Professional Documents
Culture Documents
Toaz - Info Optix Osn 550 Configuration Guide v100r003 PR
Toaz - Info Optix Osn 550 Configuration Guide v100r003 PR
Transmission System
V100R003C00
Configuration Guide
Issue 02
Date 2011-06-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document describes procedures for service configurations on the OptiX OSN 550, including
basic concepts, networking diagrams, signal flow and timeslot allocation of services.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
TIP Indicates a tip that may help you solve a problem or save
time.
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
6 Equipment Information............................................................................................................6-1
6.1 Service Support Capability of Ethernet Boards.............................................................................................. 6-2
6.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards........................................................6-2
6.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards...................................................6-3
7 List of Parameters.......................................................................................................................7-1
7.1 Port Attributes (Ethernet Port)........................................................................................................................ 7-6
7.2 Maximum Frame Length (Ethernet Port Attribute)........................................................................................ 7-7
7.3 Non-Autonegotiation Flow Control Mode (Ethernet Port Attribute)..............................................................7-8
7.4 Autonegotiation Flow Control Mode (Ethernet Port Attribute)......................................................................7-9
7.5 MAC Loopback (Ethernet Port Attribute)....................................................................................................7-10
7.90 LPT..............................................................................................................................................................7-74
7.91 Bearer Mode................................................................................................................................................7-74
7.92 Port-Type Port Hold-Off Time (ms)...........................................................................................................7-75
7.93 VCTRUNK Port Hold-off Time (ms).........................................................................................................7-76
7.94 Protocol Enable (IGMP Snooping Protocol)...............................................................................................7-76
7.95 Multicast Aging Time(Min)........................................................................................................................7-77
7.96 Frames to Send............................................................................................................................................7-78
7.97 Status...........................................................................................................................................................7-78
7.98 Set Frame Count..........................................................................................................................................7-79
7.99 Received Response Test Frame Count........................................................................................................7-80
7.100 Test Frames to Receive.............................................................................................................................7-80
7.101 Send Mode (Ethernet Test).......................................................................................................................7-81
7.102 Call Waiting Time(s).................................................................................................................................7-82
7.103 Conference Call.........................................................................................................................................7-82
7.104 Phone.........................................................................................................................................................7-83
7.105 Available Orderwire Port..........................................................................................................................7-84
7.106 No.(F1 Data Port)......................................................................................................................................7-85
7.107 Data Channel (F1 Data Port).....................................................................................................................7-85
7.108 Overhead Byte (Broadcast Data Port).......................................................................................................7-86
7.109 Working Mode (Broadcast Data Port)......................................................................................................7-87
7.110 Broadcast Data Source (Broadcast Data Port)..........................................................................................7-88
7.111 Broadcast Data Sink (Broadcast Data Port)..............................................................................................7-88
7.112 External Clock Output Mode When 2M Output Synchronous Source Is Invalid.....................................7-89
7.113 External Clock Output Mode....................................................................................................................7-90
7.114 External Clock Output Timeslot...............................................................................................................7-91
7.115 External Source Output Threshold............................................................................................................7-92
7.116 2M Phase-Locked Source Fail Condition.................................................................................................7-94
7.117 2M Phase-Locked Source Fail Action......................................................................................................7-95
7.118 Clock Source Threshold............................................................................................................................7-96
7.119 AIS Alarm Generated................................................................................................................................7-97
7.120 B1 BER Threshold-Crossing Generated...................................................................................................7-98
7.121 B2-EXC Alarm Generated........................................................................................................................7-99
7.122 Higher Priority Clock Source Reversion Mode......................................................................................7-100
7.123 Clock Source WTR Time........................................................................................................................7-101
7.124 Lock Status..............................................................................................................................................7-101
7.125 Synchronous Source................................................................................................................................7-102
7.126 S1 Byte Synchronization Quality Information........................................................................................7-103
7.127 NE Clock Working Mode.......................................................................................................................7-104
7.128 Data Output Method in Holdover Mode.................................................................................................7-105
7.129 Retiming Mode........................................................................................................................................7-106
7.130 Switching Mode (MSP)...........................................................................................................................7-107
A.1 Numerics........................................................................................................................................................A-3
A.2 A....................................................................................................................................................................A-3
A.3 B....................................................................................................................................................................A-5
A.4 C....................................................................................................................................................................A-7
A.5 D....................................................................................................................................................................A-9
A.6 E...................................................................................................................................................................A-10
A.7 F...................................................................................................................................................................A-12
A.8 G..................................................................................................................................................................A-14
A.9 H..................................................................................................................................................................A-15
A.10 I..................................................................................................................................................................A-15
A.11 J..................................................................................................................................................................A-17
A.12 L.................................................................................................................................................................A-17
A.13 M................................................................................................................................................................A-18
A.14 N................................................................................................................................................................A-20
A.15 O................................................................................................................................................................A-21
A.16 P.................................................................................................................................................................A-22
A.17 Q................................................................................................................................................................A-24
A.18 R................................................................................................................................................................A-24
A.19 S.................................................................................................................................................................A-26
A.20 T.................................................................................................................................................................A-29
A.21 U................................................................................................................................................................A-30
A.22 V................................................................................................................................................................A-31
A.23 W...............................................................................................................................................................A-31
Figures
Tables
1 Getting Started
The following topices introduce some preparation operations that will ensure a smooth, trouble-
free launch of the U2000.
Context
l You are recommended to start the computer and theU2000 application in the following
sequence: Start the computer, start theU2000 server, and then start theU2000 client.
l You are recommended to shut down theU2000 application and the computer in the
following sequence: Exit theU2000 client, stop theU2000 server, and then shut down the
computer.
1.1.1 Starting the U2000 Server
For network management first start theU2000 server, and then start theU2000 application.
1.1.2 Logging In to the U2000 Client
To manage networks through the U2000 client graphical user interface, you need to use
theU2000 client to log in to the U2000 server.
1.1.3 Exiting a U2000 Client
Before shutting down the U2000 server, you must exit the U2000 client.
1.1.4 Shutting Down the U2000 Server
When the U2000 server is managing the system normally, do not perform this operation. In
special circumstances, for example, when modifying the system time of the computer where the
U2000 resides, or when upgrading the version, you can use the System Monitor Client to shut
down the U2000 server.
Prerequisite
l The computer time must be set correctly.
l The computer where theU2000 is installed must be started correctly.
l The operating system of theU2000 server must be running correctly and the database must
be started normally.
l TheU2000 license must be in the server directory.
l The instance must be deployed.
Procedure
NOTE
----End
Prerequisite
The U2000 server must be started correctly.
Procedure
Step 1 Double-click the U2000 Client shortcut icon.
Step 2 In the Login dialog box, enter the user name and password. The user name is admin and the
password is null by default. Change the password of the default user at the first login. Then,
click Login.
Step 3 Optional: For the first login, you need to configure the access control list of the system.
----End
Prerequisite
The U2000 client must be started normally.
Procedure
Step 1 Choose File > Exit from the main menu.
If the layout of the view is changed and not saved, the Confirm dialog box appears asking you whether to
save the changes. After you confirm the dialog box, automatically exit the client.
----End
Prerequisite
All the U2000 clients connected to the U2000 server must be shut down.
Procedure
Step 1 From the Main Menu of System Monitor Client, choose System > Stop All NMS Services to
close all processes of the U2000 server.
Step 2 Click OK in the confirmation dialog box. Wait until the U2000 core process, and the processes
that are optional according to the actual situation are in the Stopped state. Now the U2000 server
is shut down successfully.
Now you cannot shut down the MDP process or initialize the database.
Step 3 Click OK in the confirmation dialog box. Wait until the U2000 processes are all in Stopped
status. Now the server is shut down successfully.
Now you cannot shut down the MDP process or initialize the database.
----End
3
6
Menu Bar
The menu bar provides the entries to all the functions of the U2000 client. It consists of the
following menus: File, Fault, Performance,Configuration, Service, Inventory,
Administration, Window, and Help. In the topology window, the menu bar also provides the
Edit and View menu items.
Toolbar
The toolbar provides the shortcut icons for major operation tasks. The shortcut icons are as
follows:
l : Log Out.
l : Creates fiber.
l : NE Explorer.
l : Main Topology.
Workbench list
You can create or modify a workbench through the shortcut icons.
Output Pane
The output pane displays the returned information and other relevant information.
Status Bar
The status bar displays the information such as the system status, the login users, and the IP
address of the connected server. The information displayed from left to right is as follows:
l Coordinate information: Displays the current position of the cursor.
l Connection information: Displays the name and IP address of the server.
l Login user: Displays the name of the login user.
l Connection duration: Displays the duration of the connection between the client and the
server.
l Login mode: Displays the login mode. It can be single-user mode and multi-user mode.
l Operation prompt: Displays the result of the operation.
l Logo: Displays the logo of Huawei Technologies Co., Ltd.
Workbench
The shortcut icons on the workbench help you perform operations.
Component Example
Button
Shortcut icon
Radio button
Check box
Tab
Field
Drop-down
menu
Menu
Function Tree
Dialog box
Button Functionality
Button Functionality
You can customize the toolbar so that only the frequently-used buttons are displayed on the
toolbar. To customize the toolbar, right-click the toolbar and choose a menu item from the
shortcut menu.
Alarm List Area Views the alarm list area in the lower
part of the Main Topology.
Enter Confirms the operation or moves downward to the next line. If the
cursor is on a button, pressing Enter means to confirm the operation.
If the cursor is in the list box, press Enter once and the cursor then
moves downward to the next line.
Ctrl+F Searches resources such as the NEs, subnets, cards, frames, interfaces,
and VLANs in basic and rapid modes by pressing Ctrl+F in all views.
Ctrl+A Selects all NEs or selects all contents in the list. If the cursor is in the
view, press Ctrl+A to select all NEs. If the cursor is in the list box,
press Ctrl+A to select all contents in the list.
1.2.6.1 Workbench
This topic describes the workbench. After a client is started, the system automatically accesses
the default workbench. The default shortcut icons are displayed on the workbench.
1.2.6.2 Main Topology
This topic describes the items in the Main Topology. All topology management functions can
be accessed through the Main Topology in . These functions include creating topological objects,
subnets, searching for the existing equipment in the network. You can search, view, create, set,
and manage subnets; and search, create, configure, and maintain management functions on trails.
1.2.6.3 NE Explorer
The NE Explorer is the main user interface used to manage equipment. In the NE Explorer, a
user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, the user can just select the object and then choose a desired
function in the Function Tree.
1.2.6.4 Clock View
The Clock View provides a visible platform to enable NE clock settings, networkwide clock
synchronization status query, and clock tracing and search functions, supports the synchronous
Ethernet clock, SDH clock, TOP clock, ACR clock, TDM clock, PON clock, and E1 clock, and
applies to the MSTP, RTN ,PTN and router NE40E V3R7 equipment.
1.2.6.5 NE Panel
The NE Panel displays boards and ports in different colors depending on their current status. In
the U2000, most operations such as equipment configuration, monitoring, and maintenance are
performed in the NE Panel window.
1.2.6.6 Browse Alarm
This topic describes the user interface for viewing the current and history alarms, Alarm Logs.
In this user interface, buttons are provided, such as Filter, Synchronize, Refresh, and
Acknowledge, to help you quickly locate the alarm cause.
1.2.6.7 Browse Event
In the Browse Event window, you can view events at different levels. This window provides
buttons, such as Filter by Template, Filter and Refresh, to help you to quickly locate the alarm
cause.
1.2.6.8 Browse Performance Window
You can view the current and history performance data, UAT events and performance threshold
crossings.
1.2.6.1 Workbench
This topic describes the workbench. After a client is started, the system automatically accesses
the default workbench. The default shortcut icons are displayed on the workbench.
l In the main windows of the U2000, click the to access the workbench.
l You can do as follows to modify a workbench: Right-click the icon of the workbench and
choose Modify Workbench from the shortcut menu to modify the name or description of
a workbench.
l You can expand and order workbenches to separate the customized workbenches from the
default workbench.
l You can view the description about the function of the workbench in the background picture
of the workbench and press F1 to view the Help.
GUI
To open the Main Topology, log in to the U2000. If the preceding operation closes the Main
Topology, you can choose View > Main Topology from the main menu to open the Main
Topology. Figure 1-2 shows the Main Topology of the U2000.
1 2 3 4 5
6 7 8 9 10 11 12
7: Views the current location 8: Physical Map 9: Views the name which is
of the cursor in the Main Views the managed set by the current U2000
Topology. equipment. client, and views the IP
address of the current
On the Physics Map, you can U2000 server.
perform operations, such as
creating NEs, deleting
topology objects, NE
explorer, creating
connections, browsing
fibers/cables, configuring the
NE data, browse
performance window, and so
on.
10: Views user name of the 11: Filter Tree and Legend 12: Total elapsed time after
logged-in U2000 user In this area, you can set the the current user is logged in
currently. display types of the objects in to the U2000.
a view, and view the
descriptions of legends in the
view. To locate an operation
object quickly.
1.2.6.3 NE Explorer
The NE Explorer is the main user interface used to manage equipment. In the NE Explorer, a
user can configure, manage and maintain the NE, boards, and ports on a per-NE basis. The NE
Explorer is the main user interface for commissioning and configuration on a per-NE basis. The
NE Explorer contains a Function Tree that makes the operations easy. To display the
configuration window for an object, the user can just select the object and then choose a desired
function in the Function Tree.
NOTE
You can open a maximum of five NE Explorer windows at the same time.
GUI
l Right-click an NE on the Main Topology and choose NE Explorer from the shortcut menu.
l In the left-hand pane of the Main Topology, right-click an NE and choose NE Explorer
from the shortcut menu.
Correlation operation
GUI
Access the clock view. In the Main Topology window, select Clock View from the Current
View drop-down list. Select the NE to be queried or configured from the object tree.
Legends
l The Clock View uses continuous lines to represent the trace relations between NEs. Smaller
number indicates higher priority. The number displayed on the continuous line indicates
the priority of the traceable clock. The Clock View displays the line clock source numbers
only. Internal and tributary clock sources are also numbered, but they are not displayed in
the Clock View.
l The arrow direction in the Clock View indicates the clock tracing direction. For example,
if NE2 points to NE3, it indicates that NE3 traces the clock information transmitted from
NE2, and that NE3 traces the primary PRC NE1-External 1.
l The arrow direction in the Clock View indicates the clock tracing direction.
l An internal clock source is the clock provided by an NE, and has no trace relations with
other NEs. Therefore, internal clock sources are not displayed on the Clock View.
l Tributary clock sources have no relation with the clock sources that are not provided by
the U2000. Therefore, the clock trace relations are not displayed on the Clock View.
l On the U2000, the four clock trace relations of free-run, tracing, holdover, and invalid are
respectively identified in blue, green, yellow, and red.
l In the Clock View, you can select multiple NEs, right-click, and query the clock
synchronization status or search for clock trace relations.
NOTE
The rule of verifying an invalid clock tracing relation is as follows: First, verify whether a clock source is in the
SSM protocol mode. In the non-SSM protocol mode, verify the status of a clock source. The status directly
determines whether a clock tracing relation is invalid. In the SSM protocol mode, verify the status of a clock
source. If the status is unavailable, it indicates that the clock tracing relation is invalid. If the status is available,
you also need to verify the S1 byte (clock quality). When you manually cancel settings of the quality of the S1
byte and the quality of the S1 byte is unknown, the clock tracing relation is invalid.
1.2.6.5 NE Panel
The NE Panel displays boards and ports in different colors depending on their current status. In
the U2000, most operations such as equipment configuration, monitoring, and maintenance are
performed in the NE Panel window.
GUI
Double-click an NE on the Main Topology to display the NE Panel.
To add a new board, right-click an idle slot and choose a board type.
NOTE
l Choose the Always On Top for the Slot Layout window to always remain on top.
l When a board occupies multiple slots, the slot ID of the main slot is displayed in boldface, and the slot
ID of the slave slot is grayed out.
l In the NE panel, when you click the processing board that is accompanied by an interface board, the
slot ID of this interface board is displayed in orange.
Click the icon on the toolbar, to view the legends of the boards and ports on the right of the
Slot Layout.
To select an operation related to an installed board, right-click the installed board and choose it
from the shortcut menu. For example, right-click an AUX board and choose Path View to display
the detailed path information.
GUI
l Choose Fault > Browse Current Alarm from the main menu.
l Choose Fault > Browse History Alarm from the main menu.
l Choose Fault > Browse Alarm Logs from the main menu.
GUI
Choose Fault > Browse Event Logs from the main menu.
GUI
Choose Performance > Browse SDH Performance from the main menu.
NEs and fibers or cables can be managed on the U2000 only after their topologies are created.
A clock is one of the basic configuration items of an NE. When configuring a clock, you need
to set the parameters in terms of clock source, clock protection, clock quality, and retiming
management.
2.9 Configuring the Orderwire Phone
The orderwire phone provides an important communication tool for maintenance personnel.
2.10 Configuring the Broadcast Data Service
To meet the requirements for the broadcast data services between the monitoring host and the
environment monitors, you need to configure the broadcast data services of NE1-NE4.
2.11 Configuring the F1 Data Service
The F1 data service is transparently transmitted in the point-to-point mode by using the F1 byte.
2.12 Orderwire Configuration Parameters
The equipment supports various orderwire management, which involves orderwire phones and
F1 data interfaces.
Prerequisite
l You must be an NM user with "NM operator" authority or higher.
l The NE Explorer instance of the NEs must be created.
Background Information
First create a gateway NE, and then create a non-gateway NE.
Procedure
Step 1 Right-click in the blank area of the Main Topology and choose New > NE from the shortcut
menu. Then, the Create NE dialog box is displayed.
Step 2 Select the NE type from the Object Type drop-down list.
Step 3 Set ID, Extended ID, Name, and Remarks
Step 4 To create a gateway NE, proceed to Step 5. To create a non-gateway NE, go to Step 6.
Step 5 Choose Gateway Type and Protocol, and set the IP address.
1. Select Gateway from the Gateway Type drop-down list.
2. Select the Protocol type.
The U2000 communicates Select IP from the Protocol drop-down list. Set IP
with NEs through the IP Address of the gateway NE and use the default value of the
protocol Port number.
The U2000 communicates Select OSI from the Protocol drop-down list. Set NSAP
with NEs through the OSI Address of the gateway NE.
protocol
Step 6 Select Non-Gateway from the Gateway Type drop-down list. Select the gateway NE to which
the NE belongs from the Affiliated Gateway drop-down list.
Step 8 Optional: If you need not deliver the NE configuration data from the U2000 to the NE, select
the NE Preconfiguration check box and set NE Software Version.
NOTE
Do not deliver the NE preconfiguration data from the U2000 to the NE if the freconfiguration data is
inconsistent with the actual configurations on the NE. Otherwise, the services on the NE are affected.
Step 9 Click OK. Click in the blank area of the Main Topology. Then, the NE icon is displayed at the
position where you clicked.
NOTE
If the NE creation is incorrect or if the communication between the NE and the U2000 is abnormal, the
NE is displayed in grey.
----End
Result
After an NE is successfully created, the system automatically saves the information, such as the
IP address, NSAP address, subnet mask, and NE ID to the U2000 database.
Follow-up Procedure
if you fail to log in to the created NE, the possible causes are listed as follows:
l The communication between the U2000 and the NE is abnormal. In this case, check the
settings of communication parameters, such as the IP address and ID of the NE.
l The NE user is invalid. Change to use a valid NE user.
Prerequisite
l You must be an NM user with "NE administrator" authority or higher.
l The U2000 must communicate with the gateway NE normally.
l The NE Explorer instance of the NEs must be created.
Procedure
Step 1 Choose File > Discovery > NE from the Main Menu. Then, the NE Discovery window is
displayed.
Step 2 Choose Transport NE Search tab, Click Add. Then, the Input Search Domain dialog box is
displayed.
Step 3 Set Address Type to IP Address Range of GNE, IP Address of GNE, or NSAP Address.
Enter Search Address. Then, Click OK.
NOTE
You can repeat Steps 2 and 3 to add more search domains. You can also delete the system default search
domain.
l If you search for the NEs according to the IP address of the gateway NE and if the IP address of the
U2000 computer and the IP address of the gateway NE are within the same network segment, you can
set Address Type to IP Address Range of GNE or IP Address of GNE.
l If the IP addresses of the gateway NE and the U2000 computer are in two different network segments,
you can set Address Type to IP Address of GNE only.
l If you search the NEs according to the NSAP addresses of the NEs, you can set Address Type to
NSAP address only.
Step 5 After the search is complete, select the uncreated NEs from the Result list and then click
Create. The Create dialog box is displayed.
----End
Follow-up Procedure
If you fail to log in to the created NE, the possible causes are listed as follows:
l The password for the NE user is incorrect. In this case, enter the correct password for the
NE user.
l The NE user is invalid. Change to use a valid NE user.
Prerequisite
l The NE must be created successfully.
l You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Double-click the unconfigured NE on the Main Topology. Then, the NE Configuration
Wizard dialog box is displayed.
Step 2 Select Manual Configuration and click Next. Then, the Confirm dialog box is displayed,
indicating that manual configuration clears the data on the NE.
Step 3 Click OK. Then, the Confirm dialog box is displayed, indicating that manual configuration
interrupts the service on the NE.
Step 4 Click OK. Then, the Set NE Attribute dialog box is displayed.
Step 5 Set NE Name, Equipment Type, NE Remarks, and Shelf Type and then click Next. The NE
slot layout window is displayed.
Step 6 Optional: Click Query Logical Information to query the logical boards of the NE.
Step 7 Optional: Click Query Physical Information to query the physical boards of the NE.
NOTE
The Query Logical Information and Query Physical Information operations cannot be performed for
a preconfigured NE.
Step 8 Right-click the slot to which you need to add a board. Click Next. Then, the Send
Configuration window is displayed.
Step 9 Select Verify and Run according to the requirements and click Finish.
NOTE
Verification is to run the verification command. Click Finish to deliver the configuration data to the NE,
thus completing the basic configuration of the NEs. After the successful verification, the NEs start to work
normally.
----End
Prerequisite
l The NE must be created successfully.
l The NE type and NE version of the source NE must be the same as the NE type and NE
version of the newly created NE.
l You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Double-click the unconfigured NE on the Main Topology. Then, the NE Configuration
Wizard dialog box is displayed.
Step 2 Select Copy NE Data and click Next. Then, the NE Replication dialog box is displayed.
Step 3 Select the NE from the drop-down list and click Start. Then, the Confirm dialog box is
displayed, indicating that the replication operation copies all the data of the source NE.
NOTE
After the NE data is replicated, only the data on the U2000 is changed, but the data on the equipment is
not changed.
Step 4 Click OK. Then, the Confirm dialog box is displayed, indicating that the replication operation
results in the loss of the original data of the NE to which the data is replicated.
Step 6 Wait for several seconds. Then, in the Result dialog box indicating that the operation succeeded,
click Close.
----End
Prerequisite
l The NE must be created successfully.
l You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Double-click the unconfigured NE on the Main Topology. Then, the NE Configuration
Wizard dialog box is displayed.
Step 2 Select Upload and click Next. Then, the Confirm dialog box is displayed.
Step 3 Click OK to start the upload. When the uploading is completed, the Operation Result dialog
box is displayed, indicating that the operation succeeded.
----End
Procedure
Step 1 Select the corresponding navigation path and check the related board parameters.
1. Check the SDH board parameters. For the SDH board parameters, see Table 2-1.
Boar
Paramet Navigation
d Application Scenario
er Path
Type
Boar
Paramet Navigation
d Application Scenario
er Path
Type
2. Check the PDH board parameters. For the PDH board parameters, see Table 2-2.
Boar
Paramet Navigation
d Application Scenario
er Path
Type
Step 2 Change the values of the board parameters according to service planning and actual board
configurations. For details, see 5.2.3 Modifying Board Configuration Parameters.
----End
Prerequisite
l Fibers must be connected to the optical interfaces of each NE.
l The boards of each NE must be created on the U2000.
l You must be an NM user with "NE maintainer" authority or higher.
Precautions
CAUTION
l If conflicting fibers are detected during the creation, delete the conflicting fibers on the
U2000 before you start creating new fibers.
Procedure
Step 1 Choose File > Discovery > Fiber from the Main Menu.
Step 2 In the pane on the left, select one or more ports of the NE and click Search. Then, the progress
bar is displayed, indicating the progress of the search.
NOTE
l If you select the Do not search the ports with Fibers/Cable created on NMS check box, the system
only searches for the ports that do not have fibers.
l To check whether the created fibers are consistent with the actual fiber connection, deselect the Do not
search the ports with Fibers/Cable created on NMS check box.
l If you select the Do not search the ports with Fibers/Cable created on NMS check box and if the
fibers are created for all the selected ports, a dialog box is displayed indicating that the search domain
is null.
Step 3 A dialog box is displayed, indicating that the operation is successful. Click Close.
Step 4 Select one or more fibers from the Physical Fibers/Cable Link List list and click Create Fiber/
Cable.
NOTE
l When one or more fibers are selected from the Physical Fibers/Cable Link List list, the fibers that
conflict with the selected fibers are automatically displayed in the Logical Fibers/Cable Link List
list. If there is any conflicting fiber, refer to Step 5 and delete the conflicting fiber before creating fibers.
l During the fiber creation, if all the selected fibers are in Already created state, the system displays
the message No fiber to create.
Step 5 Select one or more conflicting fibers (namely, the fibers of which the Conflict with logical link
(Y/N) parameter is set to Yes in the Misconnected Fibers/Cable list) from the Logical Fibers/
Cable Link List list. Click Delete Fiber/Cable.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The required boards must be created on each NE.
Procedure
Step 1 Right-click in the Main Topology and choose New > Link from the shortcut menu. Then, the
Create Link dialog box is displayed.
Step 3 The parameter Create Ways can be set to Common Ways or Batch Ways. The default value
is Common Ways.
Step 4 Click the button in Source NE. Select the source board and source port in the Select Fiber/
Cable Source dialog box that is displayed.
Step 6 Click the button in Sink NE. Select the sink board and sink port in the Select Fiber/Cable
Sink dialog box that is displayed.
Step 7 Click OK. Then, the created fiber is displayed between the source NE and the sink NE in the
Main Topology.
Step 8 Right-click the created fiber and choose Detect Link from the shortcut menu. The Operation
Result dialog box is displayed, indicating the information on the fiber connections.
----End
Prerequisite
l You must create fiber connections according to the true fibers that connect the SDH and
WDM or PTN equipment.
l You must be an NM user with "NE maintainer" authority or higher.
Background Information
l In the case of SDH equipment, the virtual fibers ensure the automatic fiber search and SDH
trail management functions are independent of each other.
l The source and sink ports of the virtual fibers must be SDH ports. On the source and sink
ports, there must be two physical fibers that are connected to the WDM or PTN equipment.
l The virtual fibers do not support the expansion function.
Procedure
Step 1 Right-click in the blank area of the Main Topology, and choose New > Link from the shortcut
menu.
Step 2 In the Create Link dialog box, choose Fiber/Cable > Virtual Fiber.
Step 3 Set the fiber/cable attributes in the attribute list on the right.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Right-click in the blank area of the Main Topology and choose New > Link from the shortcut
menu. Then, the Create Link dialog box is displayed.
Step 2 Choose Fiber/Cable > Cable from the left pane.
Step 3 Enter the cable attributes in the panel on the right.
Step 4 Click OK. The cable that is already created between the U2000 and the gateway NE is displayed
on the Main Topology.
----End
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Background Information
A topology subnet is created only to simplify the user interface and does not affect the operation
of the NEs.
Procedure
Step 1 Right-click in the blank area of the Main Topology and choose New > Subnet from the shortcut
menu.
Step 2 Click the Property tab in the Create Physical Subnet dialog box. Set the attributes of the subnet.
Step 3 Click the Select Objects tab. Select the created NEs or subnet from the Available Objects
column. Click to add the selected objects to the Selected Objects column.
NOTE
The information about the signs in a similar dialog box for selecting objects is
provided as follows:
l indicates adding the selected objects from the left column to the right column.
l indicates adding all the objects from the left column to the right column.
----End
Prerequisite
l The data of each NE must be configured and the fibers must be created on the U2000.
l You must be an NM user with "network maintainer" authority or higher.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Create Unprotected Chain from the Main Menu.
Then, the Create Protection Subnet dialog box is displayed.
l If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check
box. If different protection subnets use different ports of a board, do not check this check box.
l Select the Assigned by VC4 option when there are different VC4s belonging to different protection
subnets to achieve virtual optical path protection.
Step 5 Select the NEs where you need to create the non-protection chain. Double-click the NEs in the
Main Topology and add them to the NE list on the left. At the same time, is displayed above
the NE icons. You can cancel the selection by double-clicking the NE icons again to cancel the
selection.
Step 6 Click Next. Set the parameters such as Physical Link Information.
Step 7 Click Finish to deliver the configuration data. Click Close in the Operation Result dialog box
indicating that the operation succeeded.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The NE data must be configured, and fibers must be created properly.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Create Unprotected Ring from the Main Menu.
Then, the Create Protection Subnet dialog box is displayed.
Step 4 Select Resource Sharing and Assigned by VC4 according to the requirement.
NOTE
l If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check
box. If different protection subnets use different ports of a board, do not check this check box.
l Select the Assigned by VC4 option when there are different VC4s belonging to different protection
subnets to achieve virtual optical path protection.
Step 5 Select the nodes that belong to the protection subnet that needs to be created. Double-click the
selected NE in the Main Topology to add the NE to the NE list on the left. In addition, is
displayed on the NE icon. If you need to cancel the selection, double-click the NE again.
Step 6 Click Next. Set the parameters such as Physical Link Information in the window.
Step 7 Click Finish to deliver the configuration data. Then, click Close in the Operation Result dialog
box indicating that the operation succeeded.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The NE data must be configured and fibers must be created properly.
Precautions
CAUTION
l The number of nodes in an MSP ring should not exceed 16.
l Starting the protocol controller may interrupt the services.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Create 2f_MS_SPRing from the Main Menu.
Click OK in the dialog box that is displayed. Then, the Create Protection Subnet window is
displayed.
NOTE
l To create a four-fiber bidirectional MS shared protection ring, choose Service > SDH Protection
Subnet > Create 4f_MS_SPRing from the Main Menu.
l To create a two-fiber bidirectional MS shared protection ring, choose Service > SDH Protection
Subnet > Create 2f_MS_DPRing from the Main Menu.
l The following part provides an example of configuring a common two-fiber bidirectional MS shared
protection ring.
Step 2 Enter the name of the protection subnet. Generally, the default name is used, for example,
2f_MS_SPRing_1.
Step 3 Select the capacity level of the protection subnet, for example, STM-4.
NOTE
Create a two-fiber bidirectional MSP ring. The capacity of the ring can be set to STM-4, STM-16.
Step 4 Choose Resource Sharing and Assigned by VC4 according to the requirement.
NOTE
l Resource Sharing indicates that a port is mapped into multiple protection subnets. When multiple
protection subnets occupy the same port of a board, Resource Sharing must be selected. When different
protection subnets occupy different ports of a board, Resource Sharing is not required. If multiple
protection subnets use one port of a board, you need to select the Resource Sharing check box. If
MSP Sharing is enabled, you can select the Resource Sharing check box to map a port of the board
to multiple MSP subnets.
l Assigned by VC4 indicates that different VC-4s belong to different protection subnets, therefore
achieving virtual optical path protection. For example, in the case of an STM-4 fiber, the first and
second VC-4s are allocated for the STM-4 MS shared protection, and the third and fourth VC-4s are
allocated for the non-protection.
Step 5 Select the nodes that belong to the protection subnet that needs to be created. Double-click the
selected NE in the Main Topology to add the NE to the NE list on the left. In addition, is
displayed on the NE icon. If you need to cancel the selection, double-click the NE again.
NOTE
To facilitate maintenance, it is recommended that you add the nodes anticlockwise to the protection subnet.
Step 7 Click Next. Set the parameters such as Physical Link Information in the window.
NOTE
l If there are multiple fibers between two NEs, select the required links from the Physical Link
Information drop-down list.
l If Assigned by VC4 is selected, you can Select the working and protection VC-4 timeslots according
to the requirement.
Step 8 Click Finish to deliver the configuration data. Then, the Operation Result dialog box is
displayed. Click Close.
Step 9 Choose Service > SDH Protection Subnet > Search for SDH Protection Subnet from the
Main Menu. Select the created protection subnet, right-click and choose Protection Subnet
Attributes from the shortcut menu.
Step 10 Click the Protection Subnet Maintenance tab to check whether the protocol controller is
started. If the protocol controller is not started, select all the nodes of the protection subnet.
Right-click and choose Start/Stop Protocol > Start from the shortcut menu. Click Yes in the
dialog box that is displayed twice. Ensure that the status of all the values in the Protocol
Controller column is Protocol Started.
Step 11 Click the Protection Subnet Parameters tab. Set WTR time and SD Condition according to
the requirement. Click Apply to deliver the configuration data. The WTR time of all NEs in
the same protection subnet should be the same.
NOTE
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The NE data must be configured and fibers must be created properly.
Precautions
CAUTION
l Starting the protocol controller may interrupt the services.
l Fibers that are used for the linear MSP cannot be used by other protection subnets. That is,
a linear MS protection subnet and other subnets cannot be used together to form virtual fibers.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Create 1+1 linear MSP from the Main Menu.
Then, the Create Protection Subnet window is displayed.
NOTE
To create the M:N linear MS protection, choose Service > SDH Protection Subnet > Create M:N Linear
MSP from the Main Menu. Then, the corresponding window is displayed.
In the case of the M:N linear MS protection scheme, set the number of working links to N. M indicates the
number of protection links and cannot be set manually. Currently, the value of M can be 1 only.
Step 4 Set Revertive Mode and Switching Mode according to the protection type and related
requirements.
NOTE
Step 5 Select the nodes that belong to the protection subnet that needs to be created. Double-click the
selected NE in the Main Topology to add the NE to the NE list on the left. In addition, is
displayed on the NE icon. If you need to cancel the selection, double-click the NE again.
Step 6 Click Next. Set Physical Link Information of Working Link and Protection Link.
Step 7 Click Finish to deliver the configuration data. Then, click Close in the Operation Result dialog
box indicating that the operation succeeded.
Step 8 Choose Service > SDH Protection Subnet > Search for SDH Protection Subnet from the
Main Menu. Select the created protection subnet, right-click and choose Protection Subnet
Attributes from the shortcut menu.
Step 9 Click the Protection Subnet Maintenance tab to check whether the protocol controller is
started.
NOTE
If the protocol controller is not started, select all the NEs of the protection subnet. Right-click and choose
Start/Stop Protocol > Start from the shortcut menu. Click Yes in the dialog box that is displayed twice.
Ensure that the status of all the values in the Protocol Controller column is Protocol Started.
Step 10 Click the Protection Subnet Parameters tab. Set WTR time and SD Condition according to
the requirement. Click Apply to deliver the configuration data.
NOTE
The WTR time of all NEs in the same protection subnet should be the same.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
To implement clock protection, you must configure at least two traceable clock sources for the
equipment. Generally, the tributary clock is not used as the clock source for the equipment.
After you set the clock sources for all the NEs, query the networkwide clock trace status again.
For details, see Querying the Clock Trace Status.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Layer
Clock > Clock Source Priority from the Function Tree.
Step 3 Click Create. In the Add Clock Source dialog box, select a new clock source and click OK.
Step 4 Optional: If an external clock source is selected, select External Clock Source Mode according
to the type of external clock signals. In the case of the 2 Mbit/s clock, specify the Synchronous
Status Byte to deliver the SSM message.
Step 5 Select a clock source and click or to adjust its priority level. The clock
sources are arranged in the descending order. The clock source at top is the preferred clock
source for the NE.
NOTE
Internal clock sources have the lowest priority because of their low precision.
Step 6 Click Apply. Then, click Close in the Operation Result dialog box indicating that the operation
succeeded.
NOTE
If the clock trace relation changes according to the change of the clock source, the Prompt dialog box is
displayed, asking you whether to refresh the clock trace relation. Click OK. If Disable Prompting Next
Time is selected, the Prompt dialog box is not displayed even if the clock trace relation changes.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Layer
Clock > Clock Subnet Configuration from the Function Tree.
Step 2 Click the Clock Subnet tab. Click Query to query the existing parameter settings.
Step 3 Select Start Standard SSM Protocol or Start Extended SSM Protocol.
NOTE
The same SSM protection protocol must be used for the NEs within the same clock protection subnet.
Step 4 Set the subnet number of the clock subnet to which the NE is associated.
NOTE
Allocate the same subnet number to the NEs that trace the same clock source.
Step 5 Optional: If the extended SSM protocol is enabled, set the clock ID of the clock source.
Step 6 Click Apply. Click Close in the Operation Result dialog box indicating that the operation
succeeded.
Step 7 Optional: If the clock ID is specified for the line clock of an NE, click the Clock ID Status tab,
and set Enabled Status to Enabled. Click Apply. Click Close in the Operation Result dialog
box indicating that the operation succeeded.
----End
Table 2-3 lists the parameters that are used for configuring the output phase-locked source table
of an external clock.
Table 2-3 Parameters for configuring the output phase-locked source table of an external clock
Field Value Range Description
External Clock Output Mode Synchronization Quality The External Clock Output
When 2M Output Unavailable, Output AIS, Mode When 2M Output
Synchronous Source Is Shut off Synchronous Source Is
Invalid Default value: Shut off Invalidparameter is used to
specify an action to control
the output mode of external
clock source when all the
clock sources in the 2M
phase-locked source priority
table become invalid or when
the clock quality of the
selected source is inferior to
the output quality threshold
of external clock source.
You can click 7.112
External Clock Output
Mode When 2M Output
Synchronous Source Is
Invalid to display the
detailed information.
Output Impedance of For example: 120 ohms The NE can provide two
External Clock Source 1 clocks for external outputs.
You need to specify the
output impedance of external
clock 1.
Output Impedance of For example: 120 ohms The NE can provide two
External Clock Source 2 clocks for external outputs.
You need to specify the
output impedance of external
clock 2.
Table 2-4 lists the parameters that are used for configuring the 2M phase-locked source attributes
of an external clock.
Table 2-4 Parameters for configuring the 2M phase-locked source attributes of an external clock
Field Value Range Description
External Clock Output Mode 2 MHz, 2 Mbit/s The External Clock Output
Default value: 2 Mbit/s Mode parameter is used to
set the output mode of the
external clock source to 2
Mbit/s or 2 MHz.
You can click 7.113
External Clock Output
Mode to display the detailed
information.
External Clock Output SA4, SA5, SA6, SA7, SA8, The External Clock Output
Timeslot All versions Timeslot parameter is used
Default value: All versions to set the output timeslot for
the S1 byte of the external
clock source. The external
clock source transmits the S1
overhead byte through
certain timeslots. After
starting the SSM protocol,
make sure that the timeslot
for receiving the S1 byte is
consistent with the timeslot
for transmitting the S1 byte
so that the S1 byte can be
received correctly.
You can click 7.114
External Clock Output
Timeslot to display the
detailed information.
Table 2-5 Parameters used for configuring clock protection and restoration
Field Value Range Description
Higher Priority Clock Source Non-Revertive, Auto- The Higher Priority Clock
Reversion Mode Revertive Source Reversion Mode
Default value: Auto- parameter specifies whether
Revertive to switch from the lower-
priority clock source back to
the higher-priority clock
source after the higher-
priority clock source is
restored to normal.
You can click 7.122 Higher
Priority Clock Source
Reversion Mode to display
the detailed information.
Clock Source For example: Internal Clock Displays the name of the
Source clock source.
S1 Byte Clock Synchronous For example: Internal Clock Displays the clock source
Source Source that is traced by the clock of
the current NE. This
parameter is used for query
only.
The relevant information can
be displayed only when the
S1 byte is used. That is, the
clock protection function is
enabled. Similarly, the
relevant information can be
displayed only when you
click Query. Otherwise, only
NA is displayed.
Data Output Method in Normal Data Output Mode, The Data Output Method in
Holdover Mode Keep the Latest Data Holdover Mode parameter is
Default value: Normal Data used to specify whether the
Output Mode data is output normally or the
latest data is kept when the
NE clock is in the holdover
mode.
You can click 7.128 Data
Output Method in
Holdover Mode to display
the detailed information.
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE, and then choose Configuration > Orderwire from the
Function Tree. Click the General tab.
l Call Waiting Time should be set to the same value for all NEs that are involved in the orderwire
communication. When the number of NEs is less than 30, set Call Waiting Time to 5s. Otherwise, set
Call Waiting Time to 9s.
l The orderwire phone numbers must be unique to each other in the same orderwire subnet.
l Set the length of the telephone number according to the actual requirements. The maximum length is
eight digits and the minimum length is three digits. In the same orderwire subnet, the number lengths
of the orderwire phone numbers must be the same.
l The length of the telephone number must be the same as the length of the conference call number.
l If the length of the subnet number is 1, the first digits of the two orderwire numbers must be the same.
If the length of the subnet number is 2, the first two digits of the two orderwire numbers must be the
same.
Step 4 Click Apply. A dialog box is displayed, indicating that the operation is successful.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "network operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select the NE, and then choose Configuration > Orderwire from the
Function Tree. Click the Conference Call tab.
Step 2 Click Query to query the conference call configuration of the NE.
Step 3 Set Conference Call Authorities to Able to Listen and Speak or Able to Listen but not
Speak.
Step 4 In the Available Conference Call Port pane, select the port where you need to configure a
conference call, and click .
NOTE
If the optical interfaces that support conference calls form a loop, howler tone is generated. Hence,
"releasing loop" is required, that is, only one optical port can be set for the conference calls on a certain
node.
Step 5 Click Apply. A dialog box is displayed, indicating that the operation is successful.
Step 6 Click Close.
Step 7 Click the General tab. Set the Conference Call number.
NOTE
The conference call numbers for all the NEs must be the same, and must have the same length as the
corresponding orderwire phone numbers. If the orderwire phone number has four digits, it is recommended
that you set the conference call number to 9999.
----End
Example
You can follow the sample configuration to prevent a conference call loop.
NM ID U2000
NM name NM
IP address 192.9.0.54
2-SL4D-1 2-SL4D-2
9-1
NE1
1001/9999
2-SL4D-2 2-SL4D-1
9-2 9-4 1-SL1D-1 1-SL1D-1 9-5
NE2 Two-fiber bidirectional
NE4 NE5
1002/9999
MSP ring
1004/9999 1005/9999
2-SL4D-1 Two-fiber
2-SL4D-2 bidirectional
9-3
NE3
1003/9999
NE ID
NE name
2-SL4D-2 2-SL4D-1
Telephone No./
Conference Call No.
As shown in the preceding figure, if conference calls are configured for all optical interfaces,
howler tone is generated. You can configure a conference call for the optical interface NE3-2-
SL4D-2 only, instead of the optical interface NE3-2-SL4D-1.
Prerequisite
Precautions
CAUTION
When you configure the broadcast data ports, ensure that the broadcast data ports do not form
a loop. Certain optical ports cannot be configured as the broadcast data ports.
Procedure
Step 1 Select NE in the NE Explorer, and then choose Configuration > Orderwire from the Function
Tree.
Step 2 Click the Broadcast Data Port tab and set the parameters as listed in the following table. Then,
click Apply. For the values of specified parameters, see 2.12.3 Configuring Broadcast Data
Interfaces.
Step 3 See Setting Network-Wide Performance Monitoring and enable the performance monitoring
function of the NEs.
Step 4 Back up the configuration data of the NEs. For details, see Backing Up the NE Data to the System
Control Board.
----End
Prerequisite
l The 2 Creating the Network is completed.
l Understand the signal flow and timeslot allocation.
Procedure
Step 1 In the NE Explorer, select NE1 and choose Configuration > Orderwire from the Function Tree.
Step 2 Click the F1 Data Port tab. After setting the parameters, click Apply. For the principles of
setting the parameters, see 2.12.2 Configuring F1 Data Interfaces.
Step 3 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 4 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Table 2-8 lists the parameters that are used for configuring orderwire phones.
Selected Orderwire Port Slot ID-Board Name-Port Specifies the port on the line
No.(Port Name) board for orderwire phone
transmission.
Broadcast Data Source No Data, SERIALx, Bid- The Broadcast Data Source
BidType-PortID (Broadcast Data Port)
Default value: - parameter specifies the
source of the orderwire
broadcast data service.
You can click 7.110
Broadcast Data Source
(Broadcast Data Port) to
display the detailed
information.
This topic uses an example to describe how to configure SDH services on the U2000.
Unidirectional Service
The unidirectional service indicates the service that is received and transmitted on different
paths. A unidirectional service created between NE A and NE B can only be transmitted from
NE A (source) to NE B (sink) or only be transmitted from NE B (sink) to NE A (source).
Bidirectional Service
The bidirectional service indicates the service that is received and transmitted on the same path.
A bidirectional service created between NE A and NE B can be transmitted and received from
NE A to NE B or from NE B to NE A.
MSP
The multiplex section protection (MSP) provides a function that switches the signals from the
working section to the protection section.
SNCP Principle
The sub-network connection protection (SNCP) is defined by the ITU-T Recommendations.
With 1+1 single-ended switching function, the SNCP is used for protecting services that travel
across different subnets. The SNCP is characterized by the dual-fed and selective-receiving
mode.
you only need to configure the selective receiving service in actual service configuration. That
is, if the SNCP service pair is configured, the service configuration of the SNCP is complete.
Figure 3-1 shows a point-to-point non-protection chain. In this example, the SP3D boards are
configured on the source NE (NE1) and the sink NE (NE2) as tributary boards to add and drop
services, and the SL1D boards are used as line boards to transmit SDH services.
NE 1 NE 2
Tributary board Line board Line board Tributary board
3-SP3D 1-SL1D 1-SL1D 3-SP3D
Figure 3-2 shows the signal flow and timeslot allocation. In this example, five E1 services are
added to or dropped from NE1 and NE2.
Figure 3-2 Signal flow and timeslot allocation of the services on the non-protection chain
3-SP3D 1-SL1D-1 1-SL1D-1 3-SP3D
线路
5×E1 板 5×E1
VC4-1:1-
NE1 5(VC12) NE2
Line Board
Tributary Board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.1 Configuring a Non-Protection
Chain.
l You must be familiar with the information about 3.2.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Configure SDH services on the source NE (NE1).
1. Select NE1 in the NE Explorer, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK,
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE1 is
configured as the source tributary board. See Figure
3-2.
Source VC4 - -
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 of NE1 is
(SDH-1) configured as the sink line board. See Figure 3-2.
Sink VC4 VC4-1 The service sink uses the timeslots of VC4-1.
Activate Yes -
Immediately
Step 2 Refer to Step 1 and configure SDH services on the sink NE (NE2). Set the parameters as follows.
Parameter Value in Description
This
Example
Direction Bidirectional In this example, the services are transmitted and received
over the same path. That is, the services are
Bidirectional services.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE1 is
configured as the source tributary board. See Figure
3-2.
Source VC4 - -
Source Timeslot 1-5 In this example, five E1 services are configured between
Range(e.g.1,3-6) NE1 and NE2. Hence, the service source occupies
VC-12s 1-5.
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 of NE1 is
(SDH-1) configured as the sink line board. See Figure 3-2.
Sink VC4 VC4-1 The service sink uses the timeslots of VC4-1.
Sink Timeslot 1-5 In this example, five E1 services are configured between
Range(e.g.1,3-6) NE1 and NE2. Hence, the service sink occupies VC-12s
1-5.
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l The NEs, boards, and fibers must be successfully created on the U2000.
l The protection subnet must be created and must be the same as the actual topology. For
details about how to create the protection subnet, see 2.6.1 Configuring a Non-Protection
Chain.
l The operator must understand the information provided in 3.2.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
Step 2 Create the VC-4 service-layer trail.
1. Configure the parameters as follows. Set Level to VC4 Server Trail. The other parameters
take default values.
2. Double-click the source NE (NE1) and sink NE (NE2) on the right of the main topology
and click Apply. Then, click Close in the Operation Result dialog box indicating that the
operation succeeded.
3. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 service-layer trail.
2. Double-click the source NE on the right of the main topology. The Select Board Port-
Source dialog box is displayed. Select the required PDH board and Tributary Port. Click
OK.
3. Double-click the sink NE (NE2) on the right of the main topology. Configure NE2 in the
same manner.
4. Select Copy after Creation and click Apply. Click Close in the Operation Result dialog
box indicating that the operation succeeded. Then, the Copy dialog box is displayed.
5. In Available Timeslots/Port, select the ports from NE1-Slot3-SP3D-2(SDH_TU-2) to
NE2-Slot3-SP3D-5(SDH_TU-5), and click Add.
6. In the Operation Result dialog box indicating that the operation succeeded, click Close.
7. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC12 services.
Step 4 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
NE1
1-SL1D-2
Two-fiber bidirectional
NE2 NE4
non-protection ring
NE2: 1-SL1D-1
NE3
Line board Line board
1-SL1D-2 1-SL1D-1
NE3:
1-SL1D-2
Tributary board Line board
3-SP3D 3-SP3D 1-SL1D-2
Figure 3-4 Signal flow and timeslot allocation of the services on the non-protection ring
5×E1
VC4-1:1-5(VC12) 3-SP3D NE1:
Tributary board Line board
3-SP3D 1-SL1D-1
1-SL1D-1
NE1
1-SL1D-2
VC4-1:1-5(VC12)
Two-fiber bidirectional 线路板
Pass-through service NE2 NE4
non-protection ring
1-SL1D-1
NE2:
Line board Line board
1-SL1D-2 1-SL1D-1 NE3
NE3:
1-SL1D-2
Tributary board Line board
Traffic 5×E1
Line board
direction
Tributary board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.2 Configuring a Non-Protection
Ring.
l You must be familiar with the information about 3.3.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Configure SDH services of the source NE (NE1).
1. Select NE1 in the NE Explorer, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK.
Parameter Value in Description
This
Example
Direction Bidirectiona In this example, the services are transmitted and received
l over the same path. That is, the services are
Bidirectional services.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE1 is
configured as the source tributary board. See Figure
3-4.
Source VC4 - -
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 of NE1 is
(SDH-1) configured as the sink line board. See Figure 3-4.
Sink VC4 VC4-1 The timeslots where the service sink is located belong
to the first VC-4 (VC4-1).
Activate Yes -
Immediately
Step 2 Configure SDH services on the sink NE (NE3). Refer to Step 1. Set the parameters as follows.
Parameter Value in Description
This
Example
Direction Bidirectional In this example, the services are transmitted and received
over the same path. That is, the services are Bidirectional
services.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE3 is
configured as the source tributary board. See Figure 3-4.
Source VC4 - -
Sink Slot 1-SL1D-2 In this example, the SL1D board in slot 1 of NE2 is
(SDH-2) configured as the sink line board. See Figure 3-4.
Sink VC4 VC4-1 The service sink uses the timeslots of VC4-1.
Sink Timeslot 1-5 In this example, five E1 services are configured between
Range(e.g. NE1 and NE3. Hence, the service sink occupies VC-12s
1,3-6) 1-5.
Activate Yes -
Immediately
Direction Bidirectiona In this example, the services are transmitted and received
l over the same path. That is, the services are
Bidirectional services.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 of NE2 is
(SDH-2) configured as the source line board. See Figure 3-4.
Source VC4 VC4-1 The timeslots where the service source is located belong
to the first VC-4 (VC4-1).
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 of NE2 is
(SDH-1) configured as the sink line board. See Figure 3-4.
Sink VC4 VC4-1 The service sink uses the timeslots of VC4-1.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l The NEs, boards, and fibers must be successfully created on the U2000.
l The protection subnet must be created and must be the same as the actual topology. For
details about how to create the protection subnet, see 2.6.2 Configuring a Non-Protection
Ring.
l The operator must understand the information provided in 3.3.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Double-click the source NE (NE1) and sink NE (NE3) on the right of the main topology
and click Apply. In the Operation Result dialog box that is displayed, click Close.
3. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC4 service-layer trail.
2. Double-click the source NE on the right of the main topology. The Select Board Port-
Source dialog box is displayed. Select the required PDH board and Tributary Port. Click
OK.
3. Double-click the sink NE (NE3) on the right of the main topology. Configure NE2 in the
same manner.
4. Select Copy after Creation and click Apply. In the Operation Result dialog box that is
displayed, click Close. Then, the Copy dialog box is displayed.
5. In Available Timeslots/Port, select the ports from NE1-Slot3-SP3D-2(SDH_TU-2) to
NE3-Slot3-SP3D-5(SDH_TU-5), and click Add.
6. In the Operation Result dialog box that is displayed, click Close.
7. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC12 services.
Step 4 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
1-SL1D-2 1-SL1D-2
NE2 NE1
Tributary board Line board Line board Line board Line board Tributary board
3-SP3D 1-SL1D-1 1-SL1D-2 1-SL1D-2 1-SL1D-1 3-SP3D
As shown in Figure 3-6, the signal flow and timeslot allocation are as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and are transmitted to the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE2),
which selects the services from the working path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and are transmitted on the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE1),
which selects the services from the working path.
l The services between NE 1 and NE2 occupy VC-12s 1-5 of VC4-1 (VC4-1:VC-12:1-5) on
the SDH link between NE1 and NE2. The capacity of the services is 5xE1.
When the working path from NE1 to NE2 becomes faulty, in the case of single-ended switching,
the signal flow is as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and are transmitted on the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE2),
which selects the services from the protection path.
l The services from NE2 to NE1 are not affected, and the traffic direction is NE2→NE1.
Services are added to the source NE (NE2) and are transmitted on the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE1),
which selects the services from the working path.
When the working path from NE1 to NE2 becomes faulty, in the case of dual-ended switching,
the signal flow is as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and are transmitted on the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE2),
which selects the services from the protection path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and are transmitted on the working path and
protection path at the same time. Then, the services are dropped from the sink NE (NE1),
which selects the services from the protection path.
Figure 3-6 Signal flow and timeslot allocation of the 1+1 linear MSP services
1-SL1D-1 1-SL1D-1
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.4 Creating a Linear MS
Protection Subnet.
l You must be familiar with the information about 3.4.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Configure SDH services on the source NE (NE1).
1. In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK.
Parameter Value in Description
This
Example
Source Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the source tributary board for the bidirectional
services from NE1 to NE2. See Figure 3-6.
Source VC4 - -
Source 1-5 The total capacity of the service is 5xE1 according to the
Timeslot plan. Hence, Source Timeslot Range(e.g.1,3-6) is set
Range(e.g. to 1-5.
1,3-6)
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-6.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Activate Yes -
Immediately
Click , and select NE2 from the displayed NE Navigator. Configure NE2 in the same way
that NE1 is configured. Then, click OK.
Direction Bidirectional In this example, the services are transmitted and received
over the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured as
(SDH-1) the source line board. See Figure 3-6.
Source VC4 VC4-1 In this example, the service requires five VC-12s. Source
VC4 is set to VC4-1, because a VC-4 contains 63 VC-12s.
Source 1-5 The total capacity of the services is 5xE1 according to the
Timeslot plan. Hence, Source Timeslot Range(e.g.1,3-6) is set to
Range(e.g. 1-5.
1,3-6)
Sink Slot 3-SP3D In this example, the SP3D board in slot 3 is configured as
the sink tributary board for the bidirectional services from
NE1 to NE2. See Figure 3-6.
Sink VC4 - -
Sink Timeslot 1-5 The total capacity of the services is 5xE1 according to the
Range(e.g. plan. Hence, Sink Timeslot Range(e.g.1,3-6) is set to 1-5.
1,3-6)
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l The NEs, boards, and fibers must be successfully created on the U2000.
l The protection subnet must be created and must be the same as the actual topology. For
details about how to create the protection subnet, see 2.6.4 Creating a Linear MS
Protection Subnet.
l The operator must understand the information provided in 3.4.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
Step 2 Create the VC-4 service-layer trail.
1. Configure the parameters as follows. Set Level to VC4 Server Trail. The other parameters
take default values.
2. Double-click the source NE (NE1) and sink NE (NE2) on the right of the main topology
and click Apply. In the Operation Result dialog box indicating that the operation
succeeded, click Close.
3. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 service-layer trail.
Step 3 Create VC12 services.
1. In Create SDH Trail, configure the parameters as follows. Set Level to VC12. The other
parameters take default values.
2. Double-click the source NE (NE1) on the right of the main topology. The Select Board
Port-Source dialog box is displayed. Select the required SP3D board and Tributary
Port. Click OK.
3. Double-click the sink NE (NE2) on the right of the main topology. Configure NE2 in the
same manner.
4. Select Copy after Creation and click Apply. In the Operation Result dialog box
indicating that the operation succeeded, click Close. Then, the Copy dialog box is
displayed.
5. In Available Timeslots/Port, select the ports from NE2-Slot3-SP3D-2(SDH_TU-2) to
NE1-Slot3-SP3D-5(SDH_TU-5), and click Add.
6. In the Operation Result dialog box indicating that the operation succeeded, click Close.
7. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC12 services.
Step 4 Optional: Modify the parameters SD Condition, Revertive Mode, and Switching Mode for
the linear MSP.
NOTE
l The parameter settings of the sink NE must be the same as those of the source NE.
l When modifying Switching Mode,
l Ensure that the protection group is in a proper state.
l Ensure that the protection protocol is disabled.
1. Choose Service > SDH Protection Subnet > Maintenance SDH Protection Subnet from
the Main Menu to display the SDH Protection Subnet Common Attributes window.
2. Select the created linear MSP group. In the Protection Subnet Maintenance tab, select
all nodes, right-click and choose Start/Stop Protocol > Stop from the shortcut menu.
3. Click the Protection Subnet Parameters tab and modify the parameters SD Condition,
Revertive Mode, and Switching Mode.
4. Click Apply. Then, click Close in the Operation Result dialog box indicating that the
operation succeeded.
5. After the parameters are modified, restart the protection protocol according to Step 4.2.
Step 5 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 6 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
As shown in Figure 3-7, the SP3D boards are used on NE1 and NE2 as tributary boards to add
and drop services, and the SL1D boards are used on NE1 and NE2 as line boards to transmit
SDH services.
1-SL1D-2 1-SL1D-2
NE2 NE1
Tributary board Line board Line board Line board Line board Tributary board
3-SP3D 1-SL1D-1 1-SL1D-2 1-SL1D-2 1-SL1D-1 3-SP3D
As shown in Figure 3-8, the signal flow and timeslot allocation are as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then are dropped from the sink NE (NE2).
The services are transmitted on the working path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and then are dropped from the sink NE (NE1).
The services are transmitted on the working path.
l The services between NE1 and NE2 occupy VC-12s 1-5 of VC4-1 (VC4-1:VC-12:1-5) on
the SDH link between NE1 and NE2. The capacity of the services is 5xE1.
When the working path between NE1 and NE2 becomes faulty, the signal flow is as follows:
l Traffic direction from NE1 to NE2: NE1→NE2
Services are added to the source NE (NE1) and then are dropped from the sink NE (NE2).
The services are transmitted on the protection path.
l Traffic direction from NE2 to NE1: NE2→NE1
Services are added to the source NE (NE2) and then are dropped from the sink NE (NE1).
The services are transmitted on the protection path.
The difference between the 1:1 linear MSP service and the 1+1 linear MSP service is as follows:
l In the case of the 1+1 linear MSP service, services are transmitted on the working path and
protection path at the same time. The sink NE selects the services from the working path.
l In the case of the 1:1 linear MSP service, services are transmitted only on the working path.
Services are switched to the protection path for transmission only when the working path
becomes faulty.
Figure 3-8 Signal flow and timeslot allocation of the 1:1 linear MSP services
1-SL1D-1 1-SL1D-1
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
3-SP3D 3-SP3D
1-SL1D-2 1-SL1D-2
NE2 NE1
Tributary board Line board Line board Line board Line board Tributary board
3-SP3D 1-SL1D-1 1-SL1D-2 1-SL1D-2 1-SL1D-1 3-SP3D
Traffic direction of
Line board
the working path
Traffic direction of
the protection path Tributary board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.4 Creating a Linear MS
Protection Subnet.
l You must be familiar with the information about 3.5.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Configure SDH services on the source NE (NE1).
1. Select NE1 in the NE Explorer, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the source tributary board for the bidirectional
services from NE1 to NE2. See Figure 3-8.
Source VC4 - -
Source 1-5 The total capacity of the service is 5xE1 according to the
Timeslot plan. Hence, Source Timeslot Range(e.g.1,3-6) is set
Range(e.g. to 1-5.
1,3-6)
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-8.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Activate Yes -
Immediately
Click , and select NE2 from the displayed NE Navigator. Click OK.
Direction Bidirectional In this example, the services are transmitted and received
on the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured as
(SDH-1) the source line board. See Figure 3-8.
Source VC4 VC4-1 In this example, the service requires five VC-12s. Source
VC4 is set to VC4-1, because a VC-4 contains 63 VC-12s.
Source 1-5 The total capacity of the services is 5xE1 according to the
Timeslot plan. Hence, Source Timeslot Range(e.g.1,3-6) is set to
Range(e.g. 1-5.
1,3-6)
Sink Slot 3-SP3D In this example, the SP3D board in slot 3 is configured as
the sink tributary board for the bidirectional services from
NE1 to NE2. See Figure 3-8.
Sink VC4 - -
Sink Timeslot 1-5 The total capacity of the services is 5xE1 according to the
Range(e.g. plan. Hence, Sink Timeslot Range(e.g.1,3-6) is set to 1-5.
1,3-6)
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l A linear MSP subnet must be created and must be the same as the actual topology. For
details about how to create a protection subnet, see 2.6.4 Creating a Linear MS Protection
Subnet.
l The operator must understand the information provided in 3.5.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Double-click the source NE (NE1) and sink NE (NE2) on the right of the main topology
and click Apply. In the Operation Result dialog box indicating that the operation
succeeded, click Close.
3. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 service-layer trail.
2. Double-click the source NE (NE1) on the right of the main topology. The Select Board
Port-Source dialog box is displayed. Select the required SP3D board and Tributary
Port. Click OK.
3. Double-click the sink NE (NE2) on the right of the main topology. Configure NE2 in the
same manner.
4. Select Copy after Creation and click Apply. In the Operation Result dialog box
indicating that the operation succeeded, click Close. Then, the Copy dialog box is
displayed.
5. In Available Timeslots/Port, select the ports from NE2-Slot3-SP3D-2(SDH_TU-2) to
NE1-Slot3-SP3D-5(SDH_TU-5), and click Add.
6. In the Operation Result dialog box indicating that the operation succeeded, click Close.
7. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC12 services.
Step 4 Optional: Modify the parameters SD Condition, Revertive Mode, and Switching Mode for
the linear MSP.
NOTE
l The parameter settings of the sink NE must be the same as those of the source NE.
l When modifying Switching Mode,
l Ensure that the protection group is in a proper state.
l Ensure that the protection protocol is disabled.
1. Choose Service > SDH Protection Subnet > Maintenance SDH Protection Subnet from
the Main Menu to display the SDH Protection Subnet Common Attributes window.
2. Select the created linear MSP group. In the Protection Subnet Maintenance tab, select
all nodes, right-click and choose Start/Stop Protocol > Stop from the shortcut menu.
3. Click the Protection Subnet Parameters tab and modify the parameters SD Condition,
Revertive Mode, and Switching Mode.
4. Click Apply. Then, click Close in the Operation Result dialog box indicating that the
operation succeeded.
5. After the parameters are modified, restart the protection protocol according to Step 4.2.
Step 5 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 6 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
traffic flows in a proper direction. This helps when you plan the traffic direction planning and
service configuration in future.
3.6.2 Signal Flow and Timeslot Allocation
To configure the two-fiber unidirectional MSP service, you can configure the services that need
to be added to the ring network on the source NE, to pass through the intermediate nodes, and
to be dropped from the sink NE if the MSP protection subnet is already created.
3.6.3 Per-NE Configuration Process
This topic describes how to configure the two-fiber unidirectional MSP service.
3.6.4 End-to-End Configuration Process
This topic describes how to configure two-fiber unidirectional MSP services.
As shown in Figure 3-9, the SP3D boards are used on NE1 and NE3 as tributary boards to add
and drop services, and the SL1D boards are used as line boards to transmit SDH services.
Figure 3-9 Networking diagram of the services on the two-fiber unidirectional MSP ring
NE1:
Tributary board Line board Line board
3-SP3D 1-SL1D-1 1-SL1D-2
1-SL1D-1 1-SL1D-2
NE1
1-SL1D-2 1-SL1D-1
Two-fiber unidirectional
NE2 MSP ring NE4
1-SL1D-1
NE2: 1-SL1D-2
NE3 NE4:
Line board Line board
1-SL1D-2 1-SL1D-1 Line board Line board
1-SL1D-1 1-SL1D-2
1-SL1D-2 1-SL1D-1
NE3:
Tributary board Line board Line board
3-SP3D 1-SL1D-1 1-SL1D-2
As shown in Figure 3-10, the signal flow and timeslot allocation are as follows:
l Traffic direction from NE1 to NE3: NE1→NE2→NE3
Services are added to the ring on the source NE (NE1), pass through NE2, and finally are
dropped from the sink NE (NE3). The capacity of the services is 5xE1.
l Traffic direction from NE3 to NE1: NE3→NE4→NE1
Services are added to the ring on the source NE (NE3), pass through NE4, and finally are
dropped from the sink NE (NE1). The capacity of the services is 5xE1.
l VC-12s 1-5 of VC4-1 carry the five E1 services for transmission.
When the transmission path between NE1 and NE2 becomes faulty, the signal flow and timeslot
allocation are as follows:
l Traffic direction from NE1 to NE3: NE1→NE4→NE3→NE2→NE3
Services are added to the ring on the source NE (NE1) and switched from the original
working path to the protection path. Then, the services pass through NE4 and NE3. After
that, the services are switched from the protection path to the working path on NE2. Finally,
the services are dropped from NE3.
l The services from NE3 to NE1 are not affected, and the traffic direction is NE3→NE4→
NE1.
The difference between the two-fiber unidirectional MSP service and the two-fiber bidirectional
MSP service is as follows:
l The two-fiber unidirectional MSP service uses the diverse routes, whereas the two-fiber
bidirectional MSP service uses the uniform route.
l In the case of the two-fiber unidirectional MSP service, different optical fibers are used for
the working timeslot and protection timeslot. That is, one optical fiber is used for carrying
the working service, and the other optical fiber is used for protection. In the case of the
two-fiber bidirectional MSP service, the same optical fiber is used for the working timeslot
and protection timeslot. That is, a certain capacity of the optical fiber is used for carrying
the working service, and a certain capacity of the optical fiber is used for protection.
Figure 3-10 Signal flow and timeslot allocation of the two-fiber unidirectional MSP services
5xE1services are
added/dropped
VC4-1:1-5(VC12) 3-SP3D NE1:
Tributary board Line board Line board
1-SL1D-1 1-SL1D-2 3-SP3D 1-SL1D-1 1-SL1D-2
NE1
1-SL1D-2 1-SL1D-1
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
Pass-through service Two-fiber unidirectional 线路
Pass-through service
NE2 NE4 板
MSP ring
1-SL1D-1 1-SL1D-2
NE2: NE4:
Line board Line board Line board Line board
NE3
1-SL1D-2 1-SL1D-1 1-SL1D-1 1-SL1D-2
1-SL1D-2 1-SL1D-1
NE3:
VC4-1:1-5(VC12) 3-SP3D
Tributary board Line board Line board
5xE1services are
added/dropped 3-SP3D 1-SL1D-1 1-SL1D-2
Traffic direction of
the working path Line board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with the information about 3.6.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Configure unidirectional services from NE1 to NE3.
1. Configure SDH services on the source NE (NE1).
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters that are required, and then click OK.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the source tributary board for the unidirectional
services from NE1 to NE2. See Figure 3-10.
Source VC4 - -
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-10.
Sink VC4 VC4-1 In this example, the services require five VC-12s.
Sink VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Activate Yes -
Immediately
Click , and select NE2 from the displayed NE Navigator. Click OK.
Direction Unidirection In this example, the services are transmitted and received
al on different paths. That is, the services are unidirectional
services. Hence, Direction of the services is set to
Unidirectional.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-10. You can select
different source boards depending on the actual
situation.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-10.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Activate Yes -
Immediately
Click , and select NE2 from the displayed NE Navigator. Click OK.
Direction Unidirection In this example, the services are transmitted and received
al on different paths. That is, the services are unidirectional
services. Hence, Direction of the services is set to
Unidirectional.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-10.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Sink Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the sink tributary board for the unidirectional services
from NE1 to NE3. See Figure 3-10.
Sink VC4 - -
Activate Yes -
Immediately
Direction Unidirection In this example, the services are transmitted and received
al on different paths. That is, the services are unidirectional
services. Hence, Direction of the services is set to
Unidirectional.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the source tributary board for the unidirectional
services from NE3 to NE1. See Figure 3-10.
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-10.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Activate Yes -
Immediately
Direction Unidirection In this example, the services are transmitted and received
al on different paths. That is, the services are unidirectional
services. Hence, Direction of the services is set to
Unidirectional.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-10.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-10.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Activate Yes -
Immediately
Direction Unidirection In this example, the services are transmitted and received
al on the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-10.
Source VC4 VC4-1 In this example, the service requires five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Sink VC4 3-SP3D In this example, the SP3D board in slot 3 is configured
as the sink tributary board for the unidirectional services
from NE3 to NE1. See Figure 3-10.
Activate Yes -
Immediately
Step 3 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l A linear MSP subnet must be created and must be the same as the actual topology. For
details about how to create a protection subnet, see 2.6.3 Creating an MS Ring Protection
Subnet.
l The operator must understand the information provided in 3.6.2 Signal Flow and Timeslot
Allocation.
Background Information
In end-to-end mode, configuration of two-fiber unidirectional MSP services is similar to
configuration of two-fiber bidirectional MSP services. The only difference is that you set
Direction to Unidirectional for two-fiber unidirectional MSP services and set Direction to
Bidirectional for two-fiber bidirectional MSP services.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Double-click the source NE (NE1) and sink NE (NE3) on the right of the Main Topology
and click Apply. Then, click Close in the Operation Result dialog box that is displayed,
if the operation is successful. A unidirectional VC4 server trail is set up from NE1 to NE3.
3. Double-click the source NE (NE3) and sink NE (NE1) on the right of the Main Topology,
and set up a unidirectional VC4 server trail from NE3 to NE1 using the same method.
4. Optional: If the Operation Result dialog box indicates that the operation is successful,
you can also click Browse Trail to query the created VC4 server trail.
2. Double-click the source NE (NE1) on the right of the Main Topology. The Select Board
Port-Source dialog box is displayed. Select the required SP3D board and Tributary
Port, and then click OK.
3. Double-click the sink NE (NE3) on the right of the Main Topology, and configure NE3
using the same method.
4. Select Copy after Creation and click Apply. If the Operation Result dialog box is
displayed to indicate that the operation is successful, click Close. Then, the Copy dialog
box is displayed.
5. In Available Timeslots/Port, select the ports from SP3D-2(SDH_TU-2) to SP3D-5
(SDH_TU-5), and click Add.
6. If the Operation Result dialog box is displayed to indicate that the operation is successful,
click Close.
7. Optional: If the Operation Result dialog box is displayed to indicate that the operation is
successful, you can also click Browse Trail to query the created VC12 services.
Parameter settings of the sink NE must be the same as those of the source NE.
1. Choose Service > SDH Protection Subnet > Maintenance SDH Protection Subnet from
the Main Menu to display the SDH Protection Subnet Common Attributes window.
2. Click the Protection Subnet Parameters tab and change parameters such as WTR
Time and SD Condition.
3. Click Apply. If the Operation Result dialog box is displayed to indicate that the operation
is successful, click Close.
Step 5 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 6 Enable the performance monitoring function for NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Figure 3-11 Networking diagram of the services on the two-fiber bidirectional MSP ring
NE1:
Tributary board Line board Line board
3-SP3D 1-SL4D-1 1-SL4D-2
1-SL4D-1 1-SL4D-2
NE1
1-SL4D-2 1-SL4D-1
NE3:
Tributary board Line board Line board
3-SP3D 1-SL4D-1 1-SL4D-2
NE1
VC4-1:1-5(VC12) 线路
Pass-through service NE2 MSP ring NE4 板
NE2:
Line board Line board
1-SL4D-2 1-SL4D-1 NE3
NE3:
Tributary board Line board Line board
3-SP3D 1-SL4D-1 1-SL4D-2
VC4-1:1-5(VC12)
5xE1 services are
service Line board added/dropped
route
Tributary board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.3 Creating an MS Ring
Protection Subnet.
l You must be familiar with 3.7.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK.
Direction Bidirectiona In this example, the services are transmitted and received
l on the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 is configured
as the source tributary board. See Figure 3-12. You can
select different source boards depending on the actual
situation.
Source VC4 - -
Source 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Source Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-12.
Sink Slot 1-SL4D-1 In this example, the SL4D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-12. You can select
different sink boards depending on the actual situation.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Sink 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Sink Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-12.
Activate Yes -
Immediately
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 and configure the SDH
services of NE3. Set the parameters as follows.
Parameter Value in Description
This
Example
Direction Bidirectional In this example, the services are transmitted and received
on the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 is configured as
(SDH-2) the source line board. See Figure 3-12. You can select
different source boards depending on the actual situation.
Source 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Source Timeslot Range(e.g.1,3-6) is set to 1-5. See Figure
1,3-6) 3-12.
Sink Slot 3-SP3D In this example, the SP3D board in slot 3 is configured as
the sink tributary board. See Figure 3-12. You can select
different sink boards depending on the actual situation.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63 VC-12s.
Sink VC4 - -
Sink Timeslot 1-5 In this example, the total capacity of the services is 5xE1
Range(e.g. according to the plan. The service level is VC12. Hence,
1,3-6) Sink Timeslot Range(e.g.1,3-6) is set to 1-5. See Figure
3-12.
Activate Yes -
Immediately
Direction Bidirectiona In this example, the services are transmitted and received
l on the same path. That is, the services are bidirectional
services. Hence, Direction of the services is set to
Bidirectional.
Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-12. You can select
different source boards depending on the actual
situation.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Source 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Source Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-12.
Sink Slot 1-SL4D-1 In this example, the SL4D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-12. You can select
different sink boards depending on the actual situation.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Sink 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Sink Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-12.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l An MSP subnet must be created and must be the same as the actual topology. For details
about how to create a protection subnet, see 2.6.4 Creating a Linear MS Protection
Subnet.
l The operator must understand the information provided in 3.7.2 Signal Flow and Timeslot
Allocation.
Background Information
In end-to-end mode, configuration of two-fiber unidirectional MSP services is similar to
configuration of two-fiber bidirectional MSP services. The only difference is that you set
Direction to Unidirectional for two-fiber unidirectional MSP services and set Direction to
Bidirectional for two-fiber bidirectional MSP services.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Double-click the source NE (NE1) and sink NE (NE3) on the right of the main topology
and click Apply. In the Operation Result dialog box that is displayed, click Close.
3. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC4 service-layer trail.
2. Double-click the source NE on the right of the main topology. The Select Board Port-
Source dialog box is displayed. Select the required PDH board and Tributary Port. Click
OK.
3. Double-click the sink NE (NE3) on the right of the main topology. Configure NE2 in the
same manner.
4. Select Copy after Creation and click Apply. In the Operation Result dialog box that is
displayed, click Close. Then, the Copy dialog box is displayed.
5. In Available Timeslots/Port, select the ports from NE1-Slot3-SP3D-2(SDH_TU-2) to
NE3-Slot3-SP3D-5(SDH_TU-5), and click Add.
6. In the Operation Result dialog box that is displayed, click Close.
7. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC12 services.
Step 4 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
timeslots for the working service and protection service, and configure pass-through services on
the intermediate nodes. The following part describes how to configure services on an SNCP ring
in an end-to-end manner.
Figure 3-13 shows an SNCP ring that comprises four pieces of MSTP equipment. In this
example, the SP3D boards are configured on the source NE (NE1) and the sink NE (NE3) as
tributary boards to add and drop services, and the SL1D boards are used as line boards to transmit
SDH services.
3-SP3D
1-SL1D-1 1-SL1D-2
NE1
1-SL1D-2 1-SL1D-1
1-SL1D-1
NE2: 1-SL1D-2
NE3
Line board Line board NE4:
1-SL1D-2 1-SL1D-1 Line board Line board
1-SL1D-2 1-SL1D-1 1-SL1D-1 1-SL1D-2
NE3: 3-SP3D
Tributary board Line board Line board
3-SP3D 1-SL1D-1 1-SL1D-2
Figure 3-14 shows the signal flow of the services on the SNCP ring and the timeslot allocation
to the services on the SNCP ring. In the actual configuration, you can plan other proper working
paths and protection paths according to the requirement. In this example, the working service
route is NE1-NE2-NE3 and the protection service route is NE1-NE4-NE3. There are five E1
services.
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
1-SL1D-1 1-SL1D-2
1-SL1D-1 1-SL1D-2
NE3
1-SL1D-2 1-SL1D-1
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
NE3:
5xE1 services are
added/dropped Protection
Traffic direction of SNCP protection Service service Service
Line board
the working path group source source sink
Traffic direction of Group 1 1-SL1D-2 3-SP3D
1-SL1D-1
the protection path Tributary board
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l You must be familiar with 3.8.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE1).
1. In the NE Explorer, select NE1, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create SNCP Service on the lower-right pane to display the Create SNCP
Service dialog box. Set the parameters that are required, and then click OK.
WTR Time (s) 600 After the working path is recovered to normal
and the normal state lasts for 600s, the
switching restoration occurs. This parameter is
valid only when the Revertive Mode
parameter is set to Revertive.
Sink VC4 - -
Step 2 Configure the SDH services of the sink NE (NE3). Refer to Step 1 and configure the SDH
services of NE3. The method and parameters for configuring the SDH services of NE3 are the
same as the method and parameters for configuring the SDH services of NE1.
Step 3 Configure the pass-through services of NE2.
1. In the NE Explorer, select NE2 and then choose Communication > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters that are required, and then click OK.
Parameter Value in Description
This
Example
Direction Bidirectiona In this example, the services are transmitted and received
l on the same path. That is, the services are bidirectional
services. Hence, Direction of the E1 services is set to
Bidirectional.
Source Slot 1-SL1D-2 In this example, the SL1D board in slot 1 is configured
(SDH-2) as the source line board. See Figure 3-14. You can select
different source boards depending on the actual
situation.
Source VC4 VC4-1 In this example, the services require five VC-12s.
Source VC4 is set to VC4-1, because a VC-4 contains
63 VC-12s.
Source 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Source Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-14.
Sink Slot 1-SL1D-1 In this example, the SL1D board in slot 1 is configured
(SDH-1) as the sink line board. See Figure 3-14. You can select
different sink boards depending on the actual situation.
Sink VC4 VC4-1 In this example, the services require five VC-12s. Sink
VC4 is set to VC4-1, because a VC-4 contains 63
VC-12s.
Sink 1-5 In this example, the total capacity of the services is 5xE1
Timeslot according to the plan. The service level is VC12. Hence,
Range(e.g. Sink Timeslot Range(e.g.1,3-6) is set to 1-5. See
1,3-6) Figure 3-14.
Activate Yes -
Immediately
Step 4 Configure the pass-through services of NE4. Refer to Step 3 and configure the pass-through
services of NE4. The method and parameters for configuring the pass-through services of NE4
are the same as the method and parameters for configuring the pass-through services of NE2.
Step 5 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 6 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l The operator must understand the information provided in 3.8.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Double-click the source NE (NE1) and sink NE (NE3) on the right of the Main Topology,
and set up a VC4 server trail from NE1 to NE3 via NE2.
a. On the Route Constraint tab, right-click Explicit Node, and then choose Add.
b. In the Add Explicit Node dialog box that is displayed, set Type and What for
configuring the pass-through node NE2.
c. Click OK. The VC4 server trail is sure to stretch from NE1 to NE3 via NE2
3. Click Apply. Then, click Close in the Operation Result dialog box indicating that the
operation succeeded.
4. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 server trail.
Step 3 Set up a protection VC4 server trail using the same method as setting up a VC4 server trail.
During the setup of a protection VC4 server trail, ensure that the originated node is NE1, the
terminated node is NE3, and the pass-through node is NE4.
2. Double-click the source NE (NE1) on the right of the Main Topology. The Select Board
Port-Source dialog box is displayed. Select the required SP3D board and Tributary
Port, and then click OK.
3. Double-click the sink NE (NE3) on the right of the Main Topology, and use the same
method to Tributary Port of NE3.
4. In Create SDH Trail, click the SNCP Setting tab, right-click in the blank pane, and choose
Add from the shortcut menu. In the Add the dual-fed and selective receiving node dialog
box that is displayed, select NE1 as the dual-fed node and NE3 as the selective receiving
node, and then click OK. In the Operation Result dialog box indicating that the operation
succeeded, click Close.
5. Optional: In the Create SDH Trail window, select Set Route Timeslot. In the dialog box
that is displayed, you can modify the working server trail of VC12 services.
6. Select Copy after Creation and click Apply. In the Operation Result dialog box
indicating that the operation succeeded, click Close. Then, the Copy dialog box is
displayed.
7. In Available Timeslots/Port, select the ports from NE1-Slot3-SP3D-2(SDH_TU-2) to
NE3-Slot3-SP3D-5(SDH_TU-5), and click Add.
8. Click OK. In the Operation Result dialog box indicating that the operation succeeded,
click Close.
9. Optional: In the Operation Result dialog box indicating that the operation succeeded, you
can also click Browse Trail to query the created VC12 services.
Step 5 Optional: After configuring SNCP services in an end-to-end manner, you can browse the created
VC4 server trails and VC12 services by choosing Service > SDH Trail > Manage SDH
Trail from the Main Menu and specifying the filter conditions.
Step 6 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 7 Enable the performance monitoring function for NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 8 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
To delete any service that is incorrectly configured, see Deleting SDH Services.
The networking of the SNCP ring in the case of configuring the services on the SNCP ring with
a non-protection chain is similar to the networking in the case of configuring the services on the
SNCP ring. The services from the SNCP ring to the non-protection chain pass through the
intersecting node and are added to or dropped from the NE on the non-protection chain.
3.9.2 Signal Flow and Timeslot Allocation
To configure services on the SNCP ring with a non-protection chain, you need to plan proper
traffic directions for the services on the SNCP ring and the services on the non-protection chain.
In the case of the services on the SNCP ring, allocate timeslots for the source slot of the working
service and timeslots for the source slot of the protection service, when allocating timeslots for
source slots.
3.9.3 Per-NE Configuration Process
Before you configure the services on the SNCP ring with a non-protection chain, familiarize
yourself with the information about the source slot, sink slot, and their corresponding timeslots
of the working service and protection service on the source and sink NEs on the SNCP ring. You
need to configure the pass-through services on the intersecting NE.
3.9.4 End-to-End Configuration Process
Before configuring services on an SNCP ring with a non-protection chain, familiarize yourself
with the information about the source slot, sink slot, and their corresponding timeslots of the
working service and protection service on the source and sink NEs on the SNCP ring. You also
need to configure pass-through services on the intersecting NE. The following part describes
how to configure services on an SNCP ring with a non-protection chain in an end-to-end manner.
Figure 3-15 Networking diagram of the services on the SNCP ring with a non-protection chain
NE1:
Line board Line board
1-SL4D-1 1-SL4D-2
NE1
1-SL4D-2 1-SL4D-1
3-SP3D
2-SL1D-1 2-SL1D-1
NE2 SNCP ring NE4
1-SL4D-1 Non-protection
1-SL4D-2 chain NE5
NE2: NE3
Line board Line board NE4:
1-SL4D-2 1-SL4D-1 Line board Line board Line board
1-SL4D-1 1-SL4D-2 2-SL1D-1
1-SL4D-2 1-SL4D-1
3-SP3D
NE3:
Tributary board Line board Line board
3-SP3D 1-SL4D-1 1-SL4D-2
1-SL4D-2 1-SL4D-1
VC4-1:1-5(VC12) VC4-1:1-5(VC12)
3-
SP3D NE3:
Traffic direction of Protection
Line board 5×E1 SNCP protection
the working path Service service Service
Traffic direction of group source source sink
the protection path Tributary board Group 1 1-SL4D-1 1-SL4D-2 3-SP3D
Traffic direction of services
on the non-protection chain
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see 2.6.1 Configuring a Non-Protection
Chain.
l You must be familiar with 3.9.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE3).
1. In the NE Explorer, select NE3, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create SNCP Service on the lower-right pane to display the Create SNCP
Service dialog box. Set the parameters that are required, and then click OK.
WTR Time (s) 600 After the working path is recovered to normal and
the normal state lasts for 600s, the switching
restoration occurs. This parameter is valid only
when the Revertive Mode parameter is set to
Revertive.
Wor Source Slot 1-SL4D-1 In this example, the SL4D board in slot 1 of NE3
king (SDH-1) is configured as the source line board of the
Ser working service. See Figure 3-16.
vice
Source VC4 VC4-1 In this example, the working service source uses
the timeslots of VC4-1.
Sink Slot 3-SP3D In this example, the SP3D board in slot 3 of NE3
is configured as the sink line board of the working
service. See Figure 3-16.
Sink VC4 - -
Prot Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 of NE3
ecti (SDH-2) is configured as the source line board of the
on protection service. See Figure 3-16.
Ser
vice Source VC4 VC4-1 In this example, the protection service source uses
the timeslots of VC4-1.
WTR Time (s) 600 After the working path is recovered to normal and
the normal state lasts for 600s, the switching
restoration occurs. This parameter is valid only
when the Revertive Mode parameter is set to
Revertive.
Wor Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 of NE4
king (SDH-2) is configured as the source line board of the
Ser working service. See Figure 3-16.
vice
Source VC4 VC4-1 In this example, the working service source uses
the timeslots of VC4-1.
Sink Slot 2-SL1D-1 In this example, the SL1D board in slot 2 of NE4
(SDH-1) is configured as the sink line board of the working
service. See Figure 3-16.
Sink VC4 VC4-1 In this example, the working service sink uses the
timeslots of VC4-1.
Prot Source Slot 1-SL4D-1 In this example, the SL4D board in slot 1 of NE3
ecti (SDH-1) is configured as the source line board of the
on protection service. See Figure 3-16.
Ser
vice Source VC4 VC4-1 In this example, the protection service source uses
the timeslots of VC4-1.
Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 of NE2 is
(SDH-2) configured as the source line board. See Figure 3-16.
Source VC4 VC4-1 In this example, the working service source uses the
timeslots of VC4-1.
Sink Slot 1-SL4D-1 In this example, the SL4D board in slot 1 of NE2 is
(SDH-1) configured as the sink line board. See Figure 3-16.
Sink VC4 VC4-1 In this example, the service sink uses the timeslots of
VC4-1.
Activate Yes -
Immediately
Step 4 Configure the pass-through services of NE1. Refer to Step 3 and configure the SDH services of
NE1. The method and parameters for configuring the pass-through services of NE1 are the same
as the method and parameters for configuring the pass-through services of NE2.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE5 is
configured as the source tributary board. See Figure
3-16.
Source VC4 - -
Sink Slot 2-SL1D-1 In this example, the SL1D board in slot 2 of NE5 is
(SDH-1) configured as the sink line board. See Figure 3-16.
Sink VC4 VC4-1 In this example, the service sink uses the timeslots of
VC4-1.
Activate Yes -
Immediately
Step 6 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 7 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 8 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l A protection subnet must be created and must be the same as the actual topology. For details
about how to create a protection subnet, see 2.6.1 Configuring a Non-Protection Chain.
l The operator must understand the information provided in 3.9.2 Signal Flow and Timeslot
Allocation.
Procedure
Step 1 Create a working VC-4 server trail.
1. Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Set associated parameters as follows. Set Level to VC4 Server Trail, and take default
values for other parameters.
3. Double-click NE3 and NE4 on the right of the Main Topology, select the trail from NE3
to NE4 as the working, VC-4 server trail, and click Close. In the Operation Result dialog
box indicating that the operation succeeded, click Close.
4. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 server trail.
Step 2 Create a protection VC-4 server trail, using the method described in Step 1.
NOTE
When creating a protection VC-4 server trail, double-click NE3 and NE4 on the right of the Main Topology,
and ensure that the traffic direction is NE3-NE2-NE1-NE4.
On the Route Constraint tab, click the Explicit Node tab, right-click in the blank area, and then choose
Add from the shortcut menu. In the Add Explicit Node dialog box that is displayed, set Type and What
for configuring the pass-through node NE2, and then click OK.
2. Double-click NE4 and NE5 on the right of the Main Topology, and click Apply. Then,
click Close in the Operation Result dialog box indicating that the operation succeeded.
3. Optional: In the Operation Result dialog box indicating that the operation succeeded,
click Browse Trail to query the created VC4 server trail.
2. Double-click the NE3 on the right of the Main Topology. The Select Board Port-
Source dialog box is displayed. Select the SP3D board to be configured and choose 1 on
Tributary Port, and then click OK.
3. Configure NE5 using the method described in Step 4.2.
4. In Create SDH Trail, click the SNCP Setting tab, right-click in the blank area, and choose
Add from the shortcut menu. In the Add the dual-fed and selective-receiving node dialog
box that is displayed, select NE3 as the dual-fed node and NE4 as the selective receiving
node, and then click OK. In the Operation Result dialog box indicating that the operation
succeeded, click Close.
5. Select Copy after Creation and click Apply. In the Operation Result dialog box
indicating that the operation succeeded, click Close. Then, the Copy dialog box is
displayed.
6. In Available Timeslots/Port, select the ports from NE3-Slot5-SP3D-2(SDH_TU-2) to
NE5-Slot5-SP3D-5(SDH_TU-5), and click Add.
7. In the Operation Result dialog box indicating that the operation succeeded, click Close.
8. Optional: In the Operation Result dialog box indicating that the operation succeeded, you
can also click Browse Trail to query the created VC12 services.
Step 5 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 6 Enable the performance monitoring function for NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 7 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
To delete any service that is incorrectly configured, see Deleting SDH Services.
Figure 3-17 Networking diagram of the services on the two-fiber bidirectional MSP ring with
a non-protection chain
NE1:
Line board Line board
1-SL4D-1 1-SL4D-2
1-SL4D-1 1-SL4D-2
NE5:
Tributary board Line board
3-SP3D 2-SL1D-1
NE1
1-SL4D-2 1-SL4D-1
2-SL1D-1 2-SL1D-1
Two-fiber bidirectional
NE2 NE4
MSP ring
Non-protection
1-SL4D-1 1-SL4D-2 chain NE5
NE2: NE3
Line board Line board NE4:
1-SL4D-2 1-SL4D-1 Line board Line board Line board
1-SL4D-1 1-SL4D-2 2-SL1D-1
1-SL4D-2 1-SL4D-1
NE3:
Tributary board Line board Line board
3-SP3D 1-SL4D-2 1-SL4D-1
Figure 3-18 shows the signal flow of the services on the MSP ring with a non-protection chain
and the timeslot allocation to the services on the MSP ring with a non-protection chain. In this
example, five E1 services are added to or dropped from NE3 and NE5, and these services pass
through NE4.
On the MSP ring, the services from NE3 to NE4 in this example are transmitted on the short
path. In the actual configuration, you can plan other service paths according to the requirement.
NOTE
On a ring network, the long path and short path do not actually refer to the geographical distance. They are
determined by the number of intermediate NEs. As shown in Figure 3-18, when the service is transmitted
from NE3 to NE4, NE3→NE4 is the short path, and NE3→NE2→NE1→NE4 is the long path.
1-SL4D-1 1-SL4D-2
NE4:
NE1
Line board Line board Line board
1-SL4D-1 1-SL4D-2 2-SL1D-1
1-SL4D-2 1-SL4D-1
2-SL1D-1 2-SL1D-1 3-SP3D
1-SL4D-2 1-SL4D-1
VC4-1:1-5(VC12)
Line board
NE3:
5×E1
Tributary board Line board Tributary board
1-SL4D-1 3-SP3D
Traffic direction of the MSP ring
Traffic direction of the non-protection chain
Prerequisite
l The physical topology of the network must be created.
l The NEs, boards, and fibers must be created on the U2000.
l The created protection subnet must be consistent with the actual network topology. For
details about how to create the protection subnet, see2.6.1 Configuring a Non-Protection
Chain and 2.6.3 Creating an MS Ring Protection Subnet.
l You must be familiar with 3.10.2 Signal Flow and Timeslot Allocation.
Procedure
Step 1 Configure the SDH services of the source NE (NE3).
1. In the NE Explorer, select NE3, and then choose Configuration > SDH Service
Configuration from the Function Tree.
2. Click Create on the lower-right pane to display the Create SNCP Service dialog box. Set
the parameters that are required, and then click OK.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE3 is
configured as the source tributary board. See Figure
3-18.
Source VC4 - -
Sink Slot 1-SL4D-1 In this example, the SL4D board in slot 1 of NE3 is
(SDH-1) configured as the sink line board. See Figure 3-18.
Sink VC4 VC4-1 In this example, the service sink uses the timeslots of
VC4-1.
Activate Yes -
Immediately
Step 2 Refer to Step 1 and configure the SDH services of NE5. Set the parameters as follows.
Direction Bidirectional In this example, the services are transmitted and received
on the same path. That is, the services are Bidirectional
services.
Source Slot 3-SP3D In this example, the SP3D board in slot 3 of NE5 is
configured as the source tributary board. See Figure
3-18.
Source VC4 - -
Source Timeslot 1-5 In this example, five E1 services are configured between
Range(e.g.1,3-6) NE3 and NE5. Hence, the service source occupies
VC-12s 1-5.
Sink Slot 2-SL1D-1 In this example, the SL1D board in slot 2 of NE5 is
(SDH-1) configured as the sink line board. See Figure 3-18.
Sink VC4 VC4-1 In this example, the service sink uses the timeslots of
VC4-1.
Sink Timeslot 1-5 In this example, five E1 services are configured between
Range(e.g.1,3-6) NE3 and NE5. Hence, the service sink occupies VC-12s
1-5.
Activate Yes -
Immediately
Source Slot 1-SL4D-2 In this example, the SL4D board in slot 1 of NE4 is
(SDH-2) configured as the source line board. See Figure 3-18.
Source VC4 VC4-1 In this example, the service source uses the timeslots
of VC4-1.
Sink Slot 2-SL1D-1 In this example, the SL1D board in slot 2 of NE5 is
(SDH-1) configured as the sink line board. See Figure 3-18.
Sink VC4 VC4-1 In this example, the service sink uses the timeslots of
VC4-1.
Activate Yes -
Immediately
Step 4 Check whether the services are configured correctly. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Prerequisite
l The physical network topology must be set up.
l NEs, boards, and fibers must be successfully created on the U2000.
l A protection subnet must be created and must be the same as the actual topology. For details
about how to create a protection subnet, see 2.6.1 Configuring a Non-Protection Chain
and 2.6.4 Creating a Linear MS Protection Subnet.
l The operator must understand the information provided in 3.10.2 Signal Flow and
Timeslot Allocation.
Procedure
Step 1 Create a VC-4 server trail.
1. Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2. Set associated parameters as follows. Set Level to VC4 Server Trail, and take default
values for other parameters.
3. Double-click NE3 and NE5 on the right of the Main Topology, and click Apply. Then,
click Close in the Operation Result dialog box that is displayed.
4. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC4 server trail.
2. Double-click the NE3 on the right of the Main Topology. The Select Board Port-
Source dialog box is displayed. Select the required PDH board and Tributary Port, and
then click OK.
3. Configure NE5 using the method described in Step 2.2.
4. Select Copy after Creation and click Apply. In the Operation Result dialog box that is
displayed, click Close. Then, the Copy dialog box is displayed.
5. In Available Timeslots/Port, select the timeslots or ports to be duplicated, and click
Add.
6. In the Operation Result dialog box that is displayed, click Close.
7. Optional: In the Operation Result dialog box that is displayed, you can also click Browse
Trail to query the created VC12 services.
Step 3 Check whether the service configuration is correct. For details, see Verifying the Correctness
of the SDH Service Configuration.
Step 4 Enable the performance monitoring function for NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
To delete any service that is incorrectly configured, see Deleting SDH Services.
WTR Time (s) For example: 600 Displays the switching WTR
time of the protection
subnetwork.
EPL Services
Two nodes are used to access EPL services and implement transparent transmission of the
Ethernet services of the users. The service of one user occupies one VCTRUNK and need not
share the bandwidth with the services of the other users. Hence, in the case of EPL services, a
bandwidth is exclusively occupied by the service of a user and the services of different users are
isolated. In addition, the extra QoS scheme and security scheme are not required.
NE 1 NE2
Port2 Port2
VCTRUNK2
User B1 User B2
The corresponding relations between the PORTs (namely, external ports) and the VCTRUNKs
are listed in Table 4-1.
Table 4-1 Corresponding relations between the external ports and the VCTRUNKs (EPL
services)
NE1 NE2
EVPL Services
In the case of EVPL services, services of different users share the bandwidth. Hence, the VLAN/
QinQ scheme needs to be used for differentiating the services of different users. If the services
of different users need to be configured with different quality levels, you need to adopt the
corresponding QoS scheme. EVPL services are classified into two types, depending on whether
the PORT or VCTRUNK is shared.
User C1 NE 1 NE2
Port1
VLAN 100 VCTRUNK1 Port1
VLAN 200 VCTRUNK2 Port2
User C3
The corresponding relations between the PORTs and the VCTRUNKs are provided in Table
4-2.
Table 4-2 Corresponding relations between the PORTs and the VCTRUNKs (PORT-shared
EVPL services)
NE1 NE2
NE 1 NE2
Port1 Port1
VCTRUNK1
Port2 Port2
User E1 User E2
The corresponding relations between the PORTs and the VCTRUNKs are provided in Table
4-3.
Table 4-3 Corresponding relations between the PORTs and the VCTRUNKs (VCTRUNK-
shared EVPL services)
NE1 NE2
EPLAN Services
The EPLAN services can be accessed from a minimum of two nodes. Hence, the services of
different users need not share the bandwidth. That is, in the case of EPLAN services, a bandwidth
is exclusively occupied by the service of a user and the services of different users are isolated.
In addition, the extra QoS scheme and security scheme are not required. The EPLAN services
have more than one node. Hence, the nodes need to learn the MAC addresses and forward data
according to MAC addresses. Therefore, Layer 2 switching is realized.
As shown in Figure 4-4, three branches of user F need to communicate with each other. On
NE1, the IEEE 802.1d bridge is established to achieve EPLAN services. The IEEE 802.1d bridge
can create the MAC address-based forwarding table, which is periodically updated by using the
self-learning function of the system. The accessed data can be forwarded or broadcast within
the domain of the IEEE 802.1d bridge according to the destination MAC addresses.
NE3
U2000
NE2 NE4
F2 F3
PORT5
IEEE 802.1d bridge
VCTRUNK
VCTRUNK1 VCTRUNK2
F1
PORT5
EVPLAN Services
EVPLAN services of different users need to share the bandwidth. Hence, the VLAN/QinQ
scheme needs to be used for differentiating the data of different users. If the services of different
users need to be configured with different quality levels, you need to adopt the corresponding
QoS scheme.
As shown in Figure 4-5, three branches of user G need to communicate with each other. Services
of user G need to be isolated from the services of user H. Hence, the IEEE 802.1q bridge needs
to be established on NE1 to achieve EVPLAN services.
IEEE 802.1q bridge: IEEE 802.1q bridge supports isolation by using one layer of VLAN tags.
This bridge checks the contents of the VLAN tags that are in the data frames and performs Layer
2 switching according to the destination MAC addresses and VLAN IDs.
NE3
NM
PORT2 PORT2
H2 NE2 NE4
H3
PORT1 NE1 PORT1
G2 G3
H1 G1
PORT6 PORT5
VCTRUNK
As shown in Figure 4-6, the VoIP services from user M and the HSI services from user N need
to respectively access the VoIP server and the HSI server. In this case, the operator needs to
separately groom the VoIP services and HSI services, and isolate the data on the transmission
network side. On NE1, the IEEE 802.1ad bridge must be established to support the EVPLAN
services.
IEEE 802.1ad bridge: The IEEE 802.1ad bridge supports data frames with two layers of VLAN
tags. This bridge adopts the outer S-VLAN tags to isolate different VLANs and supports only
the mounted ports whose attributes are C-Aware or S-Aware. This bridge supports the following
switching modes:
l This bridge does not check the contents of the VLAN tags that are in the packets and
performs Layer 2 switching according to the destination MAC addresses of the packets.
l This bridge checks the contents of the VLAN tags that are in the packets and performs
Layer 2 switching according to the destination MAC addresses and the S-VLAN IDs of the
packets.
NE3
NM
Service C-VLAN Service C-VLAN
VoIP 10 VoIP 10
HSI 20 HSI 20
PORT1 PORT1
User M NE2 NE4 User N
8 NE1 11
VoIP 11 8
HSI
PORT5 PORT6
VCTRUNK
PORT5 PORT6
The length of the data field is variable. maximum length of the data field depends on the
maximum frame length that the ports of the equipment support.
The four-byte S-VLAN or C-VLAN field is divided into two sub-fields: the tag protocol ID
(TPID) and the tag control Information (TCI).
Both the TPID and TCI consist of two bytes. See Figure 4-8.
Figure 4-8 Positions of the TPID and TCI in the frame structure
S-VLAN C-VLAN
Destination Source MAC TPID TCI TPID TCI Length/Type Data FCS Check
MAC Address Address Character
Variable
6 bytes 6 bytes 2 2 bytes 2 bytes 2 bytes 2bytes 2 bytes 4 bytes
length
l TPID structure
The TPID consists of two bytes and indicates the VLAN tag type. TPID of the C-VLAN is
always 0x8100 whereas the TPID of the S-VLAN can be customized. Refer to Table 4-4.
NOTE
The IEEE 802.1ad specifies the TPID of the S-VLAN to 0x88a8. In actual application, the setting of TPID
for the S-VLAN tag varies according to the equipment manufacturer. To ensure compatibility between
interconnected equipment, it is recommended that you set the TPIDs of the S-VLAN tags of the
interconnected equipment to the same value within 0X600-FFFF.
l TCI structure
The TCI structure of the S-TAG is basically the same as the TCI structure of the C-TAG. VLAN
ID (VID) field consists of 12 bits and ranges from 0 to 4095. The difference is that the TCI of
the S-TAG contains the drop eligible (DE) indication and works with the priority code point
(PCP) to indicate the priority of the S-TAG frame.
The TCI structures of the C-TAG and S-TAG are shown in Figure 4-9 and Figure 4-10.
Octets: 1 2
PCP CFI VID VID
Bits: 8 6 5 4 1 8 1
Octets: 1 2
PCP DE VID VID
Bits: 8 6 5 4 1 8 1
External ports on Ethernet boards (that is, external physical ports) are also referred to as client-
side ports or user-side ports, which are used to access the Ethernet services on the user side.
Internal ports on Ethernet boards (that is, internal VCTRUNKs) are also referred to as system-
side ports or backplane-side ports in certain cases, which are used to encapsulate and map the
services to the SDH side.
VCTRUNKs are VC-based transmission paths, which can be implemented by using the adjacent
concatenation or virtual concatenation technology. On the U2000 window, paths are bound to
specify the bandwidth of different granularities for a VCTRUNK port.
Cross-
Interface Service Encapsulation/ Interface connect unit
module processing Mapping conversion
module module module Cross-
connect unit
Ethernet board
4.2.3 Auto-Negotiation
The auto-negotiation function allows the network equipment to send information of its supported
working mode to the opposite end on the network and to receive the corresponding information
that the opposite end may transfer.
The working modes of the interconnected ports on the equipment at both ends must be the same.
Otherwise, the services are affected.
If the working mode of the port on the opposite equipment is full duplex and if the working
mode of the port on the local equipment is auto-negotiation, the local equipment works in the
half-duplex mode. That is, the working modes of the interconnected ports at both ends are
different, and thus packets may be lost. Hence, when the working mode of the port on the opposite
equipment is full duplex, you need to set working mode of the port on the local equipment to
full duplex.
NOTE
When the interconnected ports at both sides work in the auto-negotiation mode, the equipment at both sides
can negotiate the flow control through the auto-negotiation function.
The auto-negotiation function uses fast link pulses (FLPs) and normal link pulses (NLPs) to
transfer information of the working mode so that no packet or upper layer protocol overhead
needs to be added.
NOTE
This topic considers FE electrical interfaces as an example to describe how to implement the auto-negotiation
function.
The FLP is called the 100BASE-T link integrity test pulse sequence. Each set of equipment on
the network must be capable of issuing FLP bursts in the case of power-on, issuing of
management commands, or user interaction. The FLP burst consists of a series of link integrity
test pulses that form an alternating clock/data sequence. Extraction of the data bits from the FLP
burst yields a link code word that identifies the working modes supported by the remote
equipment and certain information used for the negotiation and handshake mechanism.
To maintain interoperability with the existing 100BASE-T equipment, the auto-negotiation
function also supports the reception of 100BASE-T compliant link integrity test pulses. The
10BASE-T link pulse activity is referred to as the NLP sequence. equipment that fails to respond
to the FLP burst sequence by returning only the NLP sequence is treated as the 100BASE-T
compatible equipment.
The first pulse in an FLP burst is defined as a clock pulse. Clock pulses within an FLP burst
occur at intervals of 125 us. Data pulses occur in the middle of two adjacent clock pulses. The
positive pulse represents logic "1" and the absence of a pulse represents logic "0". An FLP burst
consists of 17 clock pulses and 16 data pulses (if all data bits are 1). The NLP waveform is
simpler than the FLP waveform. NLP sends a positive pulse every 16 ms when no data frame
needs to be transmitted.
T3 T1
Clock pulses
T2
Data 1 1 0 1 …
Encoding D D D D
0 1 2 3 …
FLP bursts
NLPs
T4: 2 ms T5: 16 ms
The half-duplex Ethernet port applies the back-pressure mechanism to control the flow. The full-
duplex Ethernet port applies PAUSE frames to control the flow. Currently, the half-duplex
Ethernet function is not widely applied. Hence, the flow control function realized by Ethernet
service boards is used for the full-duplex Ethernet ports.
The flow control function realized by Ethernet service boards is classified into two types: auto-
negotiation flow control and non-auto-negotiation flow control.
Realization Principle
The realization principle of the flow control function is described as follows:
1. When congestion occurs in the receive queue of an Ethernet port (the data in the receive
buffer exceeding a certain threshold) and the port is capable of sending PAUSE frames,
the port sends a PAUSE frame to the opposite end. pause-time value in the frame is N
(0<N≤65535).
2. If the Ethernet port at the opposite end is capable of processing PAUSE frames, this Ethernet
port stops sending data within a specified period of time N (the unit is the time needed for
sending 521 bits) after receiving the PAUSE frame.
3. If the congestion at the receive port is cleared (the data in the receive buffer is below a
certain threshold) but the pause-time does not end, the port sends a PAUSE frame whose
pause-time is 0 to notify the opposite end to send data.
Reserved
HDLC
The HDLC is a general data link control procedure. When using the HDLC protocol, the system
encapsulates data services into HDLC-like frames as information bits and maps the frames into
SDH VC containers.
LAPS
The LAPS is also a data link control procedure. It is optimized based on the HDLC. The LAPS
complies with ITU-T X.86.
GFP
The GFP is the most widely applied general encapsulation and mapping protocol. It provides a
general mechanism to adapt higher-layer client signal flows into the transport network and can
map the variable-length payload into the byte-synchronized transport path. The client signals
can be protocol data units (PDU-oriented, such as IP/PPP and Ethernet), block code data (block-
code oriented, such as Fiber Channel and ESCON), or common bit data streams. The GFP
protocol complies with ITU-T G.7041.
The GFP defines the following modes to adapt client signals:
l Frame-mapped GFP (GFP-F)
The GFP-F is a PDU-oriented processing mode. It encapsulates the entire PDU into the
GFP payload area and makes no modification on the encapsulated data. It determines
whether to add a detection area for the payload area, depending on requirements.
l Transparent GFP (GFG-T)
The GFP-T is a block-code (8B/10B code block) oriented processing mode. It extracts a
single character from the received data block and maps the character into the fixed-length
GFP frame.
Virtual concatenation is available in two types: virtual concatenation in a higher order path and
virtual concatenation in a lower order path. A higher order virtual concatenation VC4-Xv
provides a payload of X Container-4s (VC-4s). The payload is mapped individually into X
independent VC-4s. Each VC-4 has its own POH. A lower order virtual concatenation VC-12-
Xv provides a payload of X Container-12s (VC-12s). The payload is mapped individually into
X independent VC-12s. Each VC-12 has its own POH. It is the same case with the virtual
concatenation of VC-3s.
H
1 X SQ = 0 =0
POH
MFI-1 = 0 =0
MFI-2 = 0 X-1
SQ = 0 =1
POH
MFI-1 = 1 =0
MFI-2 = 0
Multiframe (MF)
SQ = X-1
H
SQ = 0 = 15
POH
MFI-1 = 15 = 0
MFI-2 = 0 X-1
SQ = 0 =0
POH MFI-1 = 0 = 15
MFI-2 = 1
H SQ = X-1
SQ = 0 = 15
POH
MFI-1 = 15 = 255
MFI-2 = 255 X-1
SQ = 0 =0
POH
MFI-1 = 0 =0
MFI-2 = 0
With the MFI and SQ, the sink end can correctly restore the position of each frame in the C-n-
Xv to prevent the frame alignment problem due to the different propagation delays of the frames.
VC-12-Xv
The virtual container that is formed by a VC-12-Xv can be mapped into X individual VC-12s
which form the VC-12-Xv. Each VC-12 has its own POH. POH has the same specifications as
the ordinary VC-12 POH. Bit 2 of the K4 byte in the POH is used for the virtual concatenation-
specific frame count and sequence indicator.
Bit2s of the K4 bytes in every 32 multiframes (one multiframe comprising four VC-12s) are
extracted to form a 32-bit character string to express the frame count and sequence indicator.
Bits 1-5 of the string express the frame count, whose value range is between 0 and 31. structure
formed by 32 multiframes has 128 frames. Hence, the resulting overall multiframe is 4096 frames
with the period of 512 ms. Bits 6-11 of the string express the sequence indicator. The frame
count/sequence indicator in the VC-12-Xv has the same usage as the multiframe indicator/
sequence indicator in the VC4-Xv/VC-3-Xv.
The tags for the port on an Ethernet board are available in three types: tag aware, access, and
hybrid.
Table 4-5 Processing mode of data frames on ports with different tags
Ingress port Data frames with The data frames are The data frames are The data frames are
VLAN tags transparently discarded. transparently
transmitted. transmitted.
Data frames without The data frames are The VLAN tags that contain Default VLAN
VLAN tags discarded. ID and VLAN Priority are added to the data
frames, and then the data frames are
transparently transmitted.
Egress port Data frames with The data frames are After the VLAN l If the VLAN IDs
VLAN tags transparently tags are stripped contained in the
transmitted. from the data data frames are
frames, the data Default VLAN
frames are ID, the VLAN
transparently tags are stripped
transmitted. from the data
frames, and then
the data frames
are transparently
transmitted.
l If the VLAN IDs
contained in the
data frames are
not Default
VLAN ID, the
data frames are
transparently
transmitted.
NOTE
The tag setting is valid only when the following conditions are met:
l Port Type of the port is set to PE or UNI.
l The entry detection function is enabled. When the Ethernet switching board works in the Ethernet
transparent transmission state and when the entry detection function is disabled, the port transparently
transmits the received data frames regardless of whether the data frames carry VLAN tags.
Based on the features of tag aware, access, and hybrid, adhere to the following principles when
setting the tag for a port:
l If the data packets transmitted from the interconnected equipment carry VLAN tags, set
TAG to Tag Aware.
l If the data packets transmitted from the interconnected equipment do not carry VLAN tags,
set TAG to Access.
l If the data packets transmitted from the interconnected equipment may carry VLAN tags,
set TAG to Hybrid.
4.2.8 Bridge
A bridge is a functional unit that is used to implement the interconnection between two or more
LANs.
VB and LP
The switching domain of an Ethernet board that has the Layer 2 switching capability can be
divided into multiple sub-switching domains. As a result, if no services are interconnected,
different various bridges (VBs) cannot access each other. Each VB has an independent
configuration mode and uses an independent VLAN. Different VBs can use the same VLAN.
A VB can contain a number of logical ports (LPs). By configuring the mounting relation, you
can mount multiple PORTs and VCTRUNKs to the same VB.
Figure 4-16 shows the relations between VBs, LPs, PORTs, and VCTRUNKs.
VB1
VB2
l The services of different virtual bridges are isolated and the services with different VLAN
IDs in the same virtual bridge are also isolated. The switching domain of the entire virtual
bridge is divided into multiple sub-switching domains according to the VLAN IDs.
NOTE
As shown in Figure 4-17, the same logical port may belong to one or more sub-switching domains with
different VLAN IDs. On the U2000, the same logical port can belong to multiple filtering tables with
different VLAN IDs.
VCTRUNK1 VCTRUNK1
PORT1 PORT1 VLAN1
VCTRUNK2 VCTRUNK2
VLAN1
VCTRUNK3 VLAN2 VCTRUNK3
PORT2 VLAN2 PORT2
VCTRUNK4 VCTRUNK4
VLAN3
... VCTRUNK5 VCTRUNK5
PORT3 VCTRUNK6 PORT3 VLAN3
VCTRUNK6
Pure bridge Virtual bridge
Logical port
Ingress filter Does not check the validity of Check the validity of VLAN
VLAN tags. All data frames tags. If the VLAN ID is not
that enter the bridge are valid. the same as the VLAN ID
defined in the VLAN
filtering table, discard the
data frame.
Data frame forwarding mode Query the MAC address table Query the MAC address table
to obtain the forwarding port to obtain the forwarding port
of the data frame according to of the data frame according to
the destination MAC address the destination MAC address
of the data frame. and VLAN ID of the data
frame.
NOTE
To forward a Layer 2 switching service, a bridge must learn the MAC address. A bridge learns the MAC
address through one of the following methods: shared VLAN learning (SVL) and independent VLAN
learning (IVL).
l When the bridge adopts the SVL learning mode, the entry in the MAC address table is created according
to the source MAC address and source port of the data frame. The entry is valid for all VLANs.
l When the bridge adopts the IVL learning mode, the entry in the MAC address table is created according
to the source MAC address, VLAN ID, and source port of the data frame. The entry is valid for only
the VLAN.
Bridge Type
As listed in Table 4-7, the Ethernet boards support three types of bridges.
l IEEE 802.1d MAC bridge: The IEEE 802.1d MAC bridge does not check the contents of
the VLAN tags that are in the data frames, but performs Layer 2 switching according to
the destination MAC addresses of the data frames.
l IEEE 802.1q bridge: The IEEE 802.1q bridge supports data isolation by using one layer of
VLAN tags. This bridge checks the contents of the VLAN tags that are in the data frames
and performs Layer 2 switching according to the destination MAC addresses and VLAN
IDs.
l The IEEE 802.1ad bridge: The IEEE 802.1ad bridge supports data frames with two layers
of VLAN tags. This bridge adopts the outer S-VLAN tags to isolate different VLANs and
supports only the mounted ports whose attributes are C-Aware or S-Aware. This bridge
supports the following switching modes:
1. This bridge does not check the contents of the VLAN tags that are in the data frames,
but performs Layer 2 switching according to the destination MAC addresses of the
data frames.
2. This bridge checks the contents of the VLAN tags that are in the data frames and
performs Layer 2 switching according to the destination MAC addresses and the S-
VLAN IDs of the data frames.
l If a routing entry is not updated within a specific period of time, that is, if the MAC address fails to be learnt
because the new data frame from the MAC address is not received, this routing entry is deleted automatically.
This mechanism is considered as aging, and this period of time is considered as the aging time. The aging
time of the MAC address table is five minutes by default and can be set by using the U2000.
l A limited number of MAC addresses can be learnt at a time.
Hub/Spoke
Generally, the central station and non-central stations can access each other, but the non-central
stations cannot access each other in the case of convergence services. Therefore, the ports
mounted to the bridge need to be defined as Hub or Spoke ports.
l Hub port
Hub ports can access each other. Hub ports and Spoke ports can also access each other.
l Spoke port
Spoke ports cannot access each other. Hub ports and Spoke ports can access each other.
The mounted ports are Hub ports by default.
services of different users need to be configured with different quality levels, you need to adopt
the corresponding QoS scheme.
4.3.3 Flow of Configuring EPLAN Services
EPLAN services provide the customers with Layer 2 switching-based multipoint-connected
LAN services.
4.3.4 Flow of Configuring EVPLAN Services
EVPLAN services of different users need to share the bandwidth. Hence, the VLAN ID or other
schemes need to be used for differentiating the services of different users. If the services of
different users need to be configured with different quality levels, you need to adopt the
corresponding QoS scheme.
Required Start
Optional
Ethernet transparent Ethernet switching
transmission board board
1 1
Configure Ethernet Configure Ethernet
external ports external ports
2 2
Configure Ethernet Configure Ethernet
internal ports internal ports
3
Create EPL services
4
Create cross-
connections
5
Check service
continuity
6 Enable NE
performance
monitoring
7
Back up NE
configuration data
End
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create EPL services
4
Create cross-
connections
5
Configure the QoS
6
Check service
continuity
7 Enable NE
performance
monitoring
8
Back up NE
configuration data
End
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create Ethernet LAN
services
4 Modify Hub/Spoke
attribute of mounted
ports
5
Create cross-
connections
6
Configure the Layer
2 switching feature
7
Check service
continuity
8 Enable NE
performance
monitoring
9
Back up NE
configuration data
End
Required Start
Optional 1
Configure Ethernet
external ports
2
Configure Ethernet
internal ports
3
Create Ethernet
LAN services
4
Create the VLAN
filtering table
6
Create cross-
connections
7
Configure the Layer
2 switching feature
8
Configure the QoS
9
Check service
continuity
10 Enable NE
performance
monitoring
11
Back up NE
configuration data
End
The completely isolated data services of two users at a station must be transported to another
station.
4.4.2 Signal Flow and Timeslot Allocation
Ethernet services are received from an external port, encapsulated through an internal port, and
mapped to the SDH network for transparent transmission. In this way, the node communicates
with a remote node.
4.4.3 Configuration Process
The Ethernet transparent transmission boards support only EPL services. The EPL are already
created by default and hence you need not configure the Ethernet transparent transmission boards
on the U2000.
Service Requirement
In the network as shown in Figure 4-22, the service requirements are as follows:
l The two branches of user A that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 10 Mbit/s bandwidth is required.
l The two branches of user B that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 20 Mbit/s bandwidth is required.
l The services of user A must be isolated from the services of user B.
l The Ethernet equipment of user A and user B provides 100 Mbit/s Ethernet ports of which
the working mode is auto-negotiation, and does not support VLANs.
5-SL4D-2 NE3
5
5-SL4D-1
NE2 NE4
5-SL4D-2
NE2:
Line board Line board
5-SL4D-2
5-SL4D-1 NE1
5-SL4D-1
NE1:
Ethernet board Ethernet board Line board
PORT1 PORT1 3-EGT1 4-EGT1 5-SL4D-2
VCTRUNK
User A1 User B1
Figure 4-23 shows the signal flow and timeslot allocation of the EPL services.
For the method of calculating the bandwidth of the Ethernet services carried by a VCTRUNK,
see 6.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards.
Figure 4-23 Signal flow and timeslot allocation (Ethernet transparent transmission board)
NOTE
The EGT1 board supports transparent transmission of Ethernet services, the link capacity adjustment
scheme (LCAS), test frames, and other functions.
SDH
Prerequisite
You must be familiar with 4.3.1 Flow of Configuring EPL Services.
Background Information
By default, EPL service connections from external ports to internal ports are already created for
Ethernet transparent transmission boards. The EPL service connections can be queried on the
U2000, but cannot be created, modified, or deleted on the U2000.
If the Ethernet transparent transmission boards in the actual application scenarios are different
from the boards in this example, you need to learn about the requirements for configuring specific
boards.
l For the EPL services supported by Ethernet transparent transmission boards, see 6.1
Service Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet transparent transmission boards, see
6.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPL services of user A1 and user B1 on NE1.
1. Set the attributes of the external ports (PORT1 of 3-EGT1 board and PORT1 of the 4-EGT1
board) used by the services of user A1 and user B1.
l In the NE Explorer, select the EGT1 and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
2. Set the attributes of the internal ports (VCTRUNK1 of 3-EGT1 board and VCTRUNK1 of
the 4-EGT1 board) used by the services of user A1 and user B1.
l Select Internal Port.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
Mappin VCTRUNK1: GFP In this example, the EFS8 board is used. This
g parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Then, click
Apply.
User Parameter Value in Description
This
Example
3. Configure the cross-connections from the Ethernet services to the SDH links for user A1
and user B1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
User A1 Level VC12 The timeslot bound with the service of user
A1 is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User B1 Level VC12 The timeslot bound with the service of user
B1 is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. In the NE Explorer, select NE2 and then choose Configuration > SDH Service
Configuration from the Function Tree.
3. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters as follows.
Parameter Value in Description
This
Example
Level VC12 The SDH service of NE1, which passes through NE2, is
at the VC-12 level.
Service Bidirectional As shown in Figure 4-23, the SDH service from NE1 to
Direction NE2 is a bidirectional service.
Source Slot 5-SL4D-1 As shown in Figure 4-23, the service signals are
(SDH-1) transmitted from 5-SL4D-1(SDH-1) to 5-SL4D-2
(SDH-2). In this example, Source Slot is set to 5-SL4D-1
(SDH-1).
Source 1-15 The service between user A1 and user B1 uses timeslots
Timeslot 1-15.
Range(e.g.
1,3-6)
Sink Slot 5-SL4D-2 As shown in Figure 4-23, the service signals are
(SDH-2) transmitted from 5-SL4D-2(SDH-2) to 5-SL4D-1
(SDH-1). In this example, Sink Slot is set to 5-SL4D-2
(SDH-2).
Sink VC4 VC4-1 It is recommended that you set Sink Slot to be the same
as Source Slot.
Sink 1-15 The service between user A1 and user B1 uses timeslots
Timeslot 1-15.
Range(e.g.
1,3-6)
Activate Yes -
Immediatel
y
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 5.4.3 Deleting Ethernet
Private Line Services.
Ethernet services are received from an external port, encapsulated through an internal port, and
mapped to the SDH network for transparent transmission. In this way, the node communicates
with a remote node.
4.5.3 Configuration Process
This topic describes the process of configuring Ethernet private line services for Ethernet
switching boards.
4.5.4 Configuration Process (End-to-End Mode)
During the configuration of EPL services on Ethernet switching boards, you need to configure
Ethernet private line services. This topic describes the process of configuring EPL services for
Ethernet switching boards in end-to-end mode.
Service Requirement
In the network as shown in Figure 4-24, the service requirements are as follows:
l The two branches of user A that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 10 Mbit/s bandwidth is required.
l The two branches of user B that are located at NE1 and NE3 need to communicate with
each other over Ethernet. A 20 Mbit/s bandwidth is required.
l The services of user A must be isolated from the services of user B.
l The Ethernet equipment of user A and user B provides 100 Mbit/s Ethernet ports of which
the working mode is auto-negotiation, and does not support VLANs.
PORT1 PORT2
NE3:
6-SL4D-2 NE3
6-SL4D-1
NE2 NE4
6-SL4D-2
NE2:
Line board Line board 6-SL4D-1 NE1
6-SL4D-1 6-SL4D-2
NE1:
Ethernet board Line board
PORT1 PORT2 4-EFS8 6-SL4D-2
VCTRUNK
User A1 User B1
Figure 4-25 Signal flow and timeslot allocation (Ethernet switching board)
NE1:EFS8 NE2 NE3 :EFS8
PORT1 PORT1
VCTRUNK1 VCTRUNK1
User A1 User A2
VC4-4:VC12:1-5 VC4-1:VC12:1-5 VC4-4:VC12:1-5
PORT2
VCTRUNK2 VCTRUNK2 PORT2
User B1 User B2
VC4-4:VC12:6-15 VC4-4:VC12:6-15
VC4-1:VC12:6-15
SDH
Board EFS8
Prerequisite
You must be familiar with 4.3.1 Flow of Configuring EPL Services.
Background Information
If the Ethernet switching boards in the actual application scenarios are different from the boards
in this example, you need to learn about the requirements for configuring specific boards.
l For the EPL services supported by Ethernet switching boards, see 6.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPL services for users A1 and B1 on NE1.
1. Set the attributes of the external ports (PORT1 and PORT2 on the EFS8 board) used by the
services of users A1 and B1.
l In the NE Explorer, select the EFS8 and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
Entry PORT1: Disabled The services of user A1 and user B1 are EPL
Detectio PORT2: Disabled transparent transmission services. Hence,
n you need not enable the entry detection
function to check the VLAN tags of the
packets. In this example, Entry Detection
need to be set to Disabled. When Entry
Detection is set to Disabled, the parameters
of TAG, Default VLAN ID, and VLAN
Priority are invalid.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EFS8 board)
used by the services of user A1 and user B1.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Entry VCTRUNK1: Disabled The services of user A1 and user B1 are EPL
Detectio VCTRUNK2: Disabled transparent transmission services. Hence,
n you need not enable the entry detection
function to check the VLAN tags of the
packets. In this example, Entry Detection
need to be set to Disabled. When Entry
Detection is set to Disabled, the parameters
of TAG, Default VLAN ID, and VLAN
Priority are invalid.
l Click the Network Attributes tab. After setting the parameters, click Apply.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
Mappin VCTRUNK1: GFP In this example, the EFS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l Click the Bound Path tab. Click the Configuration button. Set the following in the
Bound Path Configuration dialog box that is displayed. Then, click Apply.
User Paramete Value in Description
r This
Example
3. Configure the Ethernet private line services for user A1 and user B1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
l Click New on the lower-right pane to display the Create Ethernet Line Service dialog
box. Set the following parameters, and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
Source C- Blank In this example, the EPL service does not carry
VLAN (e.g. the VLAN tag.
1, 3-6)
Sink C- Blank In this example, the EPL service does not carry
VLAN (e.g. the VLAN tag.
1, 3-6)
Source C- Blank In this example, the EPL service does not carry
VLAN (e.g. the VLAN tag.
1, 3-6)
Sink C- Blank In this example, the EPL service does not carry
VLAN (e.g. the VLAN tag.
1, 3-6)
4. Configure the cross-connections from the Ethernet services to the SDH links for user A1
and user B1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
User Paramete Value in Description
r This
Example
User A1 Level VC12 The timeslot bound with the service of user
A1 is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User B1 Level VC12 The timeslot bound with the service of user
B1 is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
1. Click . Select NE2 in the Navigation Tree that is displayed. Then, click OK.
2. In the NE Explorer, select NE2, and then choose Configuration > SDH Service
Configuration from the Function Tree.
3. Click Create on the lower-right pane to display the Create SDH Service dialog box. Set
the parameters as follows.
Parameter Value in Description
This
Example
Level VC12 The SDH service of NE1, which passes through NE2, is
at the VC-12 level.
Service Bidirectional As shown in Figure 4-25, the SDH service from NE1 to
Direction NE2 is a bidirectional service.
Source Slot 6-SL4D-1 As shown in Figure 4-25, the service signals are
(SDH-1) transmitted from 6-SL4D-1(SDH-1) to 6-SL4D-2
(SDH-2). In this example, Source Slot is set to 6-SL4D-1
(SDH-1).
Source 1-15 The service between user A1 and user B1 uses timeslots
Timeslot 1-15.
Range(e.g.
1,3-6)
Sink Slot 6-SL4D-2 As shown in Figure 4-25, the service signals are
(SDH-2) transmitted from 6-SL4D-1(SDH-1) to 6-SL4D-2
(SDH-2). In this example, Sink Slot is set to 6-SL4D-2
(SDH-2).
Sink VC4 VC4-1 It is recommended that you set Sink Slot to be the same
as Source Slot.
Sink 1-15 The service between user A1 and user B1 uses timeslots
Timeslot 1-15.
Range(e.g.
1,3-6)
Activate Yes -
Immediatel
y
Refer to Step 1 and configure the EPL services for users A2 and B2. The parameter values of
user A2 and user B2 must be consistent with the parameter values of user A1 and user B1.
Step 4 Check whether the service between user A1 and user A2 and the service between user B1 and
user B2 are correct. For the operation procedure, see Testing Ethernet Service Channels.
Step 5 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 6 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 5.4.3 Deleting Ethernet
Private Line Services.
Prerequisite
You must understand the information provided in 4.5.2 Signal Flow and Timeslot
Allocation.
Background Information
If in the actual application you use an Ethernet switching board different from the one described
in this example, learn about the requirements for configuring that specific as follows:
l For the EPL services supported by Ethernet switching boards, see 6.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of the Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPL services between user A1 and user A2 in end-to-end mode.
1. Create a VC-4 server trail.
l Choose Service > SDH Trail > Create SDH Trail from the Main Menu and set
parameters for the VC-4 server trail.
Table 4-17 Parameters of the VC-4 server trail between user A1 and user A2
Direction Bidirectional
l Double-click NE1 (source) and NE3 (sink) on the main topology to configure the source
and sink of the VC-4 server trail.
l In the Trail Settings tab, configure Explicit Node and Set Route Timeslot.
Table 4-18 Parameters of the VC-4 server trail route between user A1 and user A2
l Click Apply. The Operation Result dialog box is displayed indicating that the
operation is successful. Click Close or Browse Trail to query the created VC-4 server
trail.
2. Create a trunk link.
l Choose Service > MSTP Trail > Create Trunk Link from the Main Menu.
l Set Bandwidth to 5 X: VC12. Select Auto Create Server Trails.
NOTE
If you do not select Auto Create Server Trails, refer to Step 1.1 to create cross-connections of
Ethernet services between NE1 and NE3 to SDH links. Set Level to VC12. Set Server Layer
Trail to the created link when creating trunk links.
l Configure bound timeslots for the source NE. Click Browse. In the dialog box that is
displayed, select NE1 and set NE Panel to EFS8, VCTRUNK Port to 1, and Lower
Order to VC4:4-VC12:1 to VC4:4-VC12:5. Click OK.
l Configure bound timeslots for the sink NE. Click Browse and select NE3. Set NE
Panel to EFS8, VCTRUNK Port to 1, and Lower Order to VC4:4-VC12:1 to VC4:4-
VC12:5. Click OK.
l Select Activate the trail and click Apply.
3. Create EPL services.
l Choose Service > MSTP Trail > Create EPL from the Main Menu.
l Double-click NE1 (source) and NE3 (sink) on the main topology to configure the source
and sink of the EPL services.
Table 4-19 Parameters of the EPL services between user A1 and user A2
Parameter Value in This Example
Port NE1-4-EFS8-PORT1
Port NE3-4-EFS8-PORT1
l Set trunk link routing policies using the existing trunk link. Select the trunk link created
in step 1 b. Click Next.
NOTE
l To create EPL services in end-to-end mode, complete the following recommended steps: first
create a server trail, then create a trunk link, and finally create EPL services. When creating
EPL services, select Use Existing Trunk Link.
l Alternatively, create the trunk link when creating the EPL services. In this case, select Create
Trunk Link Manually or Create Trunk Link Automatically.
l In the Port Attribute Setting dialog box, set port attributes.
Step 2 Repeat Step 1.2 to Step 1.3 configure EPL services between user B1 and user B2 according to
service planning.
Step 3 Check whether the services between user A1 and user A2 and the services between user B1 and
user B2 are proper. For details, see Testing Ethernet Service Channels.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Related Task
If the services are configured incorrectly, see 5.4.3 Deleting Ethernet Private Line Services
for the deletion method.
differentiated. Ethernet transparent transmission boards are required for creating EPL
transparent transmission services on NE2 and NE4.
Service Requirement
In the network as shown in Figure 4-26, the service requirements are as follows:
l The headquarters C1 of user C is located at NE1. Two branches (C2 and C3) of user C are
located at NE2 and NE4. The services between C1 and C2 are transmitted in the VLAN of
which the VLAN ID is 100. The services between C1 and C3 are transmitted in the VLAN
of which the VLAN ID is 200.
l The services of C2 are isolated from the services of C3. The services of C2 and C3 require
a 20 Mbit/s bandwidth respectively.
l The Ethernet equipment of C1, C2, and C3 provides 100 Mbit/s Ethernet electrical
interfaces that work in auto-negotiation mode. The Ethernet equipment of C1 supports
VLANs, but the Ethernet equipment of C2 and C3 does not support VLANs.
– The VLAN ID used by the Ethernet services between C1 and C2 is 100.
– The VLAN ID used by the Ethernet services between C1 and C3 is 200.
Figure 4-26 Networking diagram for configuring PORT-shared EVPL (VLAN) services
NM
NE2: NE4:
Ethernet board Line board Line board Ethernet board
NE3
4-EGT1 6-SL4D-2 6-SL4D-1 4-EGT1
NE2 NE4
PORT1 PORT1
User C3
User C2 6-SL4D-2 6-SL4D-1
NE1
6-SL4D-1 6-SL4D-2
VLAN 100
PORT1 NE1:
VCTRUNK
VLAN 200
Ethernet board Line board Line board
4-EFS8 6-SL4D-1 6-SL4D-2
User C1
board. The EPL services are configured to implement service transparent transmission from NE2
and NE4 to NE1.
In this example, NE1 is configured with an EFS8 board. NE2 and NE4 are each configured with
an EGT1 board.
SDH
VLAN Priority 0 0 - -
EVPL1 EVPL2
(PORT1←→ (PORT1←→VCTRUNK2)
VCTRUNK1)
Board EFS8
Parameter NE1
EVPL1 EVPL2
(PORT1←→ (PORT1←→VCTRUNK2)
VCTRUNK1)
Prerequisite
You must be familiar with 4.3.2 Flow of Configuring EVPL Services.
Background Information
If the Ethernet boards in the actual application scenarios are different from the boards in this
example, you need to learn about the requirements for configuring specific boards.
l For the EVPL services supported by Ethernet switching boards, see 6.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPL services for user C1 on NE1.
1. Set the attributes of the external port (PORT1 of the EFS8 board) used by the service of
user C1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
TAG PORT1: Tag Aware When the port is set to Tag Aware, all data
frames transmitted and received at the port
must have VLAN tags. In this example,
TAG is set to Tag Aware.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EFS8 board)
used by the services between user C1 and user C2 and between user C1 and user C3.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Network Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Then, click
Apply.
User Paramete Value in Description
r This
Example
3. Configure the Ethernet private line services between user C1 and user C2 and between user
C1 and user C3.
l In the NE Explorer, select the EFS8 board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
l Click New on the lower-right pane to display the Create Ethernet Line Service
window. Set the following parameters and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Parameter Value in Description
This
Example
4. Configure the cross-connections from the Ethernet service between user C1 and user C2
to the SDH link and the Ethernet service between user C1 and user C3 to the SDH link.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
NOTE
The Ethernet services of NE2 and NE4 are point-to-point transparent transmission services. See 4.4
Configuring EPL Services on an Ethernet Transparent Transmission Board to set the parameters.
Step 3 Check whether the services are configured correctly. For the operation procedures, see Testing
Ethernet Service Channels.
l Before testing the service connectivity between headquarters C1 and branch C2, set TAG of
PORT1 on the EFS8 board to Access and Default VLAN ID to 100.
l Before testing the service connectivity between headquarters C1 and branch C3, set TAG of
PORT1 on the EFS8 board to Access and Default VLAN ID to 200.
NOTE
After the test, change the modified parameter values to the values specified in the service configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 5.4.3 Deleting Ethernet
Private Line Services.
Service Requirement
In the network as shown in Figure 4-28, the service requirements are as follows:
l Two branches of user D are located at NE1 and NE2, and need to communicate with each
other.
l Two branches of user E are located at NE1 and NE2, and need to communicate with each
other.
l The services of user D need to be isolated from the services of user E. The traffic of user
D and user E, however, are complementary in terms of time and can share a 20 Mbit/s
bandwidth.
l The Ethernet equipment of user D and user E provides 100 Mbit/s Ethernet ports of which
the working mode is auto-negotiation, and does not support VLAN tags.
Figure 4-28 Networking diagram for configuring VCTRUNK-shared EVPL (VLAN) services
NM
NE2:
Ethernet Board Line Board NE3
4-EFS8 6-SL4D
PORT1
NE2 NE4
User D2 PORT2 6
NE1
6
PORT1 PORT2 User E1
User E2
NE1:
Ethernet Board Line Board
VCTRUNK 4-EFS8 6-SL4D
User D1
In this example, NE1 and NE2 each are configured with an EFS8 board. Different VLAN IDs
are used to isolate the data of different users transmitted on the same VCTRUNK.
l When the data of user D arrives at the transmission network, the VLAN ID of 100 is added
to the data. When the data leaves the transmission network, the VLAN tag is stripped.
l When the data of user E arrives at the transmission network, the VLAN ID of 200 is added
to the data. When the data leaves the transmission network, the VLAN tag is stripped.
Figure 4-29 shows the signal flow of the VCTRUNK-shared EVPL (VLAN) services and the
timeslot allocation to the VCTRUNK-shared EVPL (VLAN) services.
For the method of calculating the bandwidth of the Ethernet services carried by a VCTRUNK,
see 6.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards.
NE1:EFS8 NE2:EFS8
PORT1 PORT1
User D1 EVPL1 EVPL1 User D2
VCTRUNK1 VCTRUNK1
PORT2 VC4-4:VC12:1-10 VC4-4:VC12:1-10 PORT2
VC4-1:VC12:1-10
User E1 EVPL2 EVPL2 User E2
SDH
l The EVPL services of user D and user E that share VCTRUNK1 occupy the first to tenth
VC-12 timeslots of the first VC-4 (VC4-1:VC12:1-10) on the SDH link from NE1 to NE2.
l The services are added and dropped by using the first to tenth VC-12 timeslots of the fourth
VC-4 (VC4-1:VC12:1-10) on the EFS8 board of NE1 and the first to tenth VC-12 timeslots
of the fourth VC-4 (VC4-1:VC12:1-10) on the EFS8 board of NE2.
VLAN Priority 0 0 0 0
are added with different VLAN tags. As a result, the packets are isolated when they are
transmitted on the same VCTRUNK.
Prerequisite
You must be familiar with 4.3.2 Flow of Configuring EVPL Services.
Background Information
If the Ethernet boards in the actual application scenarios are different from the boards in this
example, you need to learn about the requirements for configuring specific boards.
l The Ethernet switching boards that support EVPL services are provided in 6.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPL services for users D1 and E1 on NE1.
1. Set the attributes of the external ports (PORT1 and PORT2 of the EFS8 board) used by the
service of user D1 and user E1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal port (VCTRUNK1 on the EFS8 board) used by the services
between user D1 and user D2 and between E1 and user E2.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
TAG VCTRUNK1: Tag Aware When the port is set to Tag Aware, all data
frames transmitted and received at the port
must have VLAN tags. In this example,
TAG is set to Tag Aware.
l Click the Network Attributes tab. After setting the parameters, click Apply.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Then, click
Apply.
User Parameter Value Description
in This
Examp
le
3. Configure the Ethernet private line services between user D1 and user D2 and between user
E1 and user E2.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
l Click New on the lower-right pane to display the Create Ethernet Line Service
window. Set the following parameters and then click OK. The Operation Result dialog
box is displayed, indicating that the operation is successful. Click Close.
User Parameter Value in Description
This
Example
4. Configure the cross-connections from the Ethernet services to the SDH links for user D1
and user E1.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
User Paramete Value in Description
r This
Example
Activate Yes -
Immediatel
y
Step 3 Check whether the services are configured correctly. For the operation procedures, see Testing
Ethernet Service Channels.
l Test the service connectivity between user D1 and user D2.
l Test the service connectivity between user E1 and user E2.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 5.4.3 Deleting Ethernet
Private Line Services.
Service Requirement
In the network as shown in Figure 4-30, the service requirements are as follows:
l Three branches (F1, F2, and F3) of user F are located at NE1, NE2, and NE4. F1 needs to
communicate with F2 and F3, and requires a 10 Mbit/s bandwidth for communication with
each branch.
l The Ethernet equipment of user F provides 100 Mbit/s Ethernet electrical interfaces that
work in auto-negotiation mode and support VLANs. The VLAN IDs and the number of
VLANs, however, are unknown and may change.
NOTE
The application scenarios where one branch needs to communicate with other branches are as follows:
l Branches F2 and F3 need to communicate with each other.
l Branches F2 and F3 need not communicate with each other.
If branches F2 and F3 need to communicate with each other, skip Step 1.4 in which you change the Hub/
Spoke attributes of ports connected to the bridge.
Figure 4-30 Networking diagram for configuring EPLAN services (IEEE 802.1d bridge)
NE3
NM NE4:
NE2:
Ethernet board Line board Line board Ethernet board
PORT1
NE2 NE4
NE1 PORT1
6-SL4D-2 6-SL4D-1
F2
6-SL4D-1 6-SL4D-2 F3
PORT1 NE1:
VB
Ethernet board Line board Line board
VCTRUNK1 VCTRUNK2
4-EFS8 6-SL4D-1 6-SL4D-2
PORT1
F1 VCTRUNK
VCTRUNK1 PORT1
NE1:EFS8 User F2
VC4-4:VC12:1-5
5
: 1-
12
VC
VCTRUNK1 4 -1 :
PORT1 VC
VC4-4:VC12:1-5
User F1
VCTRUNK2
VC4
VC4-4:VC12:6-10 -1:V NE4:EGT1
C12
:1 -5
VB1
VCTRUNK1 PORT1
User F3
VC4-4:VC12:1-5
SDH
l The Ethernet LAN service of user F occupies the first to fifth VC-12 timeslots of the first
VC-4 (VC4-1:VC12:1-5) on the SDH link from NE1 to NE2 and the first to fifth VC-12
timeslots of the first VC-4 (VC4-1:VC12:1-5) on the SDH link from NE1 to NE4.
l The Ethernet LAN service from NE1 to NE2 is added and dropped by using the first to fifth
VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:1-5) on the EFS8 board of NE1 and the
first to fifth VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:1-5) on the EGT1 board of
NE2.
l The Ethernet LAN service from NE1 to NE4 is added and dropped by using the sixth to
tenth VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:6-10) on the EFS8 board of NE1
and the first to fifth VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:1-5) on the EGT1
board of NE4.
Board EFS8
VB Name VB1
VCTRUNK1 Spoke
VCTRUNK2 Spoke
Prerequisite
You must be familiar with 4.3.3 Flow of Configuring EPLAN Services.
Background Information
If the Ethernet boards in the actual application scenarios are different from the boards in this
example, you need to learn about the requirements for configuring specific boards.
l For the EPLAN services supported by Ethernet switching boards, see 6.1 Service Support
Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EPLAN services for users F1, F2, and F3 on NE1.
1. Set the attributes of the external port (PORT1 of the EFS8 board) used by the service of
user F1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 of the EFS8 board)
used by the services of user F2 and user F3 on NE1.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
TAG VCTRUNK1: Tag Aware The service access equipment of user F2 and
VCTRUNK2: Tag Aware user F3 supports VLANs and the transmitted
data frames carry VLAN tags. In this
example, Tag is set to Tag Aware for
VCTRUNK1 and VCTRUNK2.
l Click the Network Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
Mappin VCTRUNK1: GFP In this example, the EFS4 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following
parameters in the Bound Path Configuration dialog box that is displayed. Then, click
Apply.
User Paramete Value in Description
r This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EFS8 board on NE1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the parameters in the Create Ethernet LAN Service dialog box that is displayed.
Parameter Value in Description
This
Example
VB Type 802.1d The IEEE 802.1d MAC bridge learns and forwards
the packets according to the MAC addresses of the
user packets. The information in the VLAN tags of
the user packets, however, is not considered in the
learning and forwarding process. The IEEE 802.1d
MAC bridge is used when the entire information of
the VLANs used by the client cannot be learned or
when the data between the VLANs of the client need
not be isolated.
Bridge SVL/Ingress When the bridge adopts the SVL learning mode, all
Switch Mode Filter the VLANs share the same MAC address table. That
Disable is, the bridge learns and forwards the packets
according to the MAC addresses of the user packets
only. The information in the VLAN tags of the user
packets, however, is not considered in the learning
and forwarding process.
Bridge SVL -
Learning
Mode
Ingress Filter Disabled The IEEE 802.1d MAC bridge does not detect the
VLAN tags of the received packets.
If normal communication is required between user F2 and user F3, go to Step 1.5.
l Select the created bridge and click the Service Mount tab.
l Change the Hub/Spoke attribute of the port that is mounted to the bridge. After setting
the parameters, click Apply.
Parameter Value in Description
This
Example
5. Configure the cross-connections from Ethernet services (between user F1 to user F2 and
between user F1 to user F3) to the SDH links.
l In the NE Explorer, select NE1 and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
Step 3 Check whether the services are configured correctly. For the operation procedures, see Testing
Ethernet Service Channels.
l Before testing the service connectivity between F1 and F2, set TAG to Access and set Default
VLAN ID to 1 for PORT1 and VCTRUNK1, which receive the services of F1 and F2
respectively, on the EFS8 board.
l Before testing the service connectivity between F1 and F3, set TAG to Access and Default
VLAN ID to 1 for PORT1 and VCTRUNK2, which receive the services of F1 and F3
respectively, on the EFS8 board.
NOTE
After the test, change the modified parameter values to the values specified in the service configuration.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see 5.4.4 Deleting EPLAN
Services.
Service Requirement
In the network shown in Figure 4-32, the service requirements are as follows:
l Three branches (G1, G2, and G3) of user G are located at NE1, NE2, and NE4 respectively.
The branches need to form a LAN and share a 10 Mbit/s bandwidth. G2 and G3 do not
need to communicate with each other.
l Three branches (H1, H2, and H3) of user H are located at NE1, NE2, and NE4 respectively.
The branches need form a LAN and share a 20 Mbit/s bandwidth. H2 and H3 need to
communicate with each other.
l The service of user G needs to be isolated from the service of user H.
l The Ethernet equipment of user G and user H provides 100 Mbit/s Ethernet electrical
interfaces that work in auto-negotiation mode and do not support VLANs.
Figure 4-32 Networking diagram for configuring EVPLAN services (IEEE 802.1q bridge)
NE2:
Line board Ethernet board Ethernet board
6-SL4D-2 4-EGT1 3-EGT1
NE4:
3-EGT1-PORT1 3-EGT1-PORT1
H2 H3
NE2 NE4
4-EGT1-PORT1 4-EGT1-PORT1
NE1 G3
6-SL4D-2 6-SL4D-1
G2
6-SL4D-1 6-SL4D-2
H1 PORT2 PORT1
G1
VCTRUNK NE1:
Ethernet board Line board Line board
4-EFS8 6-SL4D-1 6-SL4D-2
PORT2 PORT1
In this example, the convergence node NE1 is configured with an EFS8 board that supports the
IEEE 802.1q bridge to implement EVPLAN services in which user data is isolated.
The access nodes NE2 and NE4 each are configured with two Ethernet transparent transmission
boards respectively, which occupy logical slots 3 and 4. The EPL services are configured to
implement transparent transmission from NE2 and NE4 to NE1.
Figure 4-33 shows the signal flow of the EVPLAN services (IEEE 802.1q bridge) and the
timeslot allocation to the EVPLAN services (IEEE 802.1q bridge).
For the method of calculating the bandwidth of the Ethernet services carried by a VCTRUNK,
see 6.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards.
Figure 4-33 Signal flow of and timeslot allocation to EVPLAN services (IEEE 802.1q bridge)
NE2
3-EGT1
VCTRUNK1 PORT1
- 5 User G2
NE1:EFS8 1 2:1 VC4-4:VC12:1-5
VC
4 -1 : PORT1
VC VCTRUNK1
VLAN 100 User H2
VCTRUNK1 10 VC4-4:VC12:1-10
1-
PORT1 VC4-4:VC12:1-5 1 2: 4-EGT1
User G1 VC
1:
VCTRUNK2
C 4-
VC4-4:VC12:6-10 V V
C4
VLAN 200 VCTRUNK3 -1
:V NE4
PORT2 C1
VC4-4:VC12:11-20 2:
User H1 1- 3-EGT1
VC 5
VCTRUNK4 4-1 VCTRUNK1 PORT1
: VC User G3
VC4-4:VC12:21-30 12 VC4-4:VC12:1-5
:1-
1 0
VB1 VCTRUNK1 PORT1
User H3
VC4-4:VC12:1-10
4-EGT1
SDH
PORT VCTRUNK
VLAN 0 0 - - - -
Priority
Board EFS8 3- 4- 3- 4-
EGT1 EGT1 EGT1 EGT1
VLAN 0 0 0 0 - - - -
Priority
Board EFS8
VB Name VB1
PORT2 Hub
VCTRUNK Spoke
1
VCTRUNK Spoke
2
VCTRUNK Hub
3
VCTRUNK Hub
4
Prerequisite
You must be familiar with 4.3.4 Flow of Configuring EVPLAN Services.
Background Information
If the Ethernet switching boards in the actual application scenarios are different from the boards
in this example, you need to learn about the requirements for configuring specific boards.
l For the EVPLAN services supported by Ethernet switching boards, see 6.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet switching boards, see 6.2
Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
Procedure
Step 1 Configure the EVPLAN services for user G1 and user H1 on NE1.
1. Set the attributes of the external ports (PORT1 and PORT2 on the EFS8 board) used by the
services of user G1 and user H1.
l In the NE Explorer, select the EFS8, and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, MAC
ck Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopba PORT2: Non-Loopback diagnosis. In this example, PHY Loopback
ck is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1, VCTRUNK2, VCTRUNK3, and
VCTRUNK4 on the EFS8 board) used by the service between user G1 and user G2, the
service between user G1 and user G3, the service between user H1 and user H2, and the
service between user H1 and user H3.
l Select Internal Port.
l Click the TAG Attributes tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
Entry VCTRUNK1: Enabled The packets of user G2, user G3, user H2, and
Detectio VCTRUNK2: Enabled user H3 do not carry VLAN tags. You need
n to enable the entry detection function to
VCTRUNK3: Enabled detect the VLAN tags of the packets. In this
VCTRUNK4: Enabled example, Entry Detection is set to
Enabled.
l Click the Network Attributes tab. After setting the parameters, click Apply.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
Parame Value in This Example Description
ter
Mappin VCTRUNK1: GFP In this example, the EFS8 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
VCTRUNK3: GFP the Ethernet boards of the interconnected
VCTRUNK4: GFP equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc VCTRUNK3: Big endian the VCTRUNKs on the Ethernet boards of
e VCTRUNK4: Big endian the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following in the
Bound Path Configuration dialog box that is displayed. Then, click Apply.
User Paramete Value in Description
r This
Example
Avai VC4-4 For the resources used by other boards, see 6.2
lable Requirements for Binding Paths with
Reso VCTRUNKs on Ethernet Boards.
urce
s
Avai VC4-4 For the resources used by other boards, see 6.2
lable Requirements for Binding Paths with
Reso VCTRUNKs on Ethernet Boards.
urce
s
Avai VC4-4 For the resources used by other boards, see 6.2
lable Requirements for Binding Paths with
Reso VCTRUNKs on Ethernet Boards.
urce
s
Avai VC4-4 For the resources used by other boards, see 6.2
lable Requirements for Binding Paths with
Reso VCTRUNKs on Ethernet Boards.
urce
s
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EFS8 board on NE1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the required parameters in the Create Ethernet LAN Service dialog box that is
displayed.
Board NE1-4-EFS8 -
Bridge IVL/Ingress When the bridge adopts the IVL learning mode, the
Switch Mode Filter Enable entry in the MAC address table is created according
to the source MAC address, VLAN ID, and source
port of the data frame. The entry is not valid for all
the VLANs..
Bridge IVL -
Learning
Mode
Ingress Filter Enabled This parameter checks the validity of VLAN tags. If
the VLAN ID is not the same as the VLAN ID
defined in the VLAN filtering table, the data frame
is discarded.
MAC Enabled -
Address Self-
Learning
Hub/Spoke PORT1: Hub If user G2 need not communicate with user G3,
VCTRUNK1: set VCTRUNK1 and VCTRUNK2 ports that
Spoke receive the services of user G2 and user G3 to
Spoke. Ports of the Spoke attribute cannot
VCTRUNK2: communicate with each other. A port of the Hub
Spoke attribute can communicate with a port of the
PORT2: Hub Spoke or Hub attribute.
VCTRUNK3:
Hub
VCTRUNK4:
Hub
6. Configure the cross-connections from the Ethernet service to the SDH link for user G2,
user G3, user H2, and user H3.
l In the NE Explorer, select NE1, and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
Activate Yes -
Immediatel
y
Step 3 Check whether the services are configured correctly. For the operation procedures, see Testing
Ethernet Service Channels.
Step 4 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 5 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Service Requirement
As shown in Figure 4-34, the transmission network is required to carry the VoIP and HSI
services.
User requirements:
l The VoIP services of user M and user N are sent to the transmission network at NE2 and
NE4 respectively and to the VoIP server at the convergence node NE1. The services share
a 20 Mbit/s bandwidth.
l The HSI services of user M and user N are sent to the transmission network at NE2 and
NE4 respectively and to the HSI server at the convergence node NE1. The services share
a 40 Mbit/s bandwidth.
l The VoIP services need to be isolated from the HSI services.
l The data communication equipment of user M and user N provides 100 Mbit/s Ethernet
electrical interfaces of which the working mode is auto-negotiation, and does not support
VLAN.
– C-VLAN ID of the VoIP services: 10
– C-VLAN ID of the HSI services: 20
NOTE
The application scenarios where one branch needs to communicate with other branches are as follows:
l User M needs to communicate with user N.
l User M need not communicate with user N.
If user M and user N need to communicate with each other, skip Step 1.5 in which you change the Hub/
Spoke attributes of ports connected to the bridge.
Requirement of the operator: The operator requires that all services received from the user side
should be uniformly labeled and groomed through planned S-VLANs.
Figure 4-34 Networking diagram for configuring EVPLAN services (IEEE 802.1ad bridge)
NE2: NE4:
Ethernet board Line board Line board Ethernet board
4-EGT1 6-SL4D-2 6-SL4D-1 4-EGT1
NE3
NM
Service C-VLAN Service C-VLAN
VoIP 10 VoIP 10
HSI 20 HSI 20
PORT1 PORT1
NE2 NE4
User M NE1 User N
VoIP server
VCTRUNK NE1:
Ethernet board Line board Line board
4-EFS8 6-SL4D-1 6-SL4D-2
VB1 S-VLAN 100 VB1 S-VLAN 200
VCTRUNK1 VCTRUNK2 VCTRUNK1 VCTRUNK2
PORT1 PORT2
In this example, the convergence node NE1 is configured with an EFS8 board that supports the
IEEE 802.1ad bridge to implement EVPLAN services in which VoIP data is isolated from HSI
data.
l The VoIP services tagged with C-VLAN ID 10 from NE2 and NE4 are further tagged with
S-VLAN ID 100 when they arrive at the IEEE 802.1ad bridge of NE1. Then, the services
are forwarded to the VoIP server through Layer 2 switching.
l The HSI services tagged with C-VLAN ID 20 from NE2 and NE4 are further tagged with
S-VLAN ID 200 when they arrive at the IEEE 802.1ad bridge of NE1. Then, the services
are forwarded to the HSI server through Layer 2 switching.
The access nodes NE2 and NE4 each are configured with an EGT1 board. The EPL services are
configured to implement transparent transmission from NE2 and NE4 to NE1.
Figure 4-35 shows the signal flow of the EVPLAN services (IEEE 802.1ad bridge) and the
timeslot allocation to the EVPLAN services (IEEE 802.1ad bridge).
For the method of calculating the bandwidth of the Ethernet services carried by a VCTRUNK,
see 6.3 Ethernet Service Bandwidths Carried by VCTRUNKs of Ethernet Boards.
Figure 4-35 Signal flow of and timeslot allocation to EVPLAN services (IEEE 802.1ad bridge)
NE1:EFS8 NE2:EGT1
VB1 SDH
PORT VCTRUNK
– Occupy the first to thirtieth VC-12 timeslots of the first VC-4 (VC4-1:VC12:1-30) on
the SDH link from NE1 to NE2.
– Are added and dropped by using the first to thirtieth VC-12 timeslots of the fourth VC-4
(VC4-4:VC12:1-30) on the EFS8 board of NE1 and the first to thirtieth VC-12 timeslots
of the fourth VC-4 (VC4-4:VC12:1-30) on the EGT1 board of NE2.
l The services of user N:
– Occupy the first to thirtieth VC-12 timeslots of the first VC-4 (VC4-1:VC12:1-30) on
the SDH link from NE1 to NE4.
– Are added and dropped by the using the thirty-first to sixtieth VC-12 timeslots of the
fourth VC-4 (VC4-4:VC12:31-60) on the EFS8 board of NE1 and the first to thirtieth
VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:1-30) on the EGT1 board of NE4.
Board EFS8
VB Name VB1
VB Port 1 2 3 4
C-VLAN 10 20 10 20 10 20
VCTRUNK Spoke
1
VCTRUNK Spoke
2
Prerequisite
You must be familiar with 4.3.1 Flow of Configuring EPL Services.
Background Information
If the Ethernet switching boards in the actual application scenarios are different from the boards
in this example, you need to learn about the requirements for configuring specific boards.
l For the EVPLAN services supported by Ethernet switching boards, see 6.1 Service
Support Capability of Ethernet Boards.
l For the VCTRUNK binding requirements of Ethernet transparent transmission boards, see
6.2 Requirements for Binding Paths with VCTRUNKs on Ethernet Boards.
The IEEE 802.1ad provider bridge supports ports with the C-Aware and S-Aware attributes only.
The C-Aware ports are used to add and strip the S-VLAN tags. The S-Aware ports are used to
transparently transmit the S-VLAN tag.
The IEEE 802.1ad provider bridge supports the following operation types:
This topic describes the four operation types when Bridge Switch Mode of the IEEE 802.1ad
provider bridge is set to IVL/Ingress Filter Enabled.
l Adding the S-VLAN based on the port: The packets that enter the C-Aware port are added
with the preset S-VLAN tag, and are forwarded in the bridge according to the S-VLAN
filtering table. Before the packets leave the C-Aware port, the S-VLAN tag is stripped.
l Adding the S-VLAN tag based on the port and C-VLAN: The entry detection is performed
for the packets that enter the C-Aware port. Then, the corresponding S-VLAN tags are
added to the packets according to the mapping relation between the C-VLAN tags and the
S-VLAN tags of the packets. If the mapping relation does not exist, the packets are
discarded. After the S-VLAN tags are added, the packets enter the bridge, where the packets
are forwarded according to the S-VLAN filtering table. Before the packets leave the C-
Aware port, the S-VLAN tag is stripped.
NOTE
l The same C-Aware port supports different C-VLAN tags being mapped to different S-VLAN
tags, but does not support the same C-VLAN tag being mapping to multiple S-VLAN tags.
l Performing port mounting based on the port: The packets that enter the S-Aware port are
not filtered. Instead, the S-VLAN switch is performed directly. The packets must have the
S-VLAN tags. Otherwise, the packets are discarded. When the packets leave the S-Aware
port, the packets are transparently transmitted.
l Performing port mounting based on the port and the S-VLAN: The entry filtering is
performed according to the preset S-VLAN tag. The packets that do not belong to the S-
VLAN are discarded. Then, the packets are forwarded according to the S-VLAN filtering
table. When the packets leave the S-Aware port, the packets are transparently transmitted.
In the case of the four operation types, the following conditions must be met before the packets
leave a port:
l The port is contained in the S-VLAN filtering table that is created by the user.
l The S-VLAN ID corresponding to the port must be specified when the user manually
mounts the port to the bridge.
– In the case of a C-Aware port, the S-VLAN ID corresponding to the port is the S-VLAN
ID that is added when the packets enter the port.
– In the case of an S-Aware port, the S-VLAN ID corresponding to the port is the S-VLAN
ID that is set when the user mounts the port to the bridge. If the S-Aware port is mounted
based on the port, the S-VLAN ID is considered to contain all the legal S-VLAN IDs.
Procedure
Step 1 Configure the EVPLAN services on NE1.
1. Set the attributes of the external ports (PORT1 and PORT2 on the EFS8 board) used by the
VoIP server and HSI server.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Interface Management > Ethernet Interface from the Function Tree.
l Select External Port.
l Click the Basic Attributes tab. After setting the parameters, click Apply.
Parameter Value in This Description
Example
Working PORT1: Auto- In this example, the VoIP server and HSI
Mode Negotiation server support the auto-negotiation mode.
PORT2: Auto- Hence, Working Mode is set to Auto-
Negotiation Negotiation for PORT1 and PORT2.
MAC PORT1: Non-Loopback The MAC loopback setting is used for fault
Loopback PORT2: Non-Loopback diagnosis. In this example, MAC
Loopback is set to Non-Loopback.
PHY PORT1: Non-Loopback The PHY loopback setting is used for fault
Loopback PORT2: Non-Loopback diagnosis. In this example, PHY
Loopback is set to Non-Loopback.
l Click the Flow Control tab. The parameters in the Flow Control tab page adopt the
default values.
l Click the Network Attributes tab. After setting the parameters, click Apply.
l It is unnecessary to set the parameters on the TAG Attributes tab. If the port type is
set to C-Aware or S-Aware, the parameters on the TAG Attributes are meaningless.
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
2. Set the attributes of the internal ports (VCTRUNK1 and VCTRUNK2 on the EFS8 board)
used by the services of user M and N.
l Select Internal Port.
l Click the Network Attributes tab. After setting the parameters, click Apply.
Paramet Value in This Description
er Example
l It is unnecessary to set the parameters on the TAG Attributes tab. If the port type is
set to C-Aware or S-Aware, the parameters on the TAG Attributes are meaningless.
l Click the Encapsulation/Mapping tab. After setting the parameters, click Apply.
Mappin VCTRUNK1: GFP In this example, the EFS4 board is used. This
g VCTRUNK2: GFP parameter adopts the default value GFP.
Protocol Mapping Protocol of the VCTRUNKs on
the Ethernet boards of the interconnected
equipment at both ends must be set to the
same value.
FCS VCTRUNK1: Big endian When Mapping Protocol is set to GFP, FCS
Calculat VCTRUNK2: Big endian Calculated Bit Sequence is set to Big
ed Bit endian. FCS Calculated Bit Sequence of
Sequenc the VCTRUNKs on the Ethernet boards of
e the interconnected equipment at both ends
must be set to the same value.
l This operation is optional. Click the LCAS tab. After setting the parameters, click
Apply.
Parame Value in This Example Description
ter
l Click the Bound Path tab. Click the Configuration button. Set the following in the
Bound Path Configuration dialog box that is displayed. Then, click Apply.
User Paramet Value in Description
er This
Example
l Click the Advanced Attributes tab. The parameters in the Advanced Attributes tab
page adopt the default values.
3. Create a bridge for the EFS8 board on NE1.
l In the NE Explorer, select the EFS8 board, and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
l Click New.
l Set the required parameters in the Create Ethernet LAN Service dialog box that is
displayed.
Board NE1-4-EFS8 -
VB Type 802.1ad The IEEE 802.1ad bridge supports data frames with
two layers of VLAN tags. This bridge adopts the
outer S-VLAN tags to isolate different VLANs and
supports only the mounted ports whose attributes are
C-Aware or S-Aware.
Bridge IVL/Ingress This bridge checks the contents of the VLAN tags
Switch Mode Filter Enable that are in the packets and performs Layer 2
switching according to the destination MAC
addresses and the S-VLAN IDs of the packets.
Bridge IVL -
Learning
Mode
MAC Enabled -
Address Self-
Learning
VB Port 1 2 3 4
C-VLAN 10 20 10 20 10 20
l Click OK.
l In the Create Ethernet LAN Service dialog box, click OK.
4. Create a VLAN filtering table.
l Select the created bridge and click the VLAN Filtering tab.
l Click New.
l Create the VLAN filtering table of the VoIP service.
VLAN ID 100 According to the plan, the S-VLAN ID is 100 for the
(e.g.1,3-6) VoIP service.
VLAN ID 200 According to the plan, the S-VLAN ID is 200 for the
(e.g.1,3-6) HSI service.
If user M and user N need to communicate with each other, proceed to Step 1.6.
l Select the created bridge and click the Service Mount tab.
l Change the Hub/Spoke attribute of the port mounted to the bridge.
Parameter Value in This Description
Example
Hub/Spoke PORT1: Hub User M and user N need not communicate with
PORT2: Hub each other. In this case, set VCTRUNK1 and
VCTRUNK2 that access the services of user M
VCTRUNK1: and user N to the Spoke attribute. Ports of the
Spoke Spoke attribute cannot communicate with each
VCTRUNK2: other.
Spoke A port of the Hub attribute can communicate
with a port of the Spoke or Hub attribute.
6. Configure the cross-connections from the Ethernet service to the SDH link for user M and
user N.
l In the NE Explorer, select NE1, and then choose Configuration > SDH Service
Configuration from the Function Tree.
l Click Create on the lower-right pane to display the Create SDH Service dialog box.
Set the parameters as follows.
User Paramete Value in Description
r This
Example
User M Level VC12 The timeslot bound with the service of user
M is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
User N Level VC12 The timeslot bound with the service of user
N is at the VC-12 level. The service level
must be consistent with the level of the path
bound with the VCTRUNK.
Activate Yes -
Immediatel
y
Step 3 Enable the performance monitoring function of the NEs. For details, see Setting Performance
Monitoring Parameters of an NE.
Step 4 Back up the configuration data of the NEs. For details, see Backing Up the NE Database to the
SCB Board.
----End
Relevant Task
If the services are configured incorrectly and thus need to be deleted, see Deleting SDH Services.
Table 4-36 lists the parameters that are used for configuring the basic attributes of an Ethernet
port.
Table 4-36 Parameters for configuring the basic attributes of an Ethernet port
Port Physical Parameters Displays the value that is Displays the actual working
queried. status of the port.
Table 4-39 Parameters for configuring the advanced attributes of an Ethernet port
Field Value Range Description
Table 4-40 Parameters for configuring the tag attributes of an Ethernet port
4.11.6 Encapsulation/Mapping
The equipment supports the setting of encapsulation and mapping protocols for Ethernet packets,
including the parameters such as mapping protocol, scrambling code, and CRC or not.
Table 4-41 lists the parameters that are used for configuring the encapsulation and mapping of
an Ethernet port.
Table 4-41 Parameters for configuring the encapsulation and mapping of an Ethernet port
Field Value Range Description
Set Inverse Value for CRC Yes, No The Set Inverse Value for
Default value: Yes CRC parameter specifies
whether to set an inverse
value for the CRC field of the
HDLC or LAPS protocol.
You can set this parameter
only when the mapping
protocol is HDLC or LAPS.
You can click 7.22 Set
Inverse Value for CRC to
display the detailed
information.
Check Field Length The value ranges of the The Check Field Length
parameters are different from parameter specifies the length
each other for different of the CRC field of the
boards and products. You can mapping protocol.
click the hyperlink in the You can set this parameter
description to display the only when the mapping
specific information. protocol is GFP, HDLC, or
LAPS.
You can click 7.23 Check
Field Length to display the
detailed information.
FCS Calculated Bit The value ranges of the The FCS Calculated Bit
Sequence parameters are different from Sequence parameter
each other for different specifies the sequence of
boards and products. You can storing the bits in the CRC
click the hyperlink in the field of the mapping protocol.
description to display the You can set this parameter
specific information. only when the mapping
protocol is GFP, HDLC, or
LAPS.
You can click 7.24 FCS
Calculated Bit Sequence to
display the detailed
information.
Table 4-42 lists the parameters that are used for binding a path.
Table 4-43 lists the parameters that are used for configuring Ethernet private line services.
Service Type The value ranges of the parameters are The Service Type
different from each other for different (EPL Service)
boards and products. You can click the parameter specifies
hyperlink in the description to display the Ethernet private
the specific information. line service type.
You can click 7.26
Service Type (EPL
Service) to display
the detailed
information.
Operation Type The value ranges of the parameters are The Operation
different from each other for different Type (EPL
boards and products. You can click the Service) parameter
hyperlink in the description to display specifies whether to
the specific information. add, strip, translate
or transparently
transmit VLAN
labels for service
packets at a port
when Service
Type is set to
EVPL(QinQ).
You can click 7.25
Operation Type
(EPL Service) to
display the detailed
information.
Bridge Type 802.1q, 802.1d, 802.1ad Specifies the type of the VB.
Default value: 802.1q
Bridge Switch Mode IVL/Ingress Filter Specifies the switching mode of the VB.
Enable, SVL/Ingress
Filter Disable
Default value: IVL/
Ingress Filter Enable
Mount Port For example: PORT1 Displays the mount port. The mount
port may be the PORT port or VC
trunk port.
Port Type For example: UNI Displays the network attributes for a
port.
Value Range: UNI, C-Aware, S-
Aware. Default value: UNI
TAG Access, Tag Aware, Hybrid Displays the tag attribute of the VB.
Service Direction For example: Bidirectional Displays the working modes of the
Ethernet port.
Forwarding Physical For example: PORT1, Displays the physical port that is
Port VCTRUNK(5,8) actually attached to the VB link.
Physical Port For example: PORT1 Displays the name of the port.
Aging Status For example: Static Displays the aging status of unicast
items, including static and dynamic.
You can modify the existing configuration data related to the topology and services.
Prerequisite
l The NE must be created.
l You must be an NM user with "NE operator" authority or higher.
Precautions
CAUTION
Changing the NE ID may interrupt the NE communication.
Procedure
Step 1 In the NE Explorer, select an NE and then choose Configuration > NE Attribute from the
Function Tree.
Step 2 Click Modify NE ID. Then, the Modify NE ID dialog box is displayed.
Step 3 Enter New ID and New Extended ID. Then, click OK.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > NE Attribute from the Function
Tree.
Step 2 In NE Attribute list, enter a new NE name in Name. Click Apply. Then, a dialog box is
displayed, indicating that the operation is successful.
NOTE
An NE name can contain a maximum of 64 letters, symbols, and numerals, but cannot contain the following
special characters: | : * ? " < >.
----End
5.1.3 Deleting an NE
If you have created a wrong NE, you can delete the NE from the U2000. Deleting an NE removes
all the information about the NE from the U2000 but does not affect the operation of the
equipment.
Prerequisite
You must be an NM user with "NM maintainer" authority or higher.
Precautions
CAUTION
If an NE is deleted, the links related to the NE are also deleted.
Procedure
l Delete a single NE.
1. Right-click the NE on the Main Topology and choose Delete from the shortcut menu.
The Confirm dialog box is displayed.
2. Click Yes. The Deletion Result dialog box is displayed.
3. Click Close, The NE icon is deleted from the Main Topology.
l Delete NEs in batches.
1. Choose Configuration > NE Configuration Data Management from the Main
Menu. Then, the NE Configuration Data Management window is displayed.
2. In the pane on the left, select multiple NEs and click . Then, the
Configuration Data Management List pane displays the configuration data of all
the selected NEs.
3. Right-click the NEs to be deleted and then choose Delete from the shortcut menu. The
Delete the NE dialog box is displayed.
4. Click OK to delete the selected NEs.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Precautions
CAUTION
Changing the parameter values of the gateway NE may interrupt the communication.
Procedure
Step 1 Choose Administration > DCN Management from the Main Menu.
Step 2 In the Filter NE window that is displayed, choose the NEs. Click OK.
Step 3 Click the GNE tab. Select the gateway NE whose parameter values need to be changed. Right-
click and choose Modify GNE from the shortcut menu.
Step 4 In the Modify GNE dialog box that is displayed, set Gateway Type.
l When Gateway Type is set to IP Gateway, change IP Address.
NOTE
Step 5 Click OK. Then, click Close in the Operation Result dialog box indicating that the operation
succeeded.
----End
Procedure
Step 1 Choose Administration > DCN Management from the Main Menu.
Step 3 Double-click the Primary GNE1 field and select a gateway NE from the drop-down list.
Step 4 Click Apply. Then, click Close in the Operation Result dialog box indicating that the operation
succeeded.
----End
Prerequisite
l The NE must be created.
l There must be idle slots on the NE panel.
l You must be an NM user with "NE maintainer" authority or higher.
Background Information
l The physical boards are the actual boards inserted in the subrack. The logical boards are
created on the U2000 and are saved on the SCB board, but they do not exist on the actual
equipment.
l The NE panel shows the mapping relations between the slots that house the processing
boards and the slots that house the interface boards. If you click a processing board that is
paired with an interface board on the NE panel, the ID of the slot that houses the mapping
interface board is displayed in orange.
Procedure
Step 1 Double-click the icon of the NE to open the NE panel.
Step 2 Right-click the selected idle slot. Select the board you need to add from the drop-down list.
NOTE
If the physical cross-connect board is installed in the subrack, add its corresponding logical board on the
U2000.
----End
Prerequisite
l The services and protection groups must be deleted.
l You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Double-click the icon of the NE to display the NE Panel.
Step 2 Right-click the board you need to delete and choose Delete from the shortcut menu.
Step 3 Click OK in the Delete Board dialog boxes that are displayed sequentially.
----End
Prerequisite
To change the values of different configuration parameters of different boards, you may need
to operate as NM users with different authorities. You must be an NM user with "NE operator"
authority or higher.
Procedure
Step 1 In the NE Explorer, select a board and choose the appropriate function entry from the Function
Tree.
Step 2 In the pane on the right, modify the existing parameter settings and click Apply.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose Inventory > Fiber/Cable > Fiber/Cable Management from the Main Menu.
Step 2 Right-click the fiber you need to delete and then choose Delete Fiber/Cable from the shortcut
menu. Then, the Warning dialog box is displayed. Click OK to delete the fiber.
Step 3 Click Close in the Operation Result dialog box indicating that the operation succeeded.
----End
Prerequisite
You must be an NM user with "NE maintainer" authority or higher.
Procedure
Step 1 Choose Inventory > Fiber/Cable > Fiber/Cable Management from the Main Menu. All the
fiber information is displayed in the right pane.
Step 2 Select a fiber, right-click and choose Modify Fiber/Cable from the shortcut menu. In the Modify
Fiber/Cable dialog box, you can modify Name, Length(km), Attenuation, Medium Type,
Maintainer, Remarks, and Disabled Status. Click OK. Then, click Close in the Operation
Result dialog box indicating that the operation succeeded.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 On the Main Topology, right-click the cable and choose Delete from the shortcut menu.
Step 2 Click Yes in the Confirm dialog box that is displayed.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Precautions
CAUTION
Performing this operation interrupts the service that you modify.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 3 If the service to be modified is active, you should deactivate the service. Select the service that
you need to modify and then click Deactivate.
CAUTION
Deactivation interrupts the services.
Step 4 Click OK in the Confirm dialog box that is displayed third. The Operation Result dialog box
is displayed, indicating that the operation is successful.
Step 6 After the cross-connection is deactivated, modify the SDH service by using the method described
in Step Step 7 or Step 8.
NOTE
l By using the method described in Step Step 7, you can modify the source or sink of a service. Ensure
that the service source and sink are located on the same board before and after the modification.
l If the modification requirement cannot be met by using the method described in Step Step 7 (for
example, a pass-through service needs to be configured to the local equipment through modification),
you can delete the original service and create the cross-connection again by using the method described
in Step Step 8.
Step 7 Optional: To modify the SDH service, choose Modify from the shortcut menu.
1. Right-click the service that you need to modify and choose Modify from the shortcut menu.
Then, the Modify SDH Service dialog box is displayed.
2. Change Source VC4 or Sink VC4, Source Timeslot Range, and Sink Timeslot Range.
NOTE
By using this method, you can change only Source VC4 or Sink VC4. The source VC-4 and sink
VC-4 cannot be modified at the same time.
3. Click OK. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful.
4. Click Close.
5. Select the service that is modified and click Activate.
6. Click OK. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful.
7. Click Close.
Step 8 Optional: To modify the SDH service, delete the service and then create the service again.
1. Select the service that you need to modify and click Delete.
2. Click OK. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful.
3. Click Close. The service is deleted.
4. Create the service again according to the requirements. For details, see Creating SDH
Services.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SDH Service Configuration
from the Function Tree.
Step 3 If the service to be deleted is active, you should deactivate the service first. Select the service
that you need to delete and click Deactivate.
CAUTION
Deactivation interrupts the services.
Step 6 Click Close in the Operation Result dialog box indicating that the operation succeeded.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet Line Service from the Function Tree.
Step 2 Click Query.
Step 3 Select the Ethernet private line service to be deleted and click Delete. Click OK in the
Prompt dialog box that is displayed. Then, a dialog box is displayed, indicating that the operation
is successful, that is, the Ethernet private line service is deleted successfully.
Step 4 Click Query to check whether the Ethernet private line service is deleted.
Step 5 See 5.4.2 Deleting SDH Services to delete the cross-connections of the Ethernet private line
service.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
CAUTION
When the EPLAN services are deleted, the VLAN unicast entries and disabled MAC address
entries are deleted.
Procedure
Step 1 In the NE Explorer, select an Ethernet board, and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
Step 2 Click Query.
Step 3 Select the EPLAN service to be deleted and click Delete. Click OK in the Prompt dialog box
that is displayed. Then, a dialog box is displayed, indicating that the operation is successful, that
is, the EPLAN service is deleted successfully.
Step 4 Click Query to check whether the EPLAN service is deleted.
Step 5 See 5.4.2 Deleting SDH Services to delete the cross-connections of the EPLAN service.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
Deleting an EVPLAN service involves the following:
1. Deleting the VLAN filtering table
2. Deleting the service mounting configurations
Context
CAUTION
When the VLAN filtering table is deleted, the VLAN unicast entries and disabled MAC address
entries are deleted.
Procedure
Step 1 In the NE Explorer, select an Ethernet board and then choose Configuration > Ethernet
Service > Ethernet LAN Service from the Function Tree.
Step 2 Click Query.
Step 3 Click the VLAN Filtering tab.
Step 4 Select the VLAN filtering entry to be deleted and click Delete.
Step 5 Click the Service Mount tab.
Step 6 Select the EVPLAN service to be deleted and click Delete. Click OK in the Prompt dialog box
that is displayed. Then, a dialog box is displayed, indicating that the operation is successful, that
is, the EVPLAN service is deleted successfully.
Step 7 Click Query to check whether the EVPLAN service is deleted.
Step 8 See 5.4.2 Deleting SDH Services to delete the cross-connections of the EVPLAN service.
----End
Before you delete an NE or a fiber/cable connection on the U2000, you need to delete the related
protection subnets.
5.5.2 Changing the Values of Protection Subnet Parameters
In the case of the SDH equipment, you can set the parameters of the MSP protection subnet by
using the protection subnet maintenance function.
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l If trails are configured on the protection subnet that you need to delete, delete the trails
first.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Manage SDH Protection Subnet from the Main
Menu.
Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM, Delete from
the NE, or Delete All from the NM from the short-cut menu.
NOTE
Step 3 Click Yes in the Operation Prompt dialog box indicating that the operation succeeded. Then,
the Operation Result dialog box is displayed.
NOTE
If Delete from the NE is selected, you need to confirm the operation again.
----End
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The data of each NE must be configured and the fibers must be created on the U2000.
l The MSP protection subnet must be configured.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main
Menu. Then, the SDH Protection Subnet Common Attributes dialog box is displayed.
Step 2 Select an MSP protection subnet from the pane on the left. The attribute information of the
protection subnet is displayed in the pane on the right.
Step 3 Click the Protection Subnet Parameters tab.
Step 4 Click Query to query the parameters of the protection subnet on the MSP ring.
Step 5 Click the WTR Time(s) text box and enter a value.
NOTE
The default WTR time is 600s. You can also set the WTR time to a value from 300s to 720s.
----End
6 Equipment Information
You need to consider the service support capability of the boards used by the equipment and the
configuration requirements during the configuration process.
Table 6-2 Requirements for binding paths with VCTRUNKs on Ethernet boards
Board Requirement for Binding Paths with a VCTRUNK
EGT1 l The VCTRUNKs can be bound with the VC-12 VC-3 and VC-4 paths.
l Only one VCTRUNK with a maximum bandwidth of 1.25 Gbit/s is supported.
l VCTRUNK1 can only be bound with the fourth VC-4, namely, VC4-4, if the path binding
is at VC-12 level.
l VCTRUNK1 can be bound with the first to eighth VC-4s, namely, VC4-1 to VC4-8, if the
path binding is at VC-3 level.
EFS8 l The VCTRUNKs can be bound with the VC-12 paths and VC-3 paths.
l Eight VCTRUNKs are supported. The maximum bandwidth of each VCTRUNK is 100
Mbit/s.
l VCTRUNK1 to VCTRUNK8 can only be bound with the fourth VC-4, namely, VC4-4, if
the path binding is at VC-12 level.
l VCTRUNK1 to VCTRUNK8 can be bound with the first to fourth VC-4s, namely, VC4-1
to VC4-4, if the path binding is at VC-3 level.
NOTE
When the Ethernet board uses the GFP protocol to encapsulate Ethernet services, you can determine
whether a check field is used during the encapsulation by setting the Check Field Length parameter. By
default, FCS32 is used as the check field. In this case, if the Ethernet board uses the default GFP parameter
settings, the theoretical bandwidth of the VCTRUNK bound with five VC-12 paths is 10.938 Mbit/s when
the Ethernet frame length is 1500 bytes and the theoretical bandwidth of the VCTRUNK bound with five
VC-12 paths is 12.025 bit/s when the Ethernet frame length is 64 bytes.
In actual situations, you can estimate the level and quantity of the paths according to the
following principle: One VC-12 path carries 2 Mbit/s services; one VC-3 path carries 48 Mbit/
s services; one VC-4 path carries 150 Mbit/s services. For example, in the case of a 10 Mbit/s
Ethernet service, the VCTRUNKs can be bound with five VC-12 paths.
7 List of Parameters
This section describes all the parameters that are used for configuring and querying the common
boards and functions on the U2000. Each parameter is described in terms of the description,
impact on the system, values, configuration guidelines, and relationship with other parameters.
Values
Board Name Valid Values Default Value
Value Description
Configuration Guidelines
The port attribute depends on the port position in the network and the service. For this reason,
select a proper port attribute as required. Generally, select the default value.
l For the MPLS service, select P for the port that transmits or receives packets with MPLS
labels.
l For the QinQ service, select C-Aware or S-Aware for the port. Connecting to the port of
the client network, a C-Aware port identifies and processes the packets with C-VLAN
labels. Connecting to the port at the network side, an S-Aware port identifies and processes
the packets with S-VLAN tags. The configuration examples are described as follows:
– Add the S-VLAN tag to the service from Port A to Port B, and remove the S-VLAN
tag from the service from Port B to Port A. Then select C-Aware for Port A, and S-
Aware for Port B.
– Configure a service from Port A to Port B to transparently transmit the C-VLAN tags
at the client side. Then select C-Aware for Ports A and B.
– Configure a service from Port A to Port B to transparently transmit the S-VALN tags
at the network side. Then select S-Aware for Ports A and B.
– Configure a service from Port A to Port B to switch the C-VLAN tags at the client side.
Then select C-Aware for Ports A and B.
– Configure a service from Port A to Port B to switch the S-VALN tags at the network
side. Then select S-Aware for Ports A and B.
Related Information
According to the position and role of the equipment in the networking, there are three types of
equipment: CE, PE (U-PE & N-PE), and P. Client Edge (CE) indicates the equipment at the
client side. Provider Edge (PE) indicates the edge equipment at the network side. Provider (P)
indicates the intermediate node at the network side.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set the value as required. Generally, select the default value, unless otherwise specified.
Values
Board Name Valid Values Default Value
Value Description
Disable Indicates that the port disables the flow control function.
Enable Symmetric Flow Indicates that the port can transmit PAUSE frames and
Control process the received PAUSE frames.
Send Only Indicates that the port sends the PAUSE frame only.
Receive Only Indicates that the port can only process the received PAUSE
frames.
Configuration Guidelines
This parameter is meaningful only when you configure the EPL service. You can select the value
as required.
Values
Valid Values Default Value
Value Description
Disabled Indicates that the port disables the flow control function.
Enable Dissymmetric Flow Indicates that the port only transmits flow control frames, but
Control does not process the received flow control frames.
Enable Symmetric Flow Indicates that the port can transmit PAUSE frames and
Control process the received PAUSE frames.
Configuration Guidelines
Generally, set this parameter to Enable Symmetric/Dissymmetric Flow Control, unless
otherwise specified.
Values
Value Range Default Value
Value Description
Inloop Loops back the services from the cross-connection side to the
cross-connection side within the equipment at the local end.
Configuration Guidelines
None.
Values
Value Range Default Value
Value Description
Inloop Loops back the services from the cross-connection side to the
cross-connection side within the equipment at the local end.
Configuration Guidelines
None.
The default value 0x8100 of this parameter is the protocol type that is specified by the related
standard. The original equipment of other vendors may use 0x88A8 or 0x9100 to represent the
VLAN protocol. To realize the interconnection with the original equipment, the user should set
this parameter accordingly.
Values
Value Range Default Value
0x600-0xFFFF 0x8100
Configuration Guidelines
Set this parameter according to the supported value of QinQ Type Area of the opposite
equipment.
l For the external physical interface of the board, the transmit direction is connected to the
receive direction by a fiber.
l The two external physical ports on the board are cross-connected to each other through
fibers.
l The cross-connection is created on the same VCTRUNK of the board.
l The cross-connection is created between different VCTRUNKs of the board.
Values
Board Name Valid Values Default Value
Configuration Guidelines
To check the self-loop port, select Enabled.
Values
Board Name Valid Values Default Value
Configuration Guidelines
To block a self-loop port, select Enabled. Otherwise, select Disabled.
Values
Board Name Valid Values Default Value Unit
Configuration Guidelines
Generally, select the value according to the bandwidth.
Values
Board Name Value Range Default Value
You can set this parameter according to the percentage of the traffic at the port. The value 10
means that the whole bandwidth is allocated to the port.
Configuration Guidelines
Generally, adopt the default value.
Values
Board Name Value Range Default Value
Configuration Guidelines
You can set this parameter according to whether to control the traffic of the broadcast packets.
Values
Value Range Default Value
Value Description
Configuration Guidelines
Set this parameter according to the actual requirement of the user. Set this parameter to
Enabled if the traffic on a port needs to be monitored.
Values
Board Name Value Range Default Value Unit
Configuration Guidelines
The user can set this parameter according to the actual service requirement.
Values
Value Range Default Value
0 to 65535 34928
Configuration Guidelines
The value of this parameter must be the same as the value of the accessed jumbo frame type.
Otherwise, the Ethernet board does not consider the frame as a jumbo frame.
Values
Board Name Valid Values Default Value
EFS8 1-4095 1
Configuration Guidelines
Allocate the default VLAN ID according to the networking plan of the service carrier.
Values
Board Name Valid Values Default Value
EFS8 0-7 0
Configuration Guidelines
Set the VLAN priority according to the service requirements and the allocation of the service
carrier.
Values
Board Name Valid Values Default Value
Value Description
Enabled The port checks the Tag label. In this case, the Tag attribute
of the port is valid.
Disabled The port does not check the tag label. In this case, the Tag
attribute of the port is invalid.
Configuration Guidelines
l To transmit the data packet transparently, the user can disable the entry detection function.
l To forward the data packet according to the contents of the data packet, the user can enable
the entry detection function.
7.19 TAG
Description
TAG indicates that the Ethernet port supports IEEE 802.1Q Ethernet packets that contain VLAN
tags. You can set three attributes to differentiate the packets from each other so that these packets
can be transmitted efficiently.
Values
Value Range Default Value
Value Description
Configuration Guidelines
The tag attributes are configured for MAC ports and VCTRUNK ports. Hence, the VCTRUNK
ports at both ends of the trunk link can be configured with the tag attributes. In the case of a link,
the services are available only when the parameters of the tag attributes are the same for the
VCTRUNK ports on the source and sink ports. No requirements are proposed for the tag
attributes of MAC ports.
Related Information
Mapping relationship between the packets handled by the port and the tag identifiers
Packet Type Attribute of the Ingress Handling Method
Port
Ethernet packets that contain Tag aware The port transmits these
tags packets.
Ethernet packets that do not Tag aware The port discards these
contain tags packets.
Values
Table 7-1 shows the value range of each type of board.
Value Description
Configuration Guidelines
The value of Mapping Protocol for VCTRUNK of the local equipment must be the same as
that of Mapping Protocol for the VCTRUNK of the interconnected equipment.
7.21 Scramble
Description
The Scramble parameter specifies whether to scramble the payload area of the encapsulation
protocol and the scramble mode.
Values
Table 7-2 shows the value range of each type of board.
Value Description
Configuration Guidelines
The value of Scramble for VCTRUNK must be the same as that of Scramble for the VCTRUNK
of the interconnected equipment.
Values
Board Name Value Range Default Value
Value Description
Configuration Guidelines
The value of Set Inverse Value for CRC for VCTRUNK of the local equipment must be the
same as that of Set Inverse Value for CRC for the VCTRUNK of the interconnected equipment.
Values
Table 7-3 shows the value range of each type of board.
Table 7-3 The length of the CRC field supported by each type of board
Mapping
Board Name Protocol Value Range Default Value
LAPS l FCS32
HDLC l FCS32
Value Description
No The protocol frame does not contain the CRC field. Only the
GFP protocol supports this option.
Configuration Guidelines
If Mapping Protocol is set to HDLC or LAPS, the value of Check Field Length must be
consistent for the interconnected VCTRUNKs at the two ends.
Values
Table 7-4 shows the value range of each type of board.
Table 7-4 FCS calculated bit sequence supported by each type of boards
Mapping
Board Name Protocol Value Range Default Value
Value Description
Configuration Guidelines
The value of FCS Calculated Bit Sequence for the VCTRUNK of the local equipment must
the same as that of FCS Calculated Bit Sequence for the VCTRUNK of the interconnected
equipment.
Values
Board Name Valid Values Default Value
Value Description
Add S-VLAN Indicates that the one layer of S-VLAN label is added to the
processed packets in the service.
Translate S-VLAN If the source S-VLAN labels of the packets processed in the
service are translated into the sink S-VLAN labels, the source
S-VLAN label must be different from the sink S-VLAN label.
Transparently transmit S- Forwards the service packets according to the port or S-VLAN.
VLAN After the packets are processed in the service, the S-VLAN
labels in the packets are not changed.
Transparently transmit C- Forwards the service packets according to the port or C-VLAN.
VLAN After the packets are processed in the service, the C-VLAN
labels in the packet are not changed.
Configuration Guidelines
Select a proper item according to network planning and service model.
Values
Board Name Valid Values Default Value
Value Description
Configuration Guidelines
Select a service type as required.
The port needs to process different types of packets in different ways, so you need to set the port
to a PE port or a P port. The PE port is not configured with the encapsulation format, while the
P port is configured with the encapsulation format. The P port indicates a port for connecting
the equipment of the network provider, so the P port receives data packets in the MPLS
encapsulation format. You can set the packet encapsulation format of the P port by running the
configuration command.
Values
Value Range Default Value
Value Description
Configuration Guidelines
The user can choose an encapsulation format according to the requirements of the service.
Different encapsulation formats support different types of data packets. When the encapsulation
format is inconsistent with the type of the receive data packet, the data packet is discarded. When
configuring services, the user needs to make sure that the encapsulation format of the port is
consistent with the type of the data packet that is transmitted by the interconnected equipment.
Related Information
Values
Valid Values Default Value
Value Description
Empty Indicates that the port does not check the C-VLAN/S-VLAN.
The services are forwarded according to the port.
Configuration Guidelines
Select the value according to the network. Generally, select C-VLAN and S-VLAN allocated
by the carrier.
Values
Value Range Default Value
1 to 4095 -
Configuration Guidelines
l The value range is relevant to the encapsulation format of the P port (Per-NE configuration).
In the case of Martinioe, the value ranges from 16 to 1023. In the case of stack VLAN, the
value ranges from 1 to 4095.
l The VLAN IDs at both ends of a link must be the same. In the case of different Ethernet
services, you can set the VLAN ID to different values.
based on the MAC address. The independent VLAN learning mode indicates learning and
forwarding based on the VLAN and MAC address.
The shared VLAN learning mode indicates the MAC address that is learnt by this VLAN
interface is shared by all the other VLAN interfaces, which reduces the safety of data packets.
Values
Value Range Default Value
Value Description
Configuration Guidelines
The user can set the parameter according to the networking requirements.
The third and forth bytes indicate the ID of the maintenance point on the network node. The
maintenance point ID must be unique in the entire network.
Values
Valid Values Default Value
Configuration Guidelines
The maintenance point ID must be unique in the entire network. Moreover, the U2000 can check
whether the maintenance point ID is duplicate.
Values
Valid Values Default Value
Configuration Guidelines
None.
Values
Valid Values Default Value
Configuration Guidelines
To start the connectivity check, activate the CC function at a maintenance endpoint.
Values
Valid Values Default Value
Succeeded, Failed -
Configuration Guidelines
None.
Values
Valid Values Default Value
Configuration Guidelines
None.
As shown in Figure 7-3, MEP1 and MEP2 are the maintenance endpoints. MIP1, MIP2, MIP3
and MIP4 are the maintenance intermediate points. In this case, the number of hops from MEP1
to MEP2 is 5, and that from MEP1 to MIP3 is 3.
Values
If the value of Hop Count is 2, there are two hops.
Configuration Guidelines
None.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set the value according to the expected frame length.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set this parameter to a lower value if the requirement is high for the response time.
Set this parameter to a higher value if the requirement is low for the response time.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set this parameter to a proper value according to the test accuracy and the system resource used
in the test.
Values
Value Range Default Value
SDH Direction, / /
Value Description
SDH Direction, / Indicates that the test packet is transmitted from the
VC trunk port to the SDH side.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set the value according to the actual port rate and the monitoring period.
Make sure that the value of Error Frame Monitor Threshold (Entries) is not greater than the
maximum number of frames received at the port within the time specified in Error Frame
Monitor Window (ms).
Values
Valid Values Default Value Unit
Configuration Guidelines
If higher link performance is required, set the threshold to a lower value. Otherwise, set the
threshold to a higher value.
Make sure that the value of Error Frame Monitor Threshold(Entries) is not greater than the
maximum number of frames received at the port within the time specified in Error Frame
Monitor Window (ms).
Values
Valid Values Default Value Unit
Configuration Guidelines
Set the value according to the actual data frame transmission rate and the frames. If the data
transmission rate is high, set this parameter to a higher value. Otherwise, set this parameter to a
lower value.
Related Information
Maxpps: indicates the maximum number of frames per second.
Specifically,
According to the rule of Maxpps/10 < Error Frame Period Window(Frames) < Maxpps*60,
you know the value range of the Error Frame Period Window(Frames) parameter for a certain
port rate.
Values
Valid Values Default Value Unit
Configuration Guidelines
None.
Values
Valid Values Default Value Unit
Configuration Guidelines
Set the value according to the monitoring time period.
Make sure that the value of Error Frame Second Window (s) is not less than that of Error
Frame Second Threshold (s).
Values
Valid Values Default Value Unit
Configuration Guidelines
None.
Values
Valid Values Default Value
Configuration Guidelines
None.
Values
Valid Values Default Value
Value Description
Configuration Guidelines
None.
Values
Valid Values Default Value
Configuration Guidelines
None.
Values
Valid Values Default Value
Configuration Guidelines
If the hardware has the capability of performing unidirectional operations and supports
unidirectional software operations, generally, set Unidirectional Operation to Enabled.
Values
Valid Values Default Value
Value Description
Non-Loopback Indicates that the port is not in the loopback state defined
in IEEE 802.3ah.
Initiate Loopback at Local Indicates that the local end can transmit the loopback
packets to the remote end.
Respond Loopback of Remote Indicates that the local end can respond to the loopback
packets from the remote end.
Configuration Guidelines
None.
Values
Value Range Default Value
Value Description
Port Flow All the packets entering the specified port are
regarded as one flow.
Port+VLAN Flow All the packets that enter the specified port, and
whose Tag VID is consistent with the specified VID,
are regarded as one flow.
Port+SVLAN Flow All the packets that enter from the specified port, and
whose SVLAN VID is consistent with the specified
VID, are regarded as one flow.
Port+CVLAN+SVLAN Flow All the packets that enter from the specified port, and
whose SVLAN VID and CVLAN VID are consistent
with the specified VID, are regarded as one flow.
Configuration Guidelines
Based on the required QoS and service type, set a proper value for Flow Type.
Values
Value Range Default Value
Created CAR ID -
Configuration Guidelines
The created flow can be bound with the created CAR policy only. For this reason, you can select
the value from the created CAR ID.
Values
Value Range Default Value
Created CoS ID -
Configuration Guidelines
The created flow can be bound with the created CoS policy only. For this reason, you can select
the value from the created CoS ID.
Values
Value Range Default Value
1-65535 1
Configuration Guidelines
You can set this parameter to any value in the value range as required. A CAR maps a CAR ID.
Values
Value Range Default Value
Value Description
Configuration Guidelines
You can set this parameter to Enabled or Disabled, depending on whether to enable the CAR
to limit the traffic volume.
Values
Value Range Default Value Unit
Configuration Guidelines
Based on the actual requirement of QoS, you can set a proper value for Committed Information
Rate.
Generally, the value of Committed Information Rate is not less than the expected average rate
of transmitting the flow.
Values
Value Range Default Value Unit
0-32 0 Kbyte
Configuration Guidelines
Based on the actual requirements of QoS, you can set a proper value for Committed Burst Size
(kbyte).
Generally, the value of Committed Burst Size (kbyte) is not less than the possible size of
expected burst data flow to be transmitted.
If the traffic volume is greater than the value of Peak Information Rate (kbit/s), the excessive
traffic is discarded.
Values
Value Range Default Value Unit
Configuration Guidelines
Based on the actual requirement of QoS, you can set a proper value for Peak Information Rate
(kbit/s).
The value of Peak Information Rate (kbit/s) should not be less than the guarantee bandwidth.
Generally, the value of Peak Information Rate (kbit/s) is not greater than the expected
maximum rate of transmitting the flow.
Values
Value Range Default Value Unit
0-32 0 kbyte
Configuration Guidelines
Based on the actual requirement of QoS, you can set a proper value for Maximum Burst Size
(kbyte).
Generally, the value of Maximum Burst Size (kbyte) is not greater than the size of burst data
flow to be transmitted.
Values
The value ranges for each type of board is as follows:
1-65535 1
Configuration Guidelines
You can set this parameter to any value in the value range as required. A CoS maps a CoS ID.
Values
Value Range Default Value
Value Description
VLAN priority Assigns the CoS Priority based on the VLAN priority.
DSCP Assigns the CoS Priority based on the DSCP field in the IP
packet header.
IPTOS Assigns the CoS Priority based on the TOS field in the IP
packet header.
Configuration Guidelines
Based on the requirements of QoS, set a proper value for CoS Type.
Values
For the CoS of the Simple type, follow Table 7-5 to set a simple CoS Priority.
For the CoS of the VLAN Priority type, follow Table 7-6 to set the mapping from VLAN
Priority to CoS Priority.
For the CoS of the DSCP type, follow Table 7-7 to set the mapping from DSCP Priority to CoS
Priority.
For the CoS of the IPTOS type, follow Table 7-8 to set the mapping from IPTOS Priority to
CoS Priority.
Configuration Guidelines
Based on the requirements, you can map the packets into different queues by setting CoS
Priority.
If CoS Type is set to VLAN Priority, IPTOS or DSCP, generally, you can map the packets
into the proper CoS Priority according to the priority information contained in the packets.
At the application layer, if a service (for example, VOIP, video conference, video conferencing
call, and video on demand) has higher requirements for QoS, set a higher priority for the service
to get better bandwidth and service guarantee. To ensure good bandwidth multiplexing, be sure
to avoid a larger ratio of real-time services in the network. For a service (for example, Internet
access, E-Mail, and FTP) that has lower requirements for QoS, set a lower priority for the service
to provide better bandwidth sharing and contention mechanism.
Values
Valid Values Default Value
Configuration Guidelines
If the value of Port Priority is smaller, the priority is higher.
When using a port to carry the services, set Port Priority to a smaller value. Otherwise, set Port
Priority to a greater value.
the system priority of the link aggregation group is the same at the two ends, the system MAC
addresses are compared. A MAC address is used if it is of lower value.
If the value of System Priority is smaller, the system priority of the link aggregation group is
higher.
Values
Valid Values Default Value
Configuration Guidelines
To take the result selected by the static link aggregation group as the actual value, set System
Priority to a smaller value.
Values
Valid Values Default Value
Value Description
Value Description
Out of Service Indicates that the port cannot carry the service.
Configuration Guidelines
This parameter is used for query only. No rules are provided for selecting a value.
Values
Value Range Default Value
Value Description
Sharing Indicates that the ports in the aggregation group share the
service.
Non-Sharing Indicates that the ports in the aggregation group do not share
the service. Only one port in the aggregation group carries the
service.
Configuration Guidelines
If the bandwidth needs to be increased and several ports need to be enabled to share the service,
select the load sharing mode. If only one port needs to carry the service and protection is required
for this port, select the load non-sharing mode.
Values
Value Range Default Value
Configuration Guidelines
The user can set this parameter according to the actual service requirement.
Related Information
The rapid spanning tree protocol (RSTP) can realize all the functions of the spanning tree. Similar
to the STP, the RSTP avoids temporary loops. Different from the STP, the RSTP shortens the
time delay at the ports from blocking to forwarding, restores the network connectivity more
rapidly, and provides better services.
l The STP is a Layer 2 management protocol that avoids Layer 2 loops by selectively
blocking redundant network links and supports the link backup.
l The RSTP develops from the STP and shortens the convergence time.
Values
Value Range Default Value
Configuration Guidelines
The RSTP and STP can be configured at the same time. The RSTP is compatible with the STP.
It is recommended that you use the default value RSTP.
Values
Value Range Default Value
Configuration Guidelines
Set this parameter according to what role the user expects the bridge to play in the spanning tree
topology.
Values
Value Range Default Value Unit
6-40 20 s
Configuration Guidelines
When you set the value of this parameter, ensure that the following requirement is met:
The bridge time consists of the following parts: forward delay of the bridge, handshake time of
the bridge, maximum bridge aging time, and message aging time (0). The Hello Time parameter
is equivalent to the bridge handshake time.
Values
Value Range Default Value Unit
1-10 2 s
Configuration Guidelines
When you set the value of this parameter, ensure that the following requirement is met:
2 x (Hello Time + 1) ≤ Max Age ≤ 2 x (Forward Delay - 1)
Values
Value Range Default Value Unit
4-30 15 s
Configuration Guidelines
When you set the value of this parameter, ensure that the following requirement is met:
2 x (Hello Time + 1) ≤ Max Age ≤ 2 x (Forward Delay - 1).
Values
Value Range Default Value
1-10 times/s 6
Configuration Guidelines
Set this parameter according to the actual requirement of the user. It is recommended that you
use the default value.
The network segment in each LAN has the root path cost. The root path cost of the network
segment is equal to the root path cost of the bridge whose cost is the smallest among all the
bridges that are connected to the network segment through the bridge ports. In this case, the
bridge whose cost is the smallest is selected as the designated bridge. If the root path cost values
of two or more bridges are the same and the smallest, the bridge with a higher priority is selected
as the root bridge.
In the case of non-root bridges, the root path cost of each bridge is equal to the sum of path cost
values of each port on the other bridges that a non-root bridge passes when the bridge receives
the frame from the root bridge along the minimum cost path. That is, the value of the root path
cost is the sum of the path cost values of all bridges.
Values
Based on the protocol, the value of this parameter is calculated according to the network
topology. This parameter is used for querying.
Configuration Guidelines
There are no principles for setting the value of this parameter because this parameter is used for
querying.
Values
This parameter is used for querying.
Configuration Guidelines
There are no principles for setting the value of this parameter because this parameter is used for
querying.
7.77 Port ID
Description
The Port ID parameter contains 16 bits, which show the port priority and the unique port number
in the bridge. The first eight bits indicate the port priority, and the later eight bits indicate the
port number. The port ID represents the priority in the spanning tree. If the value of the port ID
is smaller, the port priority in the bridge is higher. To enable the RSTP to be compatible with
the STP, the port priority is represented by eight bits, of which the later four bits are 0 for easy
management.
Values
The parameter value is in decimal system. For example, Port ID = 32769.
If the port priority is smaller, the port ID is smaller. When the port priorities are the same, the
port ID is smaller if the port number is smaller.
Values
Value Range Default Value
1-65535 0
Value Description
1-65535 Indicates the cost required by the transmission of the bridge port.
Configuration Guidelines
If the port rate is greater, the designed path cost is smaller. It is recommended that you use the
default value.
Values
Value Range Default Value
0-65535 32768
Configuration Guidelines
There are no specific principles for setting the value of this parameter because this parameter is
used for querying.
Values
Value Range Default Value
0-61440 32768
Configuration Guidelines
If the value of the parameter is smaller, the priority of the bridge is higher. Set this parameter
according to the actual network condition.
To ensure that the bridge protocols operate normally, the following requirements should be met:
l The multicast MAC address must be unique and be identified by all the bridges in the LAN.
The multicast MAC address identifies the protocol entities of a bridge that is connected to
different and individual physical network segments.
l Each bridge has a unique ID in the entire LAN.
l Ports on a bridge have port IDs, which are different from each other. Ports IDs of different
bridges are different. The values of these IDs can be assigned independently. The values
can also be used by other bridges.
l Each bridge must provide the values of the parameters that are described previously or
provide the mechanism for assigning values for these parameters.
Values
Value Range Default Value
Configuration Guidelines
It is recommended that you use the default value.
Values
Value Range Default Value
Value Description
Enabled Indicates that the edge port function is enabled. In this case,
the port can enter the forwarding state directly without any
delay during the calculation process of the state machine.
Configuration Guidelines
The user can set this parameter according to the network topology to reduce the delay in the case
of a state migration of the network edge port.
Values
Valid Values Default Value
Value Description
Shared media If the port has the non-point-to-point attribute, the port state
cannot be transited rapidly.
Link connection If the port has the point-to-point attribute, the port state can
be transited rapidly.
Configuration Guidelines
If the port connection mode is known, select Shared media or Link connection. Otherwise,
select Adaptive connection.
Values
Value Range Default Value
Value Description
Configuration Guidelines
You can set Enabling LCAS as required.
Values
Value Range Default Value
Value Description
Huawei Mode Inverts the RS_Ack message, and then transmits the MST
message.
Standard Mode Transmits the MST message, and then Inverts the RS_Ack
message.
Configuration Guidelines
To set the LCAS mode, follow the principles:
l If the interconnected equipment at the two ends are Huawei equipment, select Huawei
Mode.
l If Huawei equipment is interconnected to a third-party equipment, set the interconnected
equipment to the same mode according to the mode supported by the third-party equipment.
For example, if both the MSP and the LCAS are available in a network, set the LCAS hold off
time to 2000 ms. If the network fails, only the MSP switching occurs, but the LCAS switching
does not occur.
Values
Value Range Default Value Unit
Configuration Guidelines
The User can set this parameter according to the expected hold off time of LCAS switching.
Values
Value Range Default Value Unit
Configuration Guidelines
The User can set this parameter according to the expected WTR duration of LCAS recovery.
member has excessive B3 or BIP bit errors, the LCAS protocol regards that this member fails
and deletes it from the available members. If this parameter is set to Disabled, the LCAS protocol
does not monitor the status of the B3 or BIP bit errors of a VCTRUNK member.
Values
Value Range Default Value
Configuration Guidelines
You can set whether to enable the TSD as required.
Values
Value Range Default Value
2-256 256
Configuration Guidelines
Set this parameter according to the actual requirement of the user.
7.90 LPT
Description
The LPT parameter specifies whether the link state pass through (LPT) function is enabled. The
LPT is a technology developed by Huawei to increase the speed of the link state response.
Through the LPT protocol, the faults on the service access point and in the intermediate network
can be detected and reported.
Values
Value Range Default Value
Yes, No No
Value Description
Configuration Guidelines
Set this parameter according to the actual requirement of the user. Set this parameter to Yes if
the LPT function is required.
Values
Value Range Default Value
Value Description
Configuration Guidelines
Set this parameter according to the actual requirement of the user. Ensure that the configurations
of the two interconnected ports are consistent.
Values
Value Range Default Value Unit
Configuration Guidelines
Set this parameter according to the actual requirement of the user.
Values
Value Range Default Value Unit
0-100000 0 ms
Configuration Guidelines
Set this parameter according to the actual requirement of the user.
This parameter specifies whether to enable the IGMP Snooping protocol within the specified
virtual bridge (VB).
Values
Valid Values Default Value
Value Description
Configuration Guidelines
l To create and maintain a multicast service, select Enabled.
l Otherwise, select Disabled.
Values
Valid Values Default Value Unit
Configuration Guidelines
Generally, select the default value, unless otherwise specified. Otherwise, set the value according
to the requirements. Do not set the value beyond the range allowed by the board.
Values
Value Range Default Value Unit
0-255 0 Unit
Configuration Guidelines
The user can set the number of test packets to be transmitted as required.
7.97 Status
Description
Status indicates the transmit status of the current test frames at the port. This parameter is
displayed as the current test status after you configure Send Mode and Frames to Send and
then click Apply.
Values
Value Range Default Value
Value Description
Sending Indicates that the port is currently transmitting the test frames.
Finished Sending Indicates that the port finishes transmitting the test frames.
Configuration Guidelines
None.
Values
For example, the parameter value 5indicates that the port transmits five test frames.
Configuration Guidelines
None.
Values
For example, the parameter value 5indicates that this port receives five response test frames.
Configuration Guidelines
None.
Values
For example, the parameter value 5indicates that the port receives five test frames.
Configuration Guidelines
None.
Values
Valid Values Default Value
Value Description
Burst Mode Indicates that the system transmits a test frame every one
second. The test ends after a specified number of test frames
are transmitted.
Continue Mode Indicates that the system continuously transmits test frames
with a frequency of 1 frame per second.
Configuration Guidelines
Set this parameter according to the requirements of the test.
Values
Valid Values Default Value Unit
1-9 9 s
Configuration Guidelines
For all the network elements (NEs) that communicate with each other over the orderwire phone,
this parameter must be set to the same value.
l If the number of NEs is less than 30, usually, set the value to 5 seconds.
l If the number of NEs is not less than 30, usually, set the value to 9 seconds.
Values
Valid Values Default Value
100-99999999 999
Configuration Guidelines
l For orderwire conference calls on each node of the same subnet, the phone number must
be the same.
l The length of an orderwire conference call number can be set as required. The value range
is 3-8.
l The length of an orderwire conference call number must be consistent with that of the
addressing call number.
7.104 Phone
Description
The Phone parameter specifies the phone numbers of orderwire addressing calls. An addressing
call refers to a point-to-point call.
Values
Valid Values Default Value
100-99999999 101
Configuration Guidelines
l The phone numbers of orderwire addressing calls cannot be duplicate within the same
subnet.
l The length of an orderwire call number can be set as required. The value range is 3-8.
Within the same orderwire network, the length of orderwire call numbers must be consistent
for each node.
l The length of phone numbers used to make orderwire addressing calls must be consistent
with that of conference call numbers.
NOTE
For example, if the length of a phone number is set to contain three digits, the addressing call
number is changed to the default number 101. If the length of the phone number is set to contain
four digits, the addressing call number is changed to the default number 1001, and the rest may
be deduced by analogy.
Values
Valid Values Default Value
Value Description
Configuration Guidelines
None.
Values
Valid Values Default Value
1-88 -
Configuration Guidelines
None.
Values
Valid Values Default Value
F1, Bid-BidType-PortID -
Value Description
Bid-BidType-PortID Indicates a port that can be used to set a slot of the F1 data
port.
Configuration Guidelines
When using the F1 data port, you need to configure its route. That is, set the 64 Kbit/s data being
added to or dropped from the NE, or passing through the NE.
Values
Valid Values Default Value
Value Description
Configuration Guidelines
Select the value according to the configuration.
Values
Value Valid Values
RS232 RS232
Value Description
Configuration Guidelines
None.
Values
Valid Values Default Value
Value Description
Bid-BidType-PortID Indicates a port that is used to set a slot of the F1 data port.
Configuration Guidelines
Select the value according to the configuration.
Values
Valid Values Default Value
SERIALx, Bid-BidType- -
PortID
Value Description
Bid-BidType-PortID Indicates a port that is used to set a slot of the F1 data port.
Configuration Guidelines
Select the value according to the configuration.
Values
Value Range Default Value
Parameter Description
Synchronization Quality Indicates that the synchronous source is unavailable when the
Unavailable S1 byte contains 0x0f.
Configuration Guidelines
In actual application, this parameter can be set according to the requirements of the opposite NE
that connects to the specific external clock. By default, this parameter is set to Shut off.
Related Information
None.
Values
Value Range Default Value
Value Description
2 MHz Indicates that the output mode of the external clock source is
set to 2 MHz. That is, the external clock source outputs 2 MHz
clock signals.
2 Mbit/s Indicates that the output mode of the external clock source is
set to 2 Mbit/s.
Configuration Guidelines
The input mode of the two channels of external clock signals can be set to 2 MHz or 2 Mbit/s.
The default input mode is 2 Mbit/s. In actual application, make sure that the output mode matches
the input mode on the receive end.
Related Information
None.
Values
Value Range Default Value
Value Description
All versions Indicates that the S1 byte is transmitted through all timeslots
of the external clock interface.
Configuration Guidelines
None.
Related Information
None.
Values
Value Range Default Value
Value Description
Not Inferior to G.813 SETS Signal Indicates that the external clock source becomes
invalid when its output quality is inferior to the G.813
signal.
Not Inferior to G.812 Local Clock Indicates that the external clock source becomes
Signal invalid when its output quality is inferior to the G.812
local clock signal.
Not Inferior to G.812 Transit Clock Indicates that the external clock source becomes
Signal invalid when its output quality is inferior to the G.812
transit office clock signal.
Not Inferior to G.811 Clock Signal Indicates that the external clock source becomes
invalid when its output quality is inferior to the G.811
signal.
Configuration Guidelines
The output quality of the external clock source should not be inferior to the specified quality
threshold. Therefore, the quality threshold should be set to a value that is inferior to or equal to
the output clock quality level.
Related Information
None.
Values
Value Range Default Value
Value Description
LOF Indicates that the failure condition is set to an LOF alarm. The
2M phase-lock source becomes invalid when an LOF alarm
of external clock signal occurs.
AIS OR LOF Indicates that the failure condition is set to an AIS alarm or
LOF alarm. The 2M phase-lock source becomes invalid when
an AIS or LOF alarm of external clock signal occurs.
Configuration Guidelines
Failure condition can be set as required.
Related Information
None.
Values
Value Range Default Value
Value Description
Shut Down Output Indicates that the output of external clock signal is shut down.
Send AIS Indicates that the external clock sends all "1"s signals.
2M Output S1 Byte Indicated that the S1 byte sent by the external clock is
Unavailable unavailable. That is, the external clock sends 0x0f.
Configuration Guidelines
When the 2M phase-locked source is invalid, output action can be set as required. When the
External Clock Output Mode parameter is set to 2 MHz, the output of external clock signal
is shut down no matter what action is set.
Related Information
None.
Values
Value Range Default Value
Value Description
G.813 SETS Signal Indicates that the lower threshold is not inferior to the
G.813 SETS signal.
G.812 Lock Clock Signal Indicates that the lower threshold is not inferior to the
G.812 lock clock signal.
G.812 Transit Clock Signal Indicates that the lower threshold is not inferior to the
G.812 transit clock signal.
G.811 Clock Signal Indicates that the lower threshold is not inferior to the
G.811 clock signal.
Configuration Guidelines
In actual application, the output quality threshold of external clock source should be determined
according to the quality information about the NE clock and the opposite NE.
Related Information
None.
Values
Value Range Default Value
Yes, No No
Value Description
Configuration Guidelines
It is recommended to set the AIS alarm as the condition for triggering clock source switching
in actual application to ensure system performance.
Related Information
None.
Values
Value Range Default Value
Yes, No No
Value Description
Configuration Guidelines
A B1 BER threshold-crossing alarm indicates that the transmitted signal and the clock in the
signal are being interfered. Therefore, this parameter can be set as a condition for triggering
clock source switching in actual application to ensure system performance.
Related Information
None.
Values
Value Range Default Value
Yes, No No
Value Description
Configuration Guidelines
A B2-EXC alarm indicates that the transmitted signal and the clock in the signal are being
interfered. Therefore, this parameter can be set as a condition for triggering clock source
switching in actual application to ensure system performance.
Related Information
None.
Values
Value Range Default Value
Value Description
Configuration Guidelines
If the conditions for clock source switching are properly set and the switching of clock sources
can be guaranteed, the Auto-Revertive mode can be selected to improve clock quality.
Otherwise, the Non-Revertive mode is recommended to avoid clock jitters.
Related Information
None.
Values
Value Range Default Value
0-12 5
Configuration Guidelines
The WRT time is counted in minutes. The shorter the WTR time is, the faster the clock is
recovered, and the higher the average clock quality is. On the other hand, the shorter the WTR
time is, the more likely the clock jitters are caused due to unstable clock signals. Therefore, do
not set the WTR time to 0 in actual application.
Related Information
None.
Values
Value Range Default Value
Value Description
Configuration Guidelines
None.
Related Information
None.
Values
Value Range Default Value
Value Description
Clock Source in System Indicates that the system clock priority table contains the
Clock Priority Table tributary clock sources, line clock sources, external clock
sources, and internal clock sources.
Configuration Guidelines
The OptiX OSN 550 does not support External Clock Source.
Related Information
None.
Values
Value Range Default Value
Synchronous Source -
Unavailable, Quality Unknown,
G.811 Reference Clock, G.812
Transit Clock, G.812 Local
Clock, SDH equipment timing
source (SETS) signal
Value Description
Synchronous Source Indicates that the SSM protocol is disabled and the S1 byte
Unavailable synchronization quality information output by the
synchronous source is not available.
Quality Unknown Indicates that the SSM protocol is started but the S1 byte
synchronization quality information output by the
synchronous source is unknown.
G.811 Reference Clock Indicates that the SSM protocol is started and the S1 byte
synchronization quality information output by the
synchronous source is the G.811 reference clock.
G.812 Transit Clock Indicates that the SSM protocol is started and the S1 byte
synchronization quality information output by the
synchronous source is the G.812 transit clock.
G.812 Local Clock Indicates that the SSM protocol is started and the S1 byte
synchronization quality information output by the
synchronous source is the G.812 local clock.
SDH equipment timing Indicates that the SSM protocol is enabled and the S1 byte
source (SETS) signal synchronization quality information output by the
synchronous source is the synchronous equipment timing
source (SETS) clock.
Configuration Guidelines
None.
Related Information
None.
Values
Value Range Default Value
Value Description
Normal Mode Indicates that the NE clock works in the tracing mode. That is, the
NE clock traces and locks the working mode of its upper-level
clock.
Holdover Mode Indicates that the NE clock works in the holdover mode. That is,
in this mode, the NE clock uses the frequency information that is
stored before all timing reference signals are lost as its timing
reference.
Free-Run Mode Indicates that the NE clock works in the free-run mode. That is,
the internal oscillator works in this mode when all external timing
reference signals are lost.
Configuration Guidelines
None.
Related Information
None.
Values
Value Range Default Value
Value Description
Normal Data Output Mode Indicates the normal data output mode. The duration of this
output mode is determined by the phase lock. This data output
mode can continue for a maximum of 24 hours.
Keep the Latest Data Indicates that the latest phase-locked data is kept. This data
output mode is a forced holdover mode.
Configuration Guidelines
The Keep the Latest Data mode is a forced holdover mode. Therefore, the clock accuracy is not
high. In actual application, the Normal Data Output mode is recommended.
Related Information
None.
Values
Value Range Default Value
Value Description
Retiming Mode of Tributary Indicates that the tributary clock is used as the retiming
Clock clock.
Retiming Mode of Cross- Indicates that the cross-connect (external) clock is used as
Connect Clock the retiming clock.
Configuration Guidelines
Select the proper clock according to the actual networking planning of the user.
The OptiX OSN equipment supports only Retiming Mode of Tributary Clock.
Values
Value Range Default Value
Value Description
Dual-Ended Switching Indicates that the transmit end does not transmit signals
to the broken fiber after the switching occurs at the
transmit end and at the receive end.
Configuration Guidelines
In the case of the 1+1 MSP, you can set this parameter to Single-Ended Switching or Dual-
Ended Switching. In the case of the 1:N MSP, you can set this parameter to Dual-Ended
Switching only.
A.1 Numerics
A.2 A
A.3 B
A.4 C
A.5 D
A.6 E
A.7 F
A.8 G
A.9 H
A.10 I
A.11 J
A.12 L
A.13 M
A.14 N
A.15 O
A.16 P
A.17 Q
A.18 R
A.19 S
A.20 T
A.21 U
A.22 V
A.23 W
A.1 Numerics
1+1 protection An architecture that has one normal traffic signal, one working SNC/trail, one protection
SNC/trail and a permanent bridge. At the source end, the normal traffic signal is
permanently bridged to both the working and protection SNC/trail. At the sink end, the
normal traffic signal is selected from the better of the two SNCs/trails. Due to the
permanent bridging, the 1+1 architecture does not allow an extra unprotected traffic
signal to be provided.
100BASE-T IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area network.
100BASE-TX IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
10BASE-T An Ethernet specification that uses the twisted pair cable with the transmission speed as
10 Mbit/s and the transmission distance as 100 meters.
1:N protection An architecture that has N normal service signals, N working SNCs/trails, and one
protection SNC/trail. It may have one extra service signal.
1PPS Pulse per second, which, strictly speaking, is not a time synchronization signal. This is
because 1PPS provides only the "gauge" corresponding to the UTC second, but does not
provide the information about the day, month, or year. Therefore, 1PPS is used as the
reference for frequency synchronization. On certain occasions, 1PPS can also be used
on other interfaces for high precision timing.
3R Reshaping, Retiming, Regenerating.
A.2 A
ABR Available Bit Rate
AC Alternating Current
ACAP A channel configuration method, which uses two adjacent channels (a horizontal
polarization wave and a vertical polarization wave) to transmit two signals.
Active/Standby The process in which the standby cross-connect board automatically takes the place of
switching of cross- the active one. If there are two cross-connect boards on the SDH equipment, which are
connect board in hot back-up relation of each other, the operation reliability is improved. When both
the cross-connect boards are in position, the one inserted first is in the working status.
Unplug the active board, the standby one will run in the working status automatically.
When the active cross-connect board fails in self-test, the board is pulled out, the board
power supply fails or the board hardware operation fails, the standby cross-connect board
can automatically take the place of the active one.
add/drop multiplexer Network elements that provide access to all or some subset of the constituent signals
contained within an STM-N signal. The constituent signals are added to (inserted), and/
or dropped from (extracted) the STM-N signal as it passed through the ADM.
ADM See add/drop multiplexer
Administrative Unit The information structure which provides adaptation between the higher order path layer
and the multiplex section layer. It consists of an information payload (the higher order
VC) and a AU pointer which indicates the offset of the payload frame start relative to
the multiplex section frame start.
Administrative Unit One or more administrative units occupying fixed, defined positions in an STM payload.
Group An AUG consists of AU-4s.
Administrator A user who has authority to access all the Management Domains of the product. He or
she has access to the whole network and to all the management functionalities.
Aging time The time to live before an object becomes invalid.
AIS Alarm Indication Signal
Alarm A message reported when a fault is detected by a device or by the network management
system during the process of polling devices. Each alarm corresponds to a recovery
alarm. After a recovery alarm is received, the status of the corresponding alarm changes
to cleared.
Alarm automatic A function wherein an alarm generated on the device side is immediately and
report automatically reported to the NMS. After an alarm is reported, an alarm panel prompts,
and the user can view the details of the alarm.
alarm cable The cable for generation of visual or audio alarms.
alarm filtering An alarm management method. Alarms are detected and reported to the NMS system,
and whether the alarm information is displayed and saved is decided by the alarm filtering
status. An alarm with the filtering status set to "Filter" is not displayed and saved on the
NMS, but is monitored on the NE.
alarm indication A function that indicates the alarm status of an NE. On the cabinet of an NE, there are
four indicators in different colors indicating the current alarm status of the NE. When
the green indicator is on, the NE is powered on. When the red indicator is on, a critical
alarm is generated. When the orange indicator is on, a major alarm is generated. When
the yellow indicator is on, a minor alarm is generated. The ALM alarm indicator on the
front panel of a board indicates the current status of the board.
Alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
Alarm inversion For the port that has already been configured but has no service, this function can be
used to avoid generating relevant alarm information, thus preventing alarm interference.
The alarm report condition of the NE port is related to the alarm inverse mode (not
inverse, automatic recovery and manual recovery) setting of the NE and the alarm
inversion status (Enable and Disable) setting of the port. When the alarm inversion mode
of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever
the inversion status of the port is. When the alarm inversion mode of the NE is set to
automatic recovery, and the alarm inversion state of the port is set to Enabled, then the
alarm of the port will be suppressed. The alarm inversion status of the port will
automatically recover to "not inverse" after the alarm ends. For the port that has already
been configured but not actually loaded with services, this function can be used to avoid
generating relevant alarm information, thus preventing alarm interference. When the
alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion
status of the port is set as Enable, the alarm of the port will be reported.
Alarm Masking An alarm management method. Alarms that are set to be masked are not displayed on
the NMS or the NMS does not monitor unimportant alarms.
Alarm Severity The significance of a change in system performance or events. According to ITU-T
recommendations, an alarm can have one of the following severities: Critical, Major,
Minor, Warning.
Alarm suppression An alarm management method. Alarms that are set to be suppressed are not reported
from NEs any more.
ALS See Automatic laser shutdown
APS See Automatic Protection Switching
asynchronous Pertaining to, being, or characteristic of something that is not dependent on timing.
Asynchronous A protocol for the transmission of a variety of digital signals using uniform 53 byte cells.
Transfer Mode A transfer mode in which the information is organized into cells; it is asynchronous in
the sense that the recurrence of cells depends on the required or instantaneous bit rate.
Statistical and deterministic values may also be used to qualify the transfer mode.
ATM See Asynchronous Transfer Mode
ATPC See Automatic Transmit Power Control
attenuation Reduction of signal magnitude or signal loss, usually expressed in decibels.
AU See Administrative Unit
AUG See Administrative Unit Group
auto-negotiation An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices to
automatically exchange information over a link about speed and duplex abilities..
Automatic laser A technique (procedure) to automatically shutdown the output power of laser transmitters
shutdown and optical amplifiers to avoid exposure to hazardous levels.
Automatic Protection Capability of a transmission system to detect a failure on a working facility and to switch
Switching to a standby facility to recover the traffic.
Automatic Transmit A method of adjusting the transmit power based on fading of the transmit signal detected
Power Control at the receiver.
A.3 B
backplane An electronic circuit board containing circuits and sockets into which additional
electronic devices on other circuit boards or cards can be plugged.
backup A periodic operation performed on the data stored in the database for the purposes of
database recovery in case that the database is faulty. The backup also refers to data
synchronization between active and standby boards.
bandwidth A range of transmission frequencies that a transmission line or channel can carry in a
network. In fact, it is the difference between the highest and lowest frequencies the
transmission line or channel. The greater the bandwidth, the faster the data transfer rate.
BDI Backward Defect Indicator
BER See Bit Error Rate
BER tester Used to measure the bit error rate (BER) of signals during transmission.
Binding strap The binding strap is 12.7 mm wide, with one hook side (made of transparent
polypropylene material) and one mat side (made of black nylon material).
BIP A method of error monitoring. With even parity an X-bit code is generated by equipment
at the transmit end over a specified portion of the signal in such a manner that the first
bit of the code provides even parity over the first bit of all X-bit sequences in the covered
portion of the signal, the second bit provides even parity over the second bit of all X-bit
sequences within the specified portion, and so on. Even parity is generated by setting the
BIP-X bits so that there is an even number of 1s in each monitored partition of the signal.
A monitored partition comprises all bits which are in the same bit position within the X-
bit sequences in the covered portion of the signal. The covered portion includes the BIP-
X.
Bit error An incompatibility between a bit in a transmitted digital signal and the corresponding
bit in the received digital signal.
Bit Error Rate Ratio of received bits that contain errors. BER is an important index used to measure the
communications quality of a network.
BITS See Building Integrated Timing Supply
bound path A parallel path with several serial paths bundled together. It improves the data throughput
capacity.
BPDU See Bridge Protocol Data Unit
BPS Board Protection Switching
bridge A device that connects two or more networks and forwards packets among them. Bridges
operate at the physical network level. Bridges differs from repeaters because bridges
store and forward complete packets, while repeaters forward all electrical signals.
Bridges differ from routers because bridges use physical addresses, while routers use IP
addresses.
Bridge Protocol Data The data messages that are exchanged across the switches within an extended LAN that
Unit uses a spanning tree protocol (STP) topology. BPDU packets contain information on
ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
broadcast The process of sending packets from a source to multiple destinations. All the ports of
the nodes in the network can receive packets.
Broadcast A means of delivering information to all members in a network. The broadcast range is
determined by the broadcast address.
BSC Base Station Controller
BSS Base Station Subsystem
Build-in WDM A function which integrates some simple WDM systems into products that belong to the
OSN series. That is, the OSN products can add or drop several wavelengths directly.
Building Integrated In the situation of multiple synchronous nodes or communication devices, one can use
Timing Supply a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
BWS Backbone WDM System
A.4 C
cabling The method by which a group of insulated conductors is mechanically assembled or
twisted together.
cable trough The trough which is used for cable routing in the cabinet.
captive nut See Floating nut
CAR See committed access rate
CAS Channel Associated Signaling
CBR See Constant Bit Rate
CBS Committed Burst Size
CCDP Co-Channel Dual Polarization
CCM Continuity Check Message
CDR Clock and Data Recovery
CDVT See Cell Delay Variation Tolerance
Cell Delay Variation This parameter measures the tolerance level a network interface has to aggressive
Tolerance sending (back-to-back or very closely spaced cells) by a connected device, and does not
apply to end-systems.
Centralized alarm The system that gathers all the information about alarms into a certain terminal console.
system
CES See circuit emulation service
CFM Connectivity Fault Management
Chain network One type of network that all network nodes are connected one after one to be in series.
channel A telecommunication path of a specific capacity and/or at a specific speed between two
or more locations in a network. Channels can be established through wire, radio
(microwave), fiber or a combination of the three. The amount of information transmitted
per second in a channel is the information transmission speed, expressed in bits per
second. For example, b/s, kb/s, Mb/s, Gb/s, and Tb/s.
CIR Committed Information Rate
Circuit A combination of two transmission channels permitting transmission in both directions
between two points.
circuit emulation A function with which the E1/T1 data can be transmitted through ATM networks. At the
service transmission end, the interface module packs timeslot data into ATM cells. These ATM
cells are sent to the reception end through the ATM network. At the reception end, the
interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES
technology guarantees that the data in E1/T1 timeslots can be recovered to the original
sequence at the reception end.
CIST Common and Internal Spanning Tree
Class of Service CoS is a rule for queuing. It classifies the packets according to the service type field or
the tag in packets, and specifies different priorities for them. All the nodes in DiffServ
domain forwards the packets according to their priorities.
client A device that sends requests, receives responses, and obtains services from the server.
Clock Synchronization Also called frequency synchronization. The signal frequency traces the reference
frequency, but the start point does not need to be consistent.
Clock tracing The method to keep the time on each node being synchronized with a clock source in a
network.
CLP Cell Loss Priority
CM See Configuration Management
committed access rate A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be classified
into Quality of Service (QoS) groups, and by which the input or output transmission rate
can be defined.
Concatenation A process that combines multiple virtual containers. The combined capacities can be
used a single capacity. The concatenation also keeps the integrity of bit sequence.
Configuration Data A command file defining hardware configurations of an NE. With this file, an NE can
collaborate with other NEs in an entire network. Configuration data is the key factor for
normal running of an entire network.
Configuration A network management function defined by the International Standards Organization
Management (ISO). It involves installing, reinitializing & modifying hardware & software.
Configure To set the basic parameters of an operation object.
congestion An extra intra-network or inter-network traffic resulting in decreasing network service
efficiency.
Connection point A reference point where the output of a trail termination source or a connection is bound
to the input of another connection, or where the output of a connection is bound to the
input of a trail termination sink or another connection. The connection point is
characterized by the information which passes across it. A bidirectional connection point
is formed by the association of a contradirectional pair.
Constant Bit Rate A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
Convergence A process in which multiple channels of low-rate signals are multiplexed into one or
several channels of required signals. It refers to the speed and capability for a group of
networking devices to run a specific routing protocol. It functions to keep the network
topology consistent.
Convergence service A service that provides enhancements to an underlying service in order to meet the
specific requirements of users.
corrugated tube Used to protect optical fibers.
CoS See Class of Service
CPU Central Processing Unit
CRC See Cyclic Redundancy Check
current alarm An alarm not handled or not acknowledged after being handled.
Current Performance Performance data stored currently in a register. An NE provides two types of registers,
Data namely, 15-minute register and 24-hour register, to store performance parameters of a
performance monitoring entity. The two types of registers stores performance data only
in the specified monitoring period.
Cyclic Redundancy A procedure used in checking for errors in data transmission. CRC error checking uses
Check a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each transmission
includes not only data but extra (redundant) error-checking values.
A.5 D
Data Communication A communication network used in a TMN or between TMNs to support the data
Network communication function.
Digital Data Network A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
DC Direct Current
DCC Data Communication Channel
DCD Data Carrier Detect
DCE Data Circuit-terminal Equipment
DCN See Data Communication Network
DDF See Digital Distribution Frame
DDN See Digital Data Network
Defect A limited interruption in the ability of an item to perform a required function.
Delay Measurement The time elapsed since the start of transmission of the first bit of the frame by a source
node until the reception of the last bit of the loopbacked frame by the same source node,
when the loopback is performed at the frame's destination node.
Demultiplexing A process applied to a composite signal formed by multiplexing, for recovering the
original independent signals, or groups of these signals.
Device set A collection of multiple managed devices. By dividing managed devices into different
device sets, users can manage the devices by using the U2000 in an easier way. If an
operation authority over one device set is assigned to a user (user group), the authority
over all the devices in the device set is assigned to the user (user group), thus making it
unnecessary to set the operation authority over all the devices in a device set separately.
It is recommended to configure device set by geographical region, network level, device
type, or another criterion.
Differentiated Services A marker in the header of each IP packet that prompts network routers to apply
Code Point differentiated grades of service to various packet streams. It is specified by the DiffServ
policy proposed by the IETF (Internet Engineering Task Force). This allows Internet and
other IP-based network service providers to offer different levels of service to customers.
DiffServ A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of per-
hop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
Digital Distribution A type of equipment used between the transmission equipment and the exchange with
Frame transmission rate of 2 to 155 Mbit/s to provide the functions such as cables connection,
cable patching, and test of loops that transmitting digital signals.
digital signal A signal in which information is represented by a limited number of discrete states
number of discrete states (for example, high and low voltages) rather than by fluctuating
levels in a continuous stream, as in an analog signal. In the pulse code modulation (PCM)
technology, the 8 kHz sampling frequency is used and a byte contains 8 bits in length.
Therefore, a digital signal is also referred to as a byte-based code stream. Digital signals,
with simple structures and broad bandwidth, are easy to shape or regenerate, and are not
easily affected by external interference.
Distributed Link A board-level port protection technology used to detect unidirectional fiber cuts and to
Aggregation Group negotiate with the opposite end. Once a link down failure occurs on a port or a hardware
failure occurs on a board, the services can automatically be switched to the slave board,
achieving 1+1 protection for the inter-board ports.
DLAG See Distributed Link Aggregation Group
DM See Delay Measurement
DNI See Dual Node Interconnection
domain A logical subscriber group based on which the subscriber rights are controlled.
DSCP See Differentiated Services Code Point
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DSR Data Set Ready
DTE Data Terminal Equipments
DTR Data Terminal Ready
Dual Node DNI provides an alternative physical interconnection point, between the rings, in case
Interconnection of an interconnection failure scenario.
DVB-ASI Digital Video Broadcast- Asynchronous Serial Interface
DVMRP Distance Vector Multicast Routing Protocol
DWDM Dense Wavelength Division Multiplexing
A.6 E
E-AGGR See Ethernet aggregation
Ear bracket A piece of angle plate with holes in it on a rack. It is used to fix network elements or
components.
ECC See Embedded Control Channel
EFM Ethernet in the First Mile
Ethernet Private Line A type of Ethernet service that is provided with dedicated bandwidth and point-to-point
connections on an SDH, PDH, ATM, or MPLS server layer network.
Ethernet virtual A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This
private LAN service service is carried over a shared bridge and point-to-multipoint connections.
Ethernet virtual A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This
private line service is carried over a shared bridge and point-to-point connections.
ETSI European Telecommunications Standards Institute
EVPL See Ethernet virtual private line
EVPLAN See Ethernet virtual private LAN service
Exercise Switching An operation to check whether the protection switching protocol functions properly. The
protection switching is not really performed.
Exerciser - Ring This command exercises ring protection switching of the requested channel without
completing the actual bridge and switch. The command is issued and the responses are
checked, but no working traffic is affected.
Extended ID The number of the subnet that an NE belongs to, for identifying different network
segments in a WAN. The physical ID of an NE is comprised of the NE ID and extended
ID.
extra traffic The traffic that is carried over the protection channels when that capacity is not used for
the protection of working traffic. Extra traffic is not protected.
A.7 F
Failure If the fault persists long enough to consider the ability of an item with a required function
to be terminated. The item may be considered as having failed; a fault has now been
detected.
Fairness A feature in which for any link specified in a ring network, the source node is provided
with certain bandwidth capacities if the data packets transmitted by the source node are
constrained by the fairness algorithm.
fairness algorithm An algorithm designed to ensure the fair sharing of bandwidth among stations in the case
of congestion or overloading.
fault A failure to implement the function while the specified operations are performed. A fault
does not involve the failure caused by preventive maintenance, insufficiency of external
resources or intentional settings.
FC See Fiber Channel
FD See frequency diversity
FDDI See fiber distributed data interface
FDI Forward Defect Indicator
FE Fast Ethernet
feature code Code used to select/activate a service feature (for example, forwarding, using two or
three digit codes preceded by * or 11 or #, and which may precede subsequent digit
selection).
FEC See forwarding equivalence class
A.8 G
Gain The difference between the optical power from the input optical interface of the optical
amplifier and the optical power from the output optical interface of the jumper fiber,
which expressed in dB.
Gateway IP When an NE accesses a remote network management system or NE, a router can be used
to enable the TCP/IP communication. In this case, the IP address of the router is the
gateway IP. Only the gateway NE requires the IP address. The IP address itself cannot
identify the uniqueness of an NE. The same IP addresses may exist in different TCP/IP
networks. An NE may have multiple IP addresses, for example, one IP address of the
network and one IP address of the Ethernet port.
Gateway Network A network element that is used for communication between the NE application layer and
Element the NM application layer.
GE Gigabit Ethernet
Generic Framing A framing and encapsulation method which can be applied to any data type. It has been
Procedure standardized by ITU-T SG15.
GFP See Generic Framing Procedure
A.9 H
half-duplex A transmitting mode in which a half-duplex system provides for communication in both
directions, but only one direction at a time (not simultaneously). Typically, once a party
begins receiving a signal, it must wait for the transmitter to stop transmitting, before
replying.
Hardware loopback A connection mode in which a fiber jumper is used to connect the input optical interface
to the output optical interface of a board to achieve signal loopback.
HDLC High level Data Link Control
HD-SDI See High Definition-Serial Digital Interface signal
HEC Header Error Control
Hierarchical Quality of A type of QoS that controls the traffic of users and performs the scheduling according
Service to the priority of user services. HQoS has an advanced traffic statistics function, and the
administrator can monitor the usage of bandwidth of each service. Hence, the bandwidth
can be allocated reasonably through traffic analysis.
High Definition-Serial High definition video signal transported by serial digital interface.
Digital Interface signal
History alarm The confirmed alarm that has been saved in the memory and other external memories.
Historical performance The performance data that is stored in the history register or that is automatically reported
data and stored on the NMS.
HP Higher Order Path
HPT Higher Order Path Termination
HQoS See Hierarchical Quality of Service
A.10 I
IC Integrated Circuit
IDU Indoor Unit
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IF Intermediate Frequency
IGMP See Internet Group Management Protocol
IGMP Snooping A multicast constraint mechanism running on a layer 2 device. This protocol manages
and controls the multicast group by listening to and analyzing Internet Group
Management Protocol (IGMP) packets between hosts and Layer 3 devices. In this
manner, the spread of the multicast data on layer 2 network can be prevented efficiently.
IMA See Inverse Multiplexing over ATM
IMA frame A control unit in the IMA protocol. It is a logical frame defined as M consecutive cells,
numbered 0 to M-l, transmitted on each of the N links in an IMA group.
Input jitter tolerance The maximum amplitude of sinusoidal jitter at a given jitter frequency, which, when
modulating the signal at an equipment input port, results in no more than two errored
seconds cumulative, where these errored seconds are integrated over successive 30-
second measurement intervals.
Intelligent power A mechanism used to reduce the optical power of all the amplifiers in an adjacent
adjusting regeneration section in the upstream to a safety level if the system detects the loss of
optical signals on the link. If the fiber is broken, the device performance degrades, or the
connector is not plugged well, the loss of optical signals may occur. With IPA,
maintenance engineers will not be hurt by the laser sent out from the slice of broken
fiber.
Interface board area The area for the interface boards on the subrack.
Internal cable The cables and optical fibers which are used for interconnecting electrical interfaces and
optical interfaces within the cabinet.
Internet Group One of the TCP/IP protocols for managing the membership of Internet Protocol multicast
Management Protocol groups. It is used by IP hosts and adjacent multicast routers to establish and maintain
multicast group memberships.
Inverse Multiplexing A technique that involves inverse multiplexing and de-multiplexing of ATM cells in a
over ATM cyclical fashion among links grouped to form a higher bandwidth logical link whose rate
is approximately the sum of the link rates.
IP Internet Protocol
IP address A 32-bit (4-byte) binary digit that uniquely identifies a host (computer) connected to the
Internet for communication with other hosts in the Internet by transferring packets. An
IP address is expressed in dotted decimal notation, consisting of decimal values of its 4
bytes, separated by periods (,), for example, 127.0.0.1. The first three bytes of an IP
address identify the network to which the host is connected, and the last byte identifies
the host itself.
IP over DCC A technology that enables a DCC channel to carry TCP/IP protocol packets. The IP over
DCC technology provides the TCP/IP protocol without using any extra overheads or
service resources to ensure interconnection of management channels.
IPA See Intelligent power adjusting
IS-IS Intermedia System-Intermedia System
ISDN Integrated Services Digital Network
ISO International Standard Organization
ISP Internet Service Provider
IST Internal Spanning Tree
ITU-T International Telecommunication Union Telecommunication Standardization
A.11 J
Jitter Short waveform variations caused by vibration, voltage fluctuations, and control system
instability.
jitter tolerance Jitter tolerance is defined as the peak-to-peak amplitude of sinusoidal jitter applied on
the input ATM-PON signal that causes a 1 dB optical power penalty at the optical
equipment.
A.12 L
Label A short identifier that is of fixed length and local significance. It is used to uniquely
identify the FEC to which a packet belongs. It does not contain topology information. It
is carried in the header of a packet and does not contain topology information.
LACP See Link Aggregation Control Protocol
LAG See link aggregation group
LAN Local Area Network
LAPS Link Access Procedure-SDH
Laser A component that generates directional optical waves of narrow wavelengths. The laser
light has better coherence than ordinary light. The fiber system takes the semi-conductor
laser as the light source.
Layer A concept used to allow the transport network functionality to be described hierarchically
as successive levels; each layer being solely concerned with the generation and transfer
of its characteristic information.
layer 2 switch A data forwarding method. In a LAN, a network bridge or 802.3 Ethernet switch
transmits and distributes packet data based on the MAC address. Since the MAC address
is at the second layer of the OSI model, this data forwarding method is called Layer 2
switch.
LB See Loopback
LBM Loopback Message
LBR Loopback Reply
LC Lucent Connector
LCAS See Link Capacity Adjustment Scheme
LCD Liquid Crystal Display
LCT Local Craft Terminal
License A permission that the vendor provides for the user with a specific function, capacity, and
duration of a product. A license can be a file or a serial number. Usually the license
consists of encrypted codes. The operation authority granted varies with the level of the
license.
Link In the topology view, a link is used to identify the physical or logical connection between
two topological nodes. A link is used to connect signaling points (SPs) and signaling
transfer points (STPs) and transmit signaling messages.
Link Aggregation A method of bundling a group of physical interfaces together as a logical interface to
Control Protocol increase bandwidth and reliability. For related protocols and standards, refer to IEEE
802.3ad.
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC client can treat the link aggregation group as if it were
a single link.
Link Capacity LCAS in the virtual concatenation source and sink adaptation functions provides a
Adjustment Scheme control mechanism to hitless increase or decrease the capacity of a link to meet the
bandwidth needs of the application. It also provides a means of removing member links
that have experienced failure. The LCAS assumes that in cases of capacity initiation,
increases or decreases, the construction or destruction of the end-to-end path is the
responsibility of the network and element management systems.
LLC Logical Link Control
LM See Loss Measurement
Locked switching When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has been
switched, the function enables the service to be restored from the protection channel to
the working channel.
LOF Loss of Frame
LOM Loss of Multiframe
Loopback A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors. The loopback can be a inloop or outloop.
LOS Loss of Signal
Loss Measurement Loss measurement, a method used to collect counter values applicable for ingress and
egress service frames where the counters maintain a count of transmitted and received
data frames between a pair of MEPs.
Lower Threshold A lower performance limit which when exceeded by a performance event counter will
trigger a threshold-crossing event.
LP Lower Order Path
LPT Link State Pass Through
LSP Label Switched Path
LSR Label Switching Router
LT Link Trace
A.13 M
MA See Maintenance Association
MAC Medium Access Control
Maintenance TThat portion of a Service Instance, preferably all of it or as much as possible, the
Association connectivity of which is maintained by CFM. It is also a full mesh of Maintenance
Entities.
Maintenance Domain The network or the part of the network for which connectivity is managed by connectivity
fault management (CFM). The devices in a maintenance domain are managed by a single
Internet service provider (ISP).
MAN See Metropolitan Area Network
Manual switch Switches normal traffic signal to the protection section, unless a failure condition exists
on other sections (including the protection section) or an equal or higher priority switch
command is in effect, by issuing a manual switch request for that normal traffic signal.
Mapping A procedure by which tributaries are adapted into virtual containers at the boundary of
an SDH network.
Marking-off template A quadrate cardboard with four holes. It is used to mark the positions of the installation
holes for the cabinet.
MBS Maximum Burst Size
MCF Message Communication Function
MCR Minimum Cell Rate
MD See Maintenance Domain
Mean launched power The average power of a pseudo-random data sequence coupled into the fiber by the
transmitter.
MEP Maintenance End Point
Metropolitan Area A network that interconnects users with computer resources in a geographic area or
Network region larger than that covered by even a large LAN but smaller than the area covered
by an WAN. The term is applied to the interconnection of networks in a city into a single
larger network (which may then also offer efficient connection to a wide area network).
It is also used to mean the interconnection of several local area networks by bridging
them with backbone lines. The latter usage is also sometimes referred to as a campus
network.
MIB Management Information Base
MIP Maintenance Intermediate Point
MODEM MOdulator-DEModulator
MP Maintenance Point
MPID Maintenance Point Identification
MPLS See Multiprotocol Label Switching
MS Multiplex Section
MSA Multiplex Section Adaptation
MSOH See Multiplex Section Overhead
MSP See Multiplex Section Protection
MST Multiplex Section Termination
MSTI Multiple Spanning Tree Instance
MSTP See Multi-service transmission platform
MSTP See Multiple Spanning Tree Protocol
MTIE Maximum Time Interval Error
A.14 N
NE See network element
NE Explorer The main operation interface, of the network management system, which is used to
manage the telecommunication equipment. In the NE Explorer, the user can query,
manage and maintain the NE, boards, and ports on a per-NE basis.
network element An NE contains both the hardware and the software running on it. One NE is at least
equipped with one system control and communication(SCC) board which manages and
monitors the entire network element. The NE software runs on the SCC board.
network node interface The interface at a network node which is used to interconnect with another network node.
network segment A part of an Ethernet or other network, on which all message traffic is common to all
nodes, that is, it is broadcast from one node on the segment and received by all others.
NLP Normal Link Pulse
NMS Network Management System
NNI See network node interface
NPC Network Parameter Control
A.15 O
OA See Optical Amplifier
OADM See Optical Add/Drop Multiplexer
OAM Operations, Administration and Maintenance
OAM auto-discovery In the case of OAM auto-discovery, two interconnected ports, enabled with the Ethernet
in the First Mile OAM (EFM OAM) function, negotiate to determine whether the mutual
EFM OAM configuration match with each other by sending and responding to the OAM
protocol data unit (OAMPDU). If the mutual EFM OAM configuration match, the two
ports enter the EFM OAM handshake phase. In the handshake phase, the two ports
regularly send the OAMPDU to maintain the neighborhood relation.
OCP See Optical Channel Protection
ODF See Optical Distribution Frame
ODU Outdoor Unit
OFS Out-of-frame Second
OHA Overhead Access Function
OLT Optical Line Terminal
Online Help The capability of many programs and operating systems to display advice or instructions
for using their features when so requested by the user.
ONU Optical Network Unit
OOF Out of Frame
Optical Add/Drop A device that can be used to add the optical signals of various wavelengths to one channel
Multiplexer and drop the optical signals of various wavelengths from one channel.
Optical Amplifier Devices or subsystems in which optical signals can be amplified by means of the
stimulated emission taking place in a suitable active medium.
Optical attenuator A passive device that increases the attenuation in a fiber link. It is used to ensure that the
optical power of the signals received at the receive end is not extremely high. It is
available in two types: fixed attenuator and variable attenuator.
Optical Channel In an optical transmission link that contains multiple wavelengths, when a certain
Protection wavelength goes faulty, the services at the wavelength can be protected if the optical
channel protection is configured.
Optical Connector A component normally attached to an optical cable or a piece of apparatus to provide
frequent optical interconnection/disconnection of optical fibers or cables.
Optical Distribution A frame which is used to transfer and spool fibers.
Frame
A.16 P
Paired slots Two slots of which the overheads can be passed through by using the bus on the
backplane.
pass-through The action of transmitting the same information that is being received for any given
direction of transmission.
Path A performance resource object defined in the network management system. The left end
of a path is a device node whose port needs to be specified and the right end of a path is
a certain IP address which can be configured by the user. By defining a path in the
network management system, a user can test the performance of a network path between
a device port and an IP address. The tested performance may be the path delay, packet
loss ratio or other aspects.
PBS Peak Burst Size
PC Personal Computer
PCM Pulse Code Modulation
PCR Peak Cell Rate
PDH See Plesiochronous Digital Hierarchy
PDU See Power distribution unit
PE See provider edge
Performance register The memory space for performance event counts, including 15-min current performance
register, 24-hour current performance register, 15-min historical performance register,
24-hour historical performance register, UAT register and CSES register. The object of
performance event monitoring is the board functional module, so every board functional
module has a performance register. A performance register is used to count the
performance events taking place within a period of operation time, so as to evaluate the
quality of operation from the angle of statistics.
performance threshold A limit for generating an alarm for a selected entity. When the measurement result
reaches or exceeds the preset alarm threshold, the performance management system
generates a performance alarm.
Permanent Virtual A connection between two ATM end hosts. The connection consists of PVPs between
Connection the ATM end hosts and their respective switches, and SVPs between the switches.
PGND Protection Ground
PGND cable A cable which connects the equipment and the protection grounding bar. Usually, one
half of the cable is yellow, whereas the other half is green.
PIM-SM Protocol Independent Multicast-Sparse Mode
PIR Peak Information Rate
plesiochronous Qualifying two time-varying phenomena, time-scales, or signals in which corresponding
significant instants occur at the same rate, any variations in rate being constrained within
specified limits. Note: Corresponding significant instants are separated by time intervals
having durations which may vary without limit.
Plesiochronous Digital A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
Hierarchy rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
PLL Phase-Locked Loop
Pointer An indicator whose value defines the frame offset of a virtual container with respect to
the frame reference of the transport entity on which this pointer is supported.
POS Packet Over SDH
Power box A direct current power distribution box at the upper part of a cabinet, which supplies
power for the subracks in the cabinet.
Power distribution unit A unit that performs AC or DC power distribution.
PPP Point-to-Point Protocol
PRBS See Pseudo Random Binary Sequence
PRC Primary Reference Clock
Primitive In the hierarchy of signaling system No.7, when the upper layer applies for services from
the lower layer or the lower layer transmits services to the upper layer, the data is
exchanged between the user and the service provider. The data transmitted between
adjacent layers is called primitive.
Private Line A line, such as a subscriber cable and trunk cable, which are leased by the
telecommunication carrier and are used to meet the special user requirements.
Protection path A specific path that is part of a protection group and is labeled protection.
Protection service A specific service that is part of a protection group and is labeled protection.
Protection subnet In the NMS, the protection subnet becomes a concept of network level other than
multiplex section rings or path protection rings. The protection sub-network involves
NEs and fiber cable connections.
Protection View The user interface, of the NMS, which is used to manage protection in the network.
provider edge A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for managing VPN users, establishing LSPs between PEs, and exchanging
routing information between sites of the same VPN. A PE performs the mapping and
forwarding of packets between the private network and the public channel. A PE can be
a UPE, an SPE, or an NPE.
PS Packet Switched
PSD Power Spectral Density
Pseudo Random Binary A sequence that is random in a sense that the value of an element is independent of the
Sequence values of any of the other elements, similar to real random sequences.
Pseudo Wire An emulated connection between two PEs for transmitting frames. The PW is established
and maintained by PEs through signaling protocols. The status information of a PW is
maintained by the two end PEs of a PW.
Pseudo Sire Emulation An end-to-end Layer 2 transmission technology. It emulates the essential attributes of a
edge-to-edge telecommunication service such as ATM, FR or Ethernet in a packet switched network
(PSN). PWE3 also emulates the essential attributes of low speed time division
multiplexing (TDM) circuit and SONET/SDH. The simulation approximates to the real
situation.
PVC See Permanent Virtual Connection
PW See Pseudo Wire
PWE3 See Pseudo Sire Emulation edge-to-edge
A.17 Q
QinQ A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It add a public VLAN
tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to
be transmitted over the service provider’s backbone network based on the public VLAN
tag. This provides a layer 2 VPN tunnel for customers and enables transparent
transmission of packets over private VLANs.
QoS See Quality of Service
Quality of Service A commonly-used performance indicator of a telecommunication system or channel.
Depending on the specific system and service, it may relate to jitter, delay, packet loss
ratio, bit error ratio, and signal-to-noise ratio. It functions to measure the quality of the
transmission system and the effectiveness of the services, as well as the capability of a
service provider to meet the demands of users.
A.18 R
Rapid Spanning Tree An evolution of the Spanning Tree Protocol, providing for faster spanning tree
Protocol convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
A.19 S
S1 byte A byte to transmit network synchronization status information. On an SDH network,
each NE traces hop by hop to the same clock reference source through a specific clock
synchronization path, realizing synchronization on the entire network. If a clock
reference source traced by an NE is missing, this NE will trace another clock reference
source of a lower level. To implement protection switching of clocks in the whole
network, the NE must learn about clock quality information of the clock reference source
it traces. Therefore, ITU-T defines S1 byte to transmit network synchronization status
information. It uses the lower four bits of the multiplex section overhead S1 byte to
indicate 16 types of synchronization quality grades. Auto protection switching of clocks
in a synchronous network can be implemented using S1 byte and a proper switching
protocol.
SAN Storage Area Network
SC Square Connector
SCR Sustainable Cell Rate
SD See space diversity
SD See Signal Degrade
SD See Standard definition
SDH See Synchronous Digital Hierarchy
SDP Serious Disturbance Period
SD-SDI See Standard definition-Serial Digital Interface signal
SEC SDH Equipment Clock
Section The portion of a SONET transmission facility, including terminating points, between (i)
a terminal network element and a regenerator or (ii) two regenerators. A terminating
point is the point after signal regeneration at which performance monitoring is (or may
be) done.
Self-healing A function of establishing a replacement connection by network without the network
management connection function. When a connection failure occurs, the replacement
connection is found by the network elements and rerouted depending on network
resources available at that time.
Serial port extended The ECC channel realized by means of serial port.
ECC
server A network device that provides services to network users by managing shared resources,
often used in the context of a client-server architecture for a LAN.
Service protection A measure that ensures that the services can be received at the receive end.
SES Severely Errored Second
SETS Synchronous Equipment Timing Source
settings Parameters of a system or operation that can be selected by the user.
SF See Signal Fail
Signal Fail A signal indicating that associated data has failed in the sense that a near-end defect
condition (non-degrade defect) is active.
SFP See Small Form-Factor Pluggable
SHDSL Single-line High speed Digital Subscriber Line
Side Mode Suppression The Side Mode Suppression Ratio (SMSR) is the ratio of the largest peak of the total
Ratio source spectrum to the second largest peak.
signal cable Common signal cables cover the E1 cable, network cable, and other non-subscriber
signal cable.
Signal Degrade SD is a signal indicating the associated data has degraded in the sense that a degraded
defect (e.g., dDEG) condition is active.
Signal Fail SF is a signal indicating the associated data has failed in the sense that a near-end defect
condition (not being the degraded defect) is active.
Simple Network A network management protocol of TCP/IP. It enables remote users to view and modify
Management Protocol the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
slide rail Angle-bars on which shelves and chassis may slide and be supported within a cabinet or
shelf.
Small Form-Factor A specification for a new generation of optical modular transceivers.
Pluggable
SMSR See Side Mode Suppression Ratio
SNC SubNetwork Connection
SNCMP See Subnetwork connection multipath protection
SNCP See SubNetwork Connection Protection
SNCP node Set the SNC node on the protection sub-network to support sub-network connection
protection that spans protection sub-networks. The SNCP node of the ring sub-network
can support electric circuit dually feed and selectively receive a timeslot out of the ring,
thus implementing sub-network connection protection. The SNCP node is generally set
on the node on the line board with the path protection type of the dual fed and selectively
received.
SNCTP See Subnetwork Connection Tunnel Protection
SNMP See Simple Network Management Protocol
SNR Signal Noise Ratio
space diversity A diversity scheme that enables two or more antennas separated by a specific distance
to transmit/receive the same signal and selection is then performed between the two
signals to ease the impact of fading. Currently, only receive SD is used.
Spanning Tree Protocol STP is a protocol that is used in the LAN to remove the loop. STP applies to the redundant
network to block some undesirable redundant paths through certain algorithms and prune
a loop network into a loop-free tree network.
SPI Synchronous Physical Interface
Switching restoration It refers to the period of time between the start of detecting and the moment when the
time line is switched back to the original status after protection switching occurs in the MSP
sub-network.
Synchronization Status A message that carries quality levels of timing signals on a synchronous timing link.
Message Nodes on an SDH network and a synchronization network acquire upstream clock
information through this message. Then the nodes can perform proper operations on their
clocks, such as tracing, switching, or converting to holdoff, and forward the
synchronization information to downstream nodes.
Synchronous Digital A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the
Hierarchy transmission features of digital signals such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and B-
ISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-speed
counterparts, and the line coding of scrambling is used only for signals. SDH is suitable
for the fiber communication system with high speed and a large capacity since it uses
synchronous multiplexing and flexible mapping structure.
Synchronous source A clock providing timing services to connected network elements. This would include
clocks conforming to Recommendations G.811, G.812 and G.813.
A.20 T
Tandem Connection In the SDH transport hierarchy, the TCM is located between the AU/TU management
Monitor layer and HP/LP layer. It uses the N1/N2 byte of POH overhead to monitor the quality
of the transport channels on a transmission section (TCM section).
TCM See Tandem Connection Monitor
TCP/IP See Transmission Control Protocol/Internet Protocol
TDM Time Division Multiplexing
TIM Trace Identifier Mismatch
Timeslot Continuously repeating interval of time or a time period in which two devices are able
to interconnect.
Time Synchronization Also called the moment synchronization, time synchronization means that the
synchronization of the absolute time, which requires that the starting time of the signals
keeps consistent with the UTC time.
TM Terminal Multiplexer
TMN Telecommunications Management Network
ToS See Type of Service
TPS See Tributary Protection Switch
Trail management A network level management function of the network management system. This function
function enables you to configure end-to-end services, view graphic interface and visual routes
of a trail, query detailed information of a trail, filter, search and locate a trail quickly,
manage and maintain trails in a centralized manner, manage alarms and performance
data by trail, and print a trail report.
Transceiver A transmitter and receiver housed together in a single unit and having some circuits in
common, often for portable or mobile use.
Transmission Control Common name for the suite of protocols developed to support the construction of
Protocol/Internet worldwide internetworks.
Protocol
transparent A process during which the signaling protocol or data is not processed in the content but
transmission encapsulated in the format for the processing of the next phase.
Tray A component that can be installed in the cabinet for holding chassis or other devices.
Tributary loopback A fault can be located for each service path by performing loopback to each path of the
tributary board. There are three kinds of loopback modes: no loopback, outloop, and
inloop.
Tributary Protection A function that uses a standby tributary processing board to protect N tributary
Switch processing boards.
Tributary unit An information structure which provides adaptation between the lower order path layer
and the higher order path layer. It consists of an information payload (the lower order
VC) and a TU pointer which indicates the offset of the payload frame start relative to
the higher order VC frame start.
Tributary Unit Group One or more Tributary Units, occupying fixed, defined positions in a higher order VC-
n payload is termed a Tributary Unit Group (TUG). TUGs are defined in such a way that
mixed capacity payloads made up of different size Tributary Units can be constructed
to increase flexibility of the transport network.
TTL Time To Live
TU Tributary Unit
TUG See Tributary Unit Group
Tunnel A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
Type of Service A field in an IP packet (IP datagram) used for quality of service (QoS). The TOS field
has 8 bits in length, which is divided into five subfields.
A.21 U
UART Universal Asynchronous Receiver/Transmitter
UAS Unavailable Second
UBR Unspecified Bit Rate
underfloor cabling The cables connected cabinets and other devices are routed underfloor.
UNI See User-to-Network Interface
Unprotected Pertaining to the transmission of the services that are not protected. The services cannot
be switched to the protection channel if the working channel is faulty or the service is
interrupted, because protection mechanism is not configured.
Unprotected sub- A sub-network without any protection mechanism. The purpose of such configuration
network is to provide the basic data of trail protection for subsequent trail management.
Upload An operation to report some or all configuration data of an NE to the NMS. The
configuration data then covers the configuration data stored at the NMS side.
UPM Uninterruptible Power Module
Upper threshold TThe critical value that can induce unexpected events if exceeded.
UPS Uninterruptible Power Supply
Upward cabling Cables or fibers connect the cabinet with other equipment from the top of the cabinet.
User Any entity external to the network which utilizes connections through the network for
communication. A person or other entity authorized by a subscriber to use some or all
of the services subscribed to by that subscriber.
User-to-Network The interface between user equipment and private or public network equipment (for
Interface example, ATM switches).
UTC Universal Time Coordinated
A.22 V
VB Virtual Bridge
VBR Variable Bit Rate
VC Virtual Concatenation
VC See Virtual Container
VCG Virtual Concatenation Group
VCI Virtual Channel Identifier
Virtual Container The information structure used to support path layer connections in the SDH. It consists
of information payload and path overhead (POH) information fields organized in a block
frame structure which repeats every 125 or 500 μs.
Virtual local area A logical grouping of two or more nodes which are not necessarily on the same physical
network network segment but which share the same IP network number. This is often associated
with switched Ethernet.
Virtual Private A system configuration, where the subscriber is able to build a private network via
Network connections to different network switches that may include private network capabilities.
VLAN See Virtual local area network
VP Virtual Path
VPI Virtual Path Identifier
VPN See Virtual Private Network
A.23 W
Wait to Restore The number of minutes to wait before services are switched back to the working line.
WAN Wide Area Network
Wander The long-term variations of the significant instants of a digital signal from their ideal
position in time (where long-term implies that these variations are of frequency less than
10 Hz).
washer A washer is a thin flat ring of metal or rubber which is placed over a bolt before the nut
is screwed on.
Wavelength Division A technology that utilizes the characteristics of broad bandwidth and low attenuation of
Multiplexing single mode optical fiber, uses multiple wavelengths as carriers, and allows multiple
channels to transmit simultaneously in a single fiber.
Wavelength protection Data for describing the wavelength protection structure. Its function is similar to that of
group the protection subnet for SDH NEs. The wavelength path protection can work only with
the correct configuration of the wavelength protection group.
WDM See Wavelength Division Multiplexing
WFQ Weighted Fair Queuing
Winding pipe A tool for fiber routing, which acts as the corrugated pipe.
Working path A path allocated to transport the normal traffic.
WRED Weighted Random Early Detection
WTR See Wait to Restore