution (4K) 4K is a digital video format defined by the International Telecommunication Union
(ITU). It is a new standard that originated from digital movies produced by
Hollywood movie makers. 4K has become the common name for ultra high definition
or ultra HD, and its resolutions include 3840 x 2160 and 4096 x 2160. Compared with
1080p full HD content, 4K content provides more refined details and greater texture,
bringing subscribers a better cinematic experience.
A
ARP See Address Resolution Protocol.
Address Resolution An Internet Protocol used to map IP addresses to MAC addresses. The ARP protocol
Protocol (ARP) enables hosts and routers to determine link layer addresses through ARP requests and
responses. The address resolution is a process by which the host converts the target IP
address into a target MAC address before transmitting a frame. The basic function of
ARP is to use the target equipment's IP address to query its MAC address.
administrator A user who has authority to access all EMLCore product management domains. This
user has access to the entire network and all management functions.
alarm indication A mechanism to indicate the alarm status of equipment. On the cabinet of an NE, four
differently-colored indicators specify the current status of the NE. When the green
indicator is on, the NE is powered on. When the red indicator is on, a critical alarm
has been generated. When the orange indicator is on, a major alarm has been
generated. When the yellow indicator is on, a minor alarm has been generated. The
ALM alarm indicator on the front panel of a board indicates the current status of the
board.
alarm monitoring A set of functions that enables the monitoring or interrogation (or both) of the
telecommunications network concerning alarm-related events or conditions.
alarm severity The significance of a change in system performance or events. According to ITU-T
recommendations, an alarm can have one of the following severities: Critical, Major,
Minor, Warning.
alarm status Alarm states are defined based on alarm acknowledgement and clearance. Alarms
have four states based on alarm acknowledgement and clearance, including
unacknowledged and uncleared, acknowledged and uncleared, unacknowledged and
cleared, acknowledged and cleared.
alarm suppression A method to suppress alarms for the alarm management purpose. Alarms that are
suppressed are no longer reported from NEs.
association A logical relation (channel) for data transmission which is set up by two SCTP
endpoints through the four-way startup handshake mechanism of SCTP.
B
BMS business management system
bit error alarm A bit error limit which when exceeded will trigger an alarm on the equipment. The
threshold threshold can be classified as crossing threshold and defect threshold.
bound path A parallel path with several serial paths bundled together. It improves the data
throughput capacity.
bridge A device that connects two or more networks and forwards packets among them.
Bridges operate at the physical network level. Bridges differ from repeaters because
bridges store and forward complete packets, while repeaters forward all electrical
signals. Bridges differ from routers because bridges use physical addresses, while
routers use IP addresses.
broadcast A means of delivering information to all members in a network. The broadcast range
is determined by the broadcast address.
C
CF compact flash
CLI See command-line interface.
COM See component object model.
CSES consecutive severely errored second
CSS domain (Domain) A CSS storage domain is a storage space created using two MDSs and multiple OSNs
in CSS-Father CSS -F contains a maximum of 128 domains.
Contact A header field used in the INVITE request, ACK request, REGISTRER request,
successful response, call progress response and redirection response. Its value shows
the address that is used to communicate with users through subsequent messages.
certificate The certificate, also called the digital certificate, establishes the association between
the user identity and user public key. The certificate is issued by the third-party
authority, and provides identity authentication for the communications parties.
channel A telecommunication path of a specific capacity and/or speed between two or more
locations in a network. The channel can be established through wire, radio
(microwave), fiber, or any combination of the three. The amount of information
transmitted per second in a channel is the information transmission speed, expressed
in bits per second. For example, b/s (100 bit/s), kb/s (103 bit/s), Mb/s (106 bit/s), Gb/s
(109 bit/s), and Tb/s (1012 bit/s).
command-line A means of communication between a program and its user, based solely on textual
interface (CLI) input and output. Commands are input with the help of a keyboard or similar device
and are interpreted and executed by the program. Results are output as text or graphics
to the terminal.
component object The software components themselves may be specified at different times by different
model (COM) specification groups, yet the integration of all of the pieces must work together.
conference An IP multimedia session that has two or more participants. Each conference has a
focus and can be identified uniquely.
configuration script A collection of the command lines in a data file according to which the variable values
of a template are assigned. The configuration script can be either a complete script or a
script snippet.
connection point A reference point where the output of a trail termination source or a connection is
bound to the input of another connection, or where the output of a connection is bound
to the input of a trail termination sink or another connection. The connection point is
characterized by the information which passes across it. A bidirectional connection
point is formed by the association of a contradirectional pair.
D
DCC digital color code
DCN See data communication network.
DST daylight saving time
Domain See CSS domain.
data communication A communication network used in a TMN or between TMNs to support the data
network (DCN) communication function.
digital signature A message signed with a sender's private key that can be verified by anyone who has
access to the sender's public key. Digital signature gives the receiver the reason to
believe the message was sent by the claimed sender. A proper implementation of
digital signature is computing a message digest for the message sent from the sender
to the receiver, and then signing the message digest. The result is called digital
signature and is sent to the receiver together with the original message.
driver package A driver package is the collection of files used to install a driver. The package includes
an INF file, and files and binaries referred to by that INF.
E
ECC See error checking and correction.
EMS See enhanced messaging service.
enhanced messaging An application-level extension to SMS for mobile phones available on GSM, TDMA,
service (EMS) and CDMA networks. To be specific, EMS messages contain special text formatting
(such as bold or italic), animations, pictures, icons, sound effects, and special ring
tones.
entity A part, device, subsystem, functional unit, equipment, or system that can be
considered individually.
error checking and A technique used for detecting and correcting errors by adding check bits to the source
correction (ECC) bits. If the source data has eight bits, five check bits are required to perform error
checking and correction. When the data bits are doubled every time, one more check
bit is required. Compared with the parity check, the ECC can not only detect but also
correct errors. This improves the reliability of data storage. This technique can be used
in the ECC memory to improve the security and reliability of the memory.
error message A kind of base data. The message that the system prompts for the operator when the
operator performs the operation incorrectly or when an error occurs in the system.
Each error message has an ID.
G
GB gain bandwidth
gateway address The gateway address (or default gateway) is a router interface connected to the local
network that sends packets out of the local network. The gateway has a physical and a
logical address.
graph A graph is used to process data in a specific way. To be specific, a graph is used to
read data from the source system, filter, calculate, group, and summarize the data,
process data inconsistency if any, and delete invalid data to obtain data that meets
requirements of the target system, and then load the data to the target system.
Components, ports, and lines are connected to each other to form a graph, which
contains transformations and jobs.
H
HTTP Hypertext Transfer Protocol
HTTPS See Hypertext Transfer Protocol Secure.
Hypertext Transfer An HTTP protocol that runs on top of transport layer security (TLS) and Secure
Protocol Secure Sockets Layer (SSL) for secured transactions. It is used to establish a reliable channel
(HTTPS) for encrypted communication and secure identification of a network web server.
HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a
connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets
Layer. The main motivation for HTTPS is authentication of the visited website and
protection of the privacy and integrity of the exchanged data.
historical performance Performance data that is stored in the history register or that has been automatically
data reported and stored in the network system.
I
ID See inventory data.
IE signaling information element
indicator Description of a performance feature collected from the managed devices by the
performance collector.
installation directory The installation directory is the directory where the program file is stored.
inventory data (ID) The physical asset information and important logical configuration information of the
entire network devices.
J
JRE See Java runtime environment.
Java runtime A Java platform on which applications can run, be tested, or be transferred. JRE
environment (JRE) includes Java virtual machines (JVMs), Java platform core classes, and support files.
jitter The measure of short waveform variations caused by vibration, voltage fluctuations,
and control system instability.
K
key file A keyfile (or key-file) is a file on a computer which contains encryption or license
keys.
L
LAN See local area network.
LCT local craft terminal
Lock The Lock function allows subscribers to control or block access to programs. After a
parent locks content inappropriate for underage family members, all family members
must enter the password to watch the content. The Lock function is associated with the
Multi-profile and Parental Control functions. Different from the Parental Control
function, the Lock function allows subscribers to specify family members' permission
to play certain content. In the Parental Control function, the carrier or CP specifies the
content rating when bringing content online, and subscribers can set parental control
levels for family members. Family members are required to enter the password to
watch content only when their parental control levels are lower than the content rating.
For example, carriers consider that cartoons are appropriate for kids, but if parents do
not want their children to spend too much time watching cartoons, they can set content
locks for cartoons.
layer A concept used to allow transport network functionality to be described hierarchically
as successive levels; each layer being solely concerned with the generation and
transfer of its characteristic information.
local area network A network formed by the computers and workstations within the coverage of a few
(LAN) square kilometers or within a single building, featuring high speed and low error rate.
Current LANs are generally based on switched Ethernet or Wi-Fi technology and run
at 1,000 Mbit/s (that is, 1 Gbit/s).
M
MD See maintenance domain.
MDP message dispatch process
MSTP See Multiple Spanning Tree Protocol.
MUX See multiplexer.
Multiple Spanning A protocol that can be used in a loop network. Using an algorithm, the MSTP blocks
Tree Protocol (MSTP) redundant paths so that the loop network can be trimmed as a tree network. In this
case, the proliferation and endless cycling of packets is avoided in the loop network.
The protocol that introduces the mapping between VLANs and multiple spanning
trees. This solves the problem that data cannot be normally forwarded in a VLAN
because in STP/RSTP, only one spanning tree corresponds to all the VLANs.
maintenance domain The network or the part of the network for which connectivity is managed by
(MD) connectivity fault management (CFM). The devices in a maintenance domain are
managed by a single Internet service provider (ISP).
mask off To use a mask to remove bits from a byte of data.
multiplexer (MUX) Equipment that combines a number of tributary channels onto a fewer number of
aggregate bearer channels, the relationship between the tributary and aggregate
channels being fixed.
multiplexing A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
N
NA numerical aperture
NE ID An ID that indicates a managed device in the system. In the network, each NE has a
unique NE ID.
NE commissioning After an NE is installed and powered on, and obtains transfer resources, the operation
and maintenance personnel need to configure data and test the NE performance to
ensure the normal operation of the NE. This process is called commissioning.
NMS See network management system.
NSAP See network service access point.
navigation tree Find a topic through the navigator tree. The navigator tree is designed according to the
habits of the operator when performing routine operations and maintenance. You can
find a desired topic by using the navigator tree on the Contents tab.
network management A system in charge of the operation, administration, and maintenance of a network.
system (NMS)
network segment Part of a network on which all message traffic is common to all nodes; that is, a
message broadcast from one node on the segment is received by all other nodes on the
segment.
network service access A network address defined by ISO, at which the OSI Network Service is made
point (NSAP) available to a Network service user by the Network service provider.
O
OAM See operation, administration and maintenance.
OS See order status.
OSI open systems interconnection
OSN optical switch node
OSPF See Open Shortest Path First.
P
PDH See plesiochronous digital hierarchy.
packet loss The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
patch An independent software unit used for fixing the bugs in software.
performance register The memory space for performance event counts, including 15-min current
performance register, 24-hour current performance register, 15-min historical
performance register, 24-hour historical performance register, UAT register and CSES
register. The object of performance event monitoring is the board functional module,
so every board functional module has a performance register. A performance register
is used to count the performance events taking place within a period of operation time,
so as to evaluate the quality of operation from the angle of statistics.
performance threshold A limit for generating an alarm for a selected entity. When the measurement result
reaches or exceeds the preset alarm threshold, the performance management system
generates a performance alarm.
physical layer Layer 1 in the Open System Interconnection (OSI) architecture; the layer that provides
services to transmit bits or groups of bits over a transmission link between open
systems and which entails electrical, mechanical and handshaking.
plesiochronous digital A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the
hierarchy (PDH) minimum rate 64 kit/s into rates of 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s.
pointer An indicator whose value defines the frame offset of a virtual container with respect to
the frame reference of the transport entity on which this pointer is supported.
product A resource that a carrier provides for customers by means of transactions, sales, or
lease to gain profits. Products include entities, content, and services. Products can be
sold only after being priced as offerings.
public key A public key is the key known to everyone and is used together with the private key. A
public key can encrypt a session key, verify the digital signature, or encrypt data that
can be decrypted using a private key. A public key and a private key are a key pair
calculated using an algorithm. The public key is open to the public, whereas the
private key is confidential. The key pair calculated using this algorithm is unique in
the world. If a key in the key pair encrypts a piece of data, the data can only be
decrypted by the other key in the key pair.
R
RJ registered jack
RS232 See Recommended Standard 232.
RSA See Rack Scale Architecture.
Rack Scale Intel presents Intel RSA as a single entity that is made up of a number of other
Architecture (RSA) technologies/efforts; specifically, Intel RSA is typically presented as: •Disaggregation
of the compute, memory, and storage capacity in a rack •Silicon photonics as a low-
latency, high-speed rack-scale fabric •Some software that combines disaggregated
hardware capacity over a rack-scale fabric to create "pooled systems".
Recommended A standard that defines the electrical characteristics, timing, and meaning of signals,
Standard 232 (RS232) and the physical size and pinout of connectors.
relationship A graphic method of demonstrating the relationships of the following logical
consecution: host - application - (file system) - disk - LUN - storage device.
routing The determination of a path that a data unit (frame, packet, message) traverses from
source to destination.
S
SAN See storage area network.
SCC synchronous common channel
SD See standard definition.
SDH See synchronous digital hierarchy.
SF sampling frequency
SLM signaling link management
SNMS subnetwork management system
SONET See synchronous optical network.
SSID See service set identifier.
SSL See Secure Sockets Layer.
STM-N Synchronous Transport Module level N
Secure Sockets Layer A security protocol that works at a socket layer. This layer exists between the TCP
(SSL) layer and the application layer to encrypt/decode data and authenticate concerned
entities.
synchronous optical A high-speed network that provides a standard interface for communications carriers
network (SONET) to connect networks based on fiber optical cable. SONET is designed to handle
multiple data types (voice, video, and so on). It transmits at a base rate of 51.84
Mbit/s, but multiples of this base rate go as high as 2.488 Gbit/s.
T
TCP/IP Transmission Control Protocol/Internet Protocol
TL1 Transaction Language 1
TMN See telecommunications management network.
telecommunications A protocol model defined by ITU-T for managing open systems in a communications
management network network. TMN manages the planning, provisioning, installation, and OAM of
(TMN) equipment, networks, and services.
term Duration of a subscription.
threshold A limitation on an amount, scale, or level. Changes will occur when a threshold is
reached.
traffic The product of the number of calls made and received and the average duration of
each call in a measurement period.
transfer A process of transferring the account balance of an account to another account.
U
UAT See unavailable time event.
unavailable time event An event that is reported when the monitored object generates 10 consecutive severely
(UAT) errored seconds.
user management Managing users, including: adding, querying, modifying, and deleting users and
assigning or canceling user rights
user security A function collection of login management, authority management, information
management, and log management.
V
VC video codec
VLAN See virtual local area network.
VPN virtual private network
verification code A figure containing numbers and letters generated randomly when you access a page.
You must enter the numbers and letters. This avoids violent cracking and malicious
ads.
virtual local area A logical grouping of two or more nodes which are not necessarily on the same
network (VLAN) physical network segment but which share the same IP network number. This is often
associated with switched Ethernet.
W
WTR See wait to restore.
Web LCT The local maintenance terminal of a transport network, which is located at the NE
management layer of the transport network.
Wi-Fi See Wireless Fidelity.
Wireless Fidelity (Wi- A short-distant wireless transmission technology. It enables wireless access to the
Fi) Internet within a range of hundreds of feet wide.
wait to restore (WTR) The number of minutes to wait before services are switched back to the working line.
wavelength The distance between successive peaks or troughs in a traveling wave, that is, the
distance over which a wave is transmitted within a vibration period.
Z
zone A collection of Fibre Channel N_Ports and/or NL_Ports (i.e., device ports) that are
permitted to communicate with each other via the fabric. Any two N_Ports and/or
NL_Ports that are not members of at least one common zone are not permitted to
communicate via the fabric. Zone membership may be specified by: 1) port location
on a switch, (i.e., Domain_ID and port number); or, 2) the device's N_Port_Name; or,
3) the device's address identifier; or, 4) the device's Node_Name. Well-known
addresses are implicitly included in every zone.