Professional Documents
Culture Documents
Ems-Xdm Um Etsi A00 7.2.2 en
Ems-Xdm Um Etsi A00 7.2.2 en
Ems-Xdm Um Etsi A00 7.2.2 en
Version 7.2.2
432006-2401-5H3-A00
EMS-XDM (ETSI) User Manual
V7.2.2
Catalog No: X37129
March, 2009
nd
2 Edition
Protection................................................................................. 8-1
Overview .......................................................................................................... 8-1
IO Protection .................................................................................................... 8-2
MSP Linear Protection ................................................................................... 8-12
TRP/CMBR Protection ................................................................................... 8-18
RSTP Protection............................................................................................. 8-20
LCAS Protection............................................................................................. 8-25
MS Shared Protection Ring............................................................................ 8-27
ALS Mode Setting for TRP10_2O, TRP25, and OFA Cards .......................... 8-48
ASON Protection and Restoration.................................................................. 8-49
MPLS Protection ............................................................................................ 8-50
Dual-Homed Protection .................................................................................. 8-52
Link Aggregation ............................................................................................ 8-52
Overview
This manual describes the EMS-XDM® (XDM Element Management System)
software application, which is used by telecommunications service personnel to
manage ECI Telecom Network Solutions Division XDM equipment.
Intended Audience
This guide is for the following users who have rights to use the EMS-XDM
application to remotely manage XDM network elements (NEs):
| Network Management System (NMS) users: For these users, EMS-XDM is
integrated under another management application (such as LightSoft®),
from which EMS-XDM functionality is accessed. For NMS users, some of
the steps and activities discussed in this guide may not be relevant and can
be bypassed, as access to the described functionality is provided from the
higher-level management application.
| Element Management System (EMS) users: These users access EMS-XDM
functionality directly from the EMS-XDM application. In this case,
EMS-XDM is not integrated under another higher-level management
application.
Document Objectives
This guide provides basic operating instructions for ECI Telecom's EMS-XDM
platform.
Document Contents
This manual contains the following chapters and appendices:
| Chapter 1: System Overview (on page 1-1) provides an overview of the
EMS-XDM application, and describes its primary functions and
architecture, as well as a typical workflow for working with the application.
| Chapter 2: Getting Started (on page 2-1) explains the first steps for getting
EMS-XDM up and running, and describes the EMS-XDM graphical user
interface (GUI).
| Chapter 3: Managing Users and Security (on page 3-1) discusses how to
manage security and user access rights in EMS-XDM.
| Chapter 4: Configuring and Managing NEs (on page 4-1) discusses how to
create and manage XDM NEs, configure cards and internal XDM objects,
and configure XDM NE timing sources using the EMS-XDM Shelf View
and Card Internals View.
| Chapter 5: Card Configuration and Management (on page 5-1 ) discusses
how to configure and manage XDM cards.
| Chapter 6: Optical Management (on page 6-1) discusses how to manage
XDM optical sites using the functional node (FuN) utility and Enhanced
Automatic Power Control (Enhanced APC) feature also known as Power
Equalization of Optical Links (PELES).
| Chapter 7: Setting Up Cross Connects (on page 7-1) discusses how to use
the EMS-XDM cross connection (XC) subsystem to cross connect traffic
on XDM equipment.
| Chapter 8: Protection (on page 8-1) discusses how to configure protection
schemes for XDM NEs.
| Chapter 9: Fault Management (on page 9-1) discusses how to configure,
manage, filter, and troubleshoot XDM NE alarms.
| Chapter 10: Performance Monitoring (on page 10-1) discusses how to
analyze the current and historical performance of networks and XCs in
EMS-XDM.
Related Publications
The EMS-XDM User Manual should be used in conjunction with the XDM
Installation, Operation, and Maintenance Manual, and the LightSoft User
Manual.
Technical Support
You can contact ECI Telecom Ltd. technical support as follows:
+972-3-9266000
+972-3-9266370
on.support@ecitele.com
Overview
ECI Telecom Network Solutions Division is an international leader and
innovative provider of on-demand next-generation intelligent optical
networking solutions for metropolitan and regional environments. The
division's flagship product line is the XDM® family of multiservice high
density optical network platforms. This section provides an overview of the
EMS-XDM® management used to manage the XDM product line.
| What is XDM?
| What is EMS-XDM?
| Main EMS-XDM Tasks
| XDM Management Architecture
| Working with EMS-XDM
| Additional Management Tools
What is XDM?
ECI Telecom XDM is a new-generation optical networking system that
integrates all the functions of a complete Point-of-Presence (POP) in a single
shelf-sized element. XDM accommodates the growing demand for bandwidth,
while maintaining compatibility and enhanced flexibility to transport and route
all traffic types, including voice, data, and video.
The single-architecture approach of XDM integrates the capabilities of multiple
technologies: Dense Wavelength Division Multiplexing (DWDM), Time
Division Multiplexing (TDM), and Digital Cross Connects (DXC), and
combines them into a single next-generation hybrid optical network element
(NE).
To handle the enormous growth of data traffic, XDM also transports Internet
Protocol (IP), Asynchronous Transfer Mode (ATM), and Gigabit Ethernet
(GbE) for the efficient transmission of data.
What is EMS-XDM?
EMS-XDM functions as an Element Management System (EMS) in the
Telecommunications Management Network (TMN) scheme, and can also
operate directly under the LightSoft NMS. It may be co-located in the same
platform, operate standalone, or be integrated under a third party NMS or TMN
umbrella system. EMS-XDM can control scores of XDM NEs at a time and
provides a wide range of management functions, including alarms,
configuration, inventory, provisioning, and security management. EMS-XDM
runs under the UNIX operating system on a Sun™ workstation.
EMS-XDM is designed as an open system in compliance with the CORBA
standard. It supports Release 2 of the MultiTechnology Network Management
(MTNM) CORBA-based interface (for integration under LightSoft or a third
party NMS). MTNM is the name given by the TeleManagement Forum
(www.tmforum.org) to the interface designed to support interoperability
between different management systems. (MTNM was formerly known as the
SDH Information Model, or SSIM.) ECI Telecom is an active participant in the
TMF, along with all other major telecom equipment vendors.
System Administration
EMS-XDM supports the following system administration tasks:
| Performing backup of historical data
| Performing UNIX system operations with the easy-to-use CDE
| Uploading, downloading, and activating/deactivating software versions in
the network and in individual NEs
| Uploading and downloading NE data
| Pinging any NE
| Viewing Login History
| Customizing the icon toolbar in the EMS-XDM main window
| Viewing a wide range of information regarding managed NEs and
equipment in the Inventory window
| Changing the EMS-XDM mode between Master and Monitor
| Viewing a log file of the actions performed on the station
| Setting NE passwords
Security Management
EMS-XDM provides security management by restricting the access of
EMS-XDM users to data, and limiting the actions they may take.
Security management tasks include:
| Setting passwords
| Managing user groups
| Assigning capabilities to user groups
| Locking EMS-XDM workstations
| Assigning access rights and priorities for changing NE configuration
(multiconfigurator feature)
| Viewing the Users List window, which displays a list of the users currently
logged into the system
Configuration Management
EMS-XDM enables you to update the expected configuration of each NE, as
well as retrieve current configuration information.
Configuration management tasks include:
| Creating and editing NE groups
| Configuring attributes of various transport objects, for example, Virtual
Container VC
| Selecting Timing Generator (TG) sources
| Setting NE clocks
| Editing the IP routing table
| Configuring equipment protection with IOP modules
Data Management
EMS-XDM supports the following data capabilities:
| Optical data interfaces (Ethernet and SAN)
| Transport of Ethernet services over SDH
| Layer 2 Ethernet connectivity for Ethernet switches/routers
| Layer 1 and Layer 2 Ethernet services for end-users
| ATM capabilities for 3G access networks
Maintenance Operations
EMS-XDM enables you to perform routine maintenance work on your
network. On-screen warnings alert you whenever any of these operations affect
traffic.
Maintenance tasks include:
| Operating and releasing loopbacks
| Sending an Alarm Indication Signal (AIS) force
| Forcing an RDI
| Resetting plug-in cards
| Performing protection lockout
| Selecting a protection route (forcing a switch to a protection network)
| Enforcing the timing source
| Viewing a list of maintenance operations per NE
| Switching traffic to a protection card
Performance Monitoring
EMS-XDM provides all PM indicators defined in the ITU-T and Telcordia
standards.
PM tasks include:
| Retrieving and displaying current performance data for each NE (15
minutes or 24 hours)
| Retrieving and displaying historical performance data for each NE, by
stored time/date and by interval (15 minute or 24 hour intervals)
| Resetting PM counters manually or automatically (every 15 minutes or 24
hours)
| Collecting performance data for card endpoints
| Displaying graphical charts with PM data
Ongoing Operations
The activities listed in this section are performed regularly, when required.
Setup for some of them is usually completed during initial system setup, such
as defining the alarm management configuration and setting up performance
profiles. Thereafter, the activities in this group are performed as part of the
routine management, operation, and maintenance of EMS-XDM. Ongoing
EMS-XDM operational activities include:
| NE management:NE management encompasses a variety of activities,
including creating and deleting NEs, uploading NE data, viewing NE-
specific information, configuring NE parameters, and setting the NE time.
EMS users access this functionality from the EMS-XDM main window.
NMS users typically access this functionality from the higher-level
management application and can therefore proceed to using the Shelf
View.
| Card management: EMS-XDM Card Internals View windows are used to
perform standard card management functions, such as assigning cards to
slots, viewing card-specific information, configuring card parameters, and
configuring card-specific protection schemes. Card Internals View
windows vary, depending on the type of card.
| Internal XDM object management: Management of internal XDM objects
is performed from EMS-XDM Card Internals View windows. These
windows enable you to view and configure object attributes.
| Functional node (FuN) management: EMS-XDM FuN facility enables you
to configure and assign all cards comprising an optical site at one time, and
to monitor overall power efficiency of the site.
| Alarm management: EMS-XDM alarm management enables you to oversee
and control a host of alarm related activities, such as:
Viewing current alarms for an NE or card
Determining the cause of an alarm
Filtering alarms
Acknowledging alarms
Using the alarm log
Setting alarm severity
Defining severity profiles
The final two items in this list pertain to alarm severity. They are typically
dealt with as part of the initial setup of the system when defining your
alarm configuration.
LightSoft
LightSoft operates at the NML of the TMN model, working with ECI Telecom
element level tools. It does so by providing all facets of network management
netwide, from a single platform: configuration, fault detection, performance
management, administrative procedures, maintenance operations, and security
control.
At the core of the LightSoft system is a detailed network database, which is
updated in real time. This object-oriented information model incorporates
features of the TMN model, anticipating full support of emerging industry
standard guidelines for interoperability.
ECI Telecom has designed LightSoft to support the emerging TMF-MTNM
standard for transferring data between itself and diverse EMSs/TNMs. MTNM
is an open-architecture environment that brings together ATM, DWDM, and
SDH into one management interface. The MTNM protocol is a cooperative
effort by member companies of the TeleManagement Forum, a nonprofit global
organization that provides leadership, strategic guidance, and practical
solutions to improve the management and operation of communications
services.
ECI Telecom uses MTNM as both its southbound interface to manage other
vendors’ equipment, aa well as its northbound interface enabling LightSoft to
be managed by other TNM systems.
The LightSoft working environment combines practicality and ease of use. Its
man-machine interface is completely graphic, enabling users to fully learn and
operate the system with a minimum of training.
For more information about LightSoft, see the LightSoft General Description
and LightSoft User Manual.
Overview
This section explains the first steps for getting EMS-XDM up and running. It
also describes basic concepts of the EMS-XDM GUI and operating
conventions.
EMS-XDM functions as an EMS in the TMN scheme, and can also operate
directly under the LightSoft NMS. It may be co-located in the same platform,
operate as a standalone, or be integrated under a third-party NMS or TMN
umbrella system. If your EMS-XDM is integrated under another management
application (that is, you are an NMS user), the EMS-XDM interface and
functionality described in this section may not be relevant to you.
For standalone mode users (that is, EMS users), this section describes the basic
operating features of EMS-XDM. Access to these features is via the EMS-
XDM main window.
After successfully logging in to EMS-XDM, the EMS-XDM start-up
parameters appear. These parameters define the basic configuration used by the
application and can be viewed or modified.
Refer to the following sections:
| Workflow
| Connecting EMS-XDM to the Network
| Starting EMS-XDM
| Using the Graphical User Interface
| Grouping NEs
| Setting EMS Preferences
| Additional Features
| Aborting System Operations
| Using Online Help
| Accessing Customer Support Information
| Viewing Version Information
| Printing in EMS-XDM
| Logging Out
| Locking EMS-XDM
| Terminating EMS-XDM
Workflow
Initial operations include:
| Fulfilling preliminary platform requirements
| Installing EMS-XDM
| Starting EMS-XDM
| Starting from a Remote EMS-XDM
| Using the Graphical User Interface
Operations that you can perform from the EMS-XDM main window include:
| Grouping NEs
| Setting EMS Preferences
| Accessing Customer Support Information
| Additional Features
| Using Online Help
| Printing in EMS-XDM
| Logging Out
| Locking EMS-XDM
| Terminating EMS-XDM
Starting EMS-XDM
To turn on the workstation, press the ON switches on the back of the
workstation computer and on the monitor. The cabling connections within the
EMS-XDM workstation, as well as between EMS-XDM and the GNE, are
described in Connecting EMS-XDM to the Network and in further detail in the
XDM Installation, Operation, and Maintenance Manual.
Logging In to EMS-XDM
Logging In to EMS-XDM
After turning on the workstation, the screen turns white and displays a series of
commands starting with the Sun logo.
To log in to EMS-XDM:
1. Type the default password, eci_ems. The Login window opens.
2. In the User Name and Password fields, type your name and password. (If
you do not know your password, ask your system administrator.)
3. Click OK. The EMS-XDM main window opens, displaying a map of the
system NEs.
To launch the Shelf View, double-click an NE.
Administrator Login
If you are an administrator attempting to log in after another administrator has
already logged in, the following message appears:
"User Admin is already logged in on host host_name
Do you want to log him out?"
If you select Yes, the other user will receive the following message on his/her
monitor:
"User <user_name@station_name> requests to login.
OK to logout?"
The Multiconfigurator Logout Default timer starts counting, and the time
remaining appears in the title bar of all relevant stations. After the
Multiconfigurator Logout Default time elapses, your request for configurator
rights is granted and the other administrator is forced to log out.
4. Click Set Time to verify the EMS-XDM date and time. While EMS-XDM
is running, it is not possible to reset the time.
5. Click Start. Wait a few minutes while the system makes the final
configuration adjustments.
The EMS-XDM Parameters window opens where you can specify the
start-up parameter values.
Start-Up Parameters
Start-up parameter Description
Slave Manager Mode Parameters
Configuring an X-Terminal
You can configure an X-terminal for operation with the EMS-XDM. Verify
that the X-terminal has a network connection to the EMS-XDM host (that is, an
appropriate network card is installed in the X-terminal).
To configure an X-terminal:
1. Turn on the X-terminal.
2. After the NVRAM loads, press Esc.
3. Click Setup.
4. Set the monitor resolution.
5. To configure the network settings:
a. Set/Get IP Addresses to/from NVRAM.
b. Enter the IP address of the X-terminal.
c. Enter the IP address of the host (the EMS-XDM host from which the X-
terminal is to boot).
6. If the X-terminal is connected to the EMS-XDM host via a gateway (not
via a LAN), enter the IP address of the gateway.
7. Enter the subnet mask. If the X-terminal is connected to the EMS-XDM
host via a LAN, enter a subnet mask value of 255.255.255.0; else enter a
subnet mask value of 255.255.0.0.
8. Enter the Broadcast IP address. If the X-terminal is connected to the EMS-
XDM host via a LAN, enter the same IP address as that of the X-terminal;
else enter the first three parts of the IP address identical to that of the
terminal, followed by 255 (for example, if the X-terminal IP is
192.9.111.251, enter a Broadcast IP of 192.9.111.255).
9. Select the Boot menu option, and set the parameters as shown in the
following sample boot option settings:
Boot File: Xncd19c_
TFTP Boot Directory:
/usr/tftpboot/
NFS Boot Directory: c
Config File: ncd_std
UNIX Config Directory:
/usr/tftpboot/configs/
NCDnet Config Directory:
TFTP Order:
NFS Order: Disable
MOP Order: Disable
LOCAL Order: Disable
10. On the Done menu, select Reboot, and then press Enter.
11. After the X-terminal reboots, it displays a window with the EMS-XDM
host stations available for connection. Double-click the required host.
NOTE: You can sort the list of hosts via the Sort menu at the
top of the window. There is no need to select any other field
options. The default settings match the required options.
The EMS-XDM main window opens upon successful login. The main window
always appears when the EMS-XDM application is active and not minimized,
either as a background for other windows or as the active window.
The EMS-XDM main window displays an icon for all provisioned NEs defined
using the Create NE procedure. A color coding scheme provides a view of the
managed NEs alarm statuses. When an alarm is detected, you can easily drill
down to detect its exact source. The Topology Tree (on the left) allows
complete navigation between NEs, slots, cards, ports, and containers, and
provides direct access to corresponding objects and windows.
Refer to the following sections:
| Main Window Components
| LEDs and Icons
| Navigating in the EMS-XDM Main Window
| Closing EMS windows
Title Bar
The title bar, located at the top the window, displays the EMS-XDM title.
The EMS-XDM main menu bar is located below the title bar and provides
dropdown operations.
Command Description
Configuration Displays submenu commands:
| Element: configuration options for selected NE (create, delete, open
info, show group, add elements to group, remove elements from group).
| Group: configuration options for NE group (create, ungroup (which
deletes selected group)).
| Attributes: opens Attributes window for configuring attributes of
selected objects.
| Timing: opens Timing window for viewing and modifying timing
sources.
| Set NE Time: manually sets NE real-time (system) clock (date and
time).
| Routing Table: opens NE Routing Table window for viewing and
modifying IP routing entries for selected XDM NEs, allowing system
configurations where an NE is used to route datagrams to other LAN
segments.
| IP Networking: opens IP Networking window
| NE Discovery: opens NE Discovery window for creating multiple
NEs.
| Duplicate Assignments: opens Duplicate Assignment window, where
you can copy slot assignments from one NE to another.
| Auto Slot Assignments: Actual to Expected Map auto-assigns cards
and modules and modifies expected XDM card type.
| Topology Links: Opens Topology Links window, where you can
view, filter, delete, and print selected links that appear upon completion
of link discovery process.
Connections Displays submenu commands:
| Create/Edit XC Set: opens XC Browser, where you can create/edit
XC sets for selected NE.
| XC Set List: opens XC Set List showing list of XCSs for selected NE.
| XCs Per NE: displays XCs of selected NE.
| Flow List: opens Flow List window for Ethernet connections, showing
Layer 2 Ethernet service carried over XDM network via EIS/EISM
cards.
| Policer List: displays list of policers showing traffic carried by each
Ethernet Layer 2 flow in EIS/EISM card.
Maintenance Displays Maintenance Info: maintenance operations on selected object.
Command Description
Security Displays submenu commands:
| Users: opens Security Users window, where you can add, edit, and
delete EMS-XDM users.
| Groups: opens Security Groups window, where you can add, edit, and
delete user groups, and assign user group capabilities.
| Capabilities: displays assigned user group security capabilities.
| Multi-Configurator: assigns NE configuration rights to user groups.
| Password: opens Change Password window, where an administrator
can change a currently logged-in user password.
| Users List: opens Currently Logged in Users window, where you can
select EMS-XDM users to whom to send messages.
| Lock EMS-XDM: manually locks an EMS-XDM workstation, closes
currently open windows, disables all options, and opens Login window
(prompting a new login).
Command Description
System Displays submenu commands:
| Configuration File: select Save to File to back up current NE
configuration to a file.
| SW Management: opens SW Management window, where you can
update software for all NEs in network.
| Ping: pings NE to determine quality of network connection.
| Upload NE Data: enables administrators to manually upload basic data
stored in a selected NE.
| NE Password: sets NE password to prevent unauthorized users from
accessing NE.
| Note Pad: opens Notepad window, where you can type personal notes
or reminders.
| Bulletin Board: opens on-screen bulletin board, where you can write
and read notes.
| Icons Setup: opens Icons Setup window, where you can choose and
customize icons to display on main toolbar.
| UNIX Window: enables administrators to open UNIX window to
perform system procedures at operating system level.
| Inventory Window: displays inventory info for selected NE.
| EMS Preference: opens EMS Preferences window, where you can set
EMS configuration settings.
| Change Mode: enables administrators to toggle system operating mode
from Master to Monitor (and vice versa).
| Login History: enables system administrator to view history of login
and logout activities.
| Action History: enables administrator to view an ASCII text file
history of a wide range of actions performed from EMS-XDM.
| Unmap Main Window: hides main EMS-XDM window when
accessed through NMS.
| Open Topology: displays XML files created during Save Topology
operation.
| Save Topology: exports EMS-XDM topology and NE configuration
data to XML files.
| Logout: logs user out of EMS-XDM.
| Topology Tree: toggles display of Topology Tree.
Help Displays submenu commands:
| Contents: opens EMS-XDM online help file for accessing context-
sensitive help topics.
| About ECI: opens ECI Telecom window for viewing information about
ECI Telecom Network Solutions Division.
| About EMS-XDM: opens About window for viewing information
regarding EMS-XDM version currently running on your station and
limitations of license purchased from ECI Telecom.
Information Bar
The information bar located below the main menu bar shows, from left to right:
| Current day, date, and time
| Name of current EMS-XDM user and the system name
| Clock Master icon (appears only when the EMS-XDM was defined as a
clock master during the start-up process)
| Total number of unacknowledged alarms
| Bell icon, indicating the highest alarm severity existing in the NE:
Red: Critical or Major.
Yellow: Minor or Warning.
Transparent (border lines only): no unacknowledged alarms exist. If at
least one unacknowledged alarm exists, the bell appears as a solid icon.
Click the Bell icon to open the Current Alarms window.
Navigator
The EMS-XDM navigator shows the NEs actively communicating with the
EMS-XDM station, and is used for quick and easy navigation to specific NEs.
Each NE in the network is represented in the navigator by a small square.
Alarmed NEs are indicated with the same color coding as in the main window.
A black rectangle inside the navigator indicates the active display area of the
main window, and the view displayed in the main window reflects the position
of the black rectangle inside the navigator. To view different portions of the
main window, middle-click the black rectangle and move it to the required
location. The main window display is refreshed with the requested view. When
you use the zoom and unzoom functions (Shift-Z to zoom in, Shift-U to zoom
out), the black rectangle changes size to indicate the viewed area.
All NE-level operations can be performed from the navigator using context-
sensitive menus (for example, you can double-click an NE in the navigator to
open its Shelf View). Selections made in the navigator are simultaneously
selected in the main window, and vice versa. Changes in the network view
(when moving an NE) are also reflected simultaneously in the navigator.
Additionally, the selected NE appears with a white borderline, as in the main
window.
When the main window is selected, the navigator is not. When the main
window is selected, you can use the arrow keys to navigate (scroll) the main
window. As you press the arrow keys, the black rectangle in the navigator
moves to reflect the portion you are viewing.
The status bar displays the number of unacknowledged alarms in the network,
the number of alarms in each alarm category, and the alarm bell.
This bar is always displayed on top of the EMS-XDM application and is
therefore always visible to network operators, even if the EMS-XDM
application is minimized or integrated under an upper-level management
system (such as LightSoft). Based on your start-up configuration, you can
display the complete or abbreviated status bar. The status bar cannot be
minimized, but it can be moved around the desktop.
The status bar can also be displayed or suppressed during run time.
The color coding of NE icons in the main window indicates the following:
| Red: at least one Major or Critical alarm in the NE.
| Yellow: at least one Minor or Warning alarm, but no Major or Critical
alarms.
| Blue: initial establishment of communication with the NE, or the NE is
uploading its database to EMS-XDM.
| Gray: no communication between EMS-XDM and the NE.
| Green: communication status OK, and currently no alarms.
| Flashes (red): conflict state where the EMS-XDM database does not
reflect the actual configuration of the NE (due to conflicting software
versions, conflicting configuration parameters, or conflicting slot
assignments). To determine the source of the conflict, open either the Info
window or the Current Alarms window. In the conflict state, the NE is not
uploaded.
| The Open and Info buttons are shaded (unavailable) in the blue and gray
states. Since there is no communication, EMS-XDM has no information on
these NEs.
| The color coding for NE group icons is based on the alarm with the highest
severity in an individual NE belonging to that group. Severity ranking from
highest to lowest is as follows: red, yellow, blue, gray, and green. For
example, if one of the NEs has a Major or Critical alarm, the NE group
icon’s background color is red.
Topology Tree
The Topology Tree on the left side of the main window allows complete
navigation between NEs and direct access to shelf, card, and internal views,
and to object windows.
You can use the zoom function to enlarge or reduce the size of the objects
displayed in the EMS-XDM main window.
In all EMS-XDM windows with toolbars, you can open the relevant parent
window for a child object directly from the child window in which you are
working.
For example, if you have a Card Internals View window open (child
window), you can open its parent window (Shelf View) by selecting File >
Open Parent Window or by clicking in the toolbar. In this case, the Shelf
View window opens automatically for that specific card.
Grouping NEs
EMS-XDM allows you to combine several NEs into a single group entity,
which is then displayed as a single icon on the topology map. This is especially
helpful in large networks for using desktop space more efficiently.
In addition, groups are required for using the Multiconfigurator feature.
After you have defined an NE group, you can perform the following functions:
| Expand: display the individual NEs belonging to the group
| Collapse: after expansion, display it as a single icon again
| Ungroup: cancel the group and return to individual NE icons
Refer to the following sections:
| Defining NE Groups
| Viewing NEs in an NE Group
| Deleting NE Groups
| Expanding and Collapsing NE Groups
| Adding and Removing NEs in an NE Group
Defining NE Groups
EMS-XDM enables you to define NE groups.
To define an NE group:
1. In the EMS-XDM main window, select the NEs to be included in the group
by clicking them with the CTRL key pressed. Selected elements have a
white border around the icon.
2. On the main menu bar, select Configuration > Group > Create. The
Create window opens.
Deleting NE Groups
You can delete NE groups, as required.
To delete an NE group:
1. To permanently disband the group and return to the previous topology (that
is, the original NE icons), select the NE Group icon. A white border
appears around it.
2. On the main menu bar, select Configuration > Group > Ungroup. The
NE icons return to their previous settings, and the "NE Group Deleted"
message appears.
To expand an NE group:
| In the EMS-XDM main window, double-click the NE Group icon.
OR
| Select the NE Group icon (it appears with a white border around it), and on
the main menu bar, select Configuration > Group > Expand.
The NE icons reappear.
To collapse an NE group:
1. Select one of the NEs in the group.
2. Right-click the NE, and on the shortcut menu, select Collapse.
OR
On the EMS-XDM main menu bar, select Configuration > Group >
Collapse.
The group icon reappears, and the "NE Group Deleted" message appears.
2. Specify the start-up parameter values for the parameters as listed in EMS
Preference Parameters.
3. On the toolbar, click to apply the changes. The changes are applied
immediately.
Audio Alarm Length of audible alarm beep when alarms are reported at
Duration [msec] EMS-XDM station.
Audio Alarm Frequency in seconds at which EMS-XDM station audible
Reminder Interval alarm (standard computer beep) sounds when there are alarms
[sec] reported at EMS-XDM station.
Include Upload on Default of Include Upload button in Slot Assignment
Assignment by window. Clear to disable.
Default
Slave Manager Audible alarm functions when EMS is integrated under
Audio Alarm LightSoft and:
| No user has opened an EMS-XDM window.
| EMS is running in standalone mode, no user logged in.
Default Audio Alarm Default alarm setting of EMS-XDM (on or off). Takes effect
only from next EMS-XDM session. Only administrators can
change this setting.
Default Audio Default audio reminder of EMS-XDM application (on or off).
Reminder Takes effect only from next EMS-XDM session. Only
administrators can change this setting.
Default Actual View Which EMS-XDM view (Actual/Expected) opened in Shelf
Mode View default mode. Takes effect only from next EMS-XDM
session. Only administrators can change this setting.
Allow Scientific Large numbers in scientific notation. Helpful for PM
Notation for Large information from data I/O cards, such as DIO and EIS/EISM.
Numbers
Field Description
Auto Slot Non-GUI mode for Auto-Slot Assignment (ASA) feature.
Assignment When ASA active, physical insertion of a card in an NE slot
automatically triggers slot assignment process. ASA is also
performed when shelf is disconnected from its power source
and then reconnected.
Available only when automatic package optional feature
enabled.
ASA Include Upload ASA Upload option when operating in non-GUI mode.
Available only when automatic package optional feature
enabled.
Auto Topology Link Automatic topology link discovery. Link discovery is
Discovery performed in real time whenever a new fiber connection is
created.
Available only when automatic package optional feature
enabled.
Auto NE Discovery Automatic NE discovery feature (in conjunction with Auto
Topology Link Discovery feature). If NE does not exist in
EMS-XDM topology map, it is automatically created.
Thereafter, link discovery operations are performed.
Available only when automatic package optional feature
enabled.
Automatic Link Works in conjunction with Auto Topology Link Discovery
Validation feature. When enabled, system automatically sets expected
string in J0 byte so that TIM alarms are not generated during
link discovery process. Typically enabled when Auto
Topology Link Discovery feature is enabled. Disable when
you want TIM alarms to be generated as part of a diagnostic
process, for example, when switching fibers on a node, or
whenever fiber switching may occur in the ODF.
Additional Features
This section describes additional features available in EMS-XDM.
| Notepad
| Bulletin Board
| Icon Setup
| Accessing the UNIX Window
| Viewing the Terms of the EMS-XDM License
Notepad
You can access your own notepad for typing personal notes or reminders.
2. Click the mouse pointer in the text field and start typing your notes.
3. Click Save to save your notes.
4. Click Close to close the window.
Bulletin Board
You can access an on-screen bulletin board for writing and reading notes.
Icon Setup
EMS-XDM enables you to customize the display of the main toolbar icons, and
add and remove icons, as desired.
Your customized toolbar is saved and appears the next time you log in to EMS-
XDM.
2. To add an icon to the main toolbar, select it in the Options list and click
. The icon appears in the Current area.
3. To delete an icon from the main toolbar, select it in the Current list and
click . The icon appears in the Options area.
4. Click Apply. The changes are implemented immediately.
5. To set the toolbar to its default state (including all icons), click Default.
3. On the main toolbar, click . An EMS-XDM PDF opens, where you can
access information how to use the EMS-XDM management interface. (The
help system runs in HotJava, an HTML browser running on the Sun
workstation and similar in operation to Netscape.)
4. On the toolbar, click . The Help window opens, displaying information
relevant to the active window.
5. In the Table of Contents (left pane), click any of the topics. The relevant
topic appears in the workspace (right pane) of the online help.
Printing in EMS-XDM
You can print from several EMS-XDM windows, as follows:
| Alarms from the Alarm Log
| Alarm log files from the Log Export Browse window
| XC lists from the XC List window
| PM data from the Performance History window
In addition, EMS-XDM can send the contents of a window directly to the
printer
After selecting the Print option from any of the above-mentioned windows, the
relevant Print window opens.
To print in EMS-XDM:
1. If multiple printers are connected to the system, select a printer from the
Available Printers field.
2. If you want to print to an ASCII file, select Print to File Only and enter the
file name. Use the arrows to increase or decrease the number of copies
required.
3. To find out more about a printer, click Info to open a window showing
details about the printer currently selected. To show the status of the print
job currently being processed, click the Status button to open a Status
window.
Logging Out
You should log out every time you intend to leave your station unattended.
This prevents unauthorized use of your workstation under your name.
When you log out, all windows are closed, all functions are grayed-out, and the
EMS-XDM Login window opens.
Locking EMS-XDM
The EMS-XDM workstation can be automatically or manually locked to
prevent unauthorized use.
Terminating EMS-XDM
EMS-XDM enables administrators to terminate the application, shutting down
the system and ending all monitoring activities. (This function differs from
system logout, which closes the current user session while leaving the
EMS-XDM running.)
Overview
This section discusses how to use EMS-XDM for managing security and user
access rights.
EMS-XDM security management is extremely flexible. The system features a
nonrigid structure that allows you to set up a hierarchy to best serve the needs
of the organization.
All EMS-XDM security functions, except changing personal passwords, can be
executed only by the administrator. They cannot be assigned to other users.
The following table lists and describes the EMS-XDM default/preset user
groups.
Workflow
The administrator is responsible for managing users and user groups in
EMS-XDM, as well as for overseeing the assignment of access rights to
specific user groups, and performing other user management functions. The
administrative actions can be performed in any order, as required.
Basic operations include:
| Managing User Access
| Managing User Group Access
| Managing the Security Token
| Changing a Password
| Viewing and Sending Messages to Current Users
| Handshake with LCT-XDM
| Viewing Login History
| Viewing Log Actions
Editing Users
The system administrator can edit user properties in the EMS-XDM system.
To edit a user:
1. In the Security Users window, select the user and click Edit. The Edit
User window opens.
2. Make changes as needed.
3. Click OK to save the changes. A confirmation message window opens.
Click Close to close this window.
4. Click Close to close the Edit User window.
Deleting Users
The system administrator can delete users in the EMS-XDM system.
To delete a user:
1. In the Shelf View or EMS-XDM main window, on the menu bar, select
Security > Users. The Security Users window opens.
2. Select the name of the user you want to delete, and click Delete. A
confirmation window opens.
3. Click Yes to confirm the deletion.
2. To add a new user group, click Add. The Add New User Group window
opens.
2. In the Group Name list, select Config, and click Edit. The Edit User
Group window for Configurator opens.
3. In the Element Groups list, select NE groups (single-click each selection),
and click . The selected NE groups are added to the Accessed Element
Groups list.
4. To deselect an NE group(s) and delete configurator capabilities from the
user group, select the NE groups in the Accessed Element Groups list
(single-click each selection), and then click . The selected NE groups
are added to the Element Groups List.
5. Click Global Access to grant configurator rights for all NE groups to a user
group.
6. Click OK to save the changes. A confirmation message window opens,
confirming that the group attributes have been updated.
Changing a Password
EMS-XDM enables administrators to change a currently logged in user
password. (Personal passwords may be changed by the respective user.)
To change a password:
1. In the Shelf View or EMS-XDM main window, on the menu bar, select
Security > Password. The Change Password window opens.
2. In the Old Password field, type in your current password. (For security
reasons, passwords are always indicated as asterisks.
OR
In the Security Groups window, click the Users List button. The User
List of Group window opens, where you can select EMS-XDM users
of a specified group to whom to send messages.
2. In the Users/Hosts area, select the users and, if applicable, the host to
which you want to send a message.
3. In the Note area, type in a message, and click Send. A User Message
window opens, displaying your user name and message.
4. Click Save to save this message as a text file. Two confirmation windows
open, confirming that the message data is saved, and to which application it
is saved as a text file (for example, Notepad).
5. Click Close to close the confirmation windows, and to revert to the
previously opened Currently Logged In Users window. If desired, you
can use the Currently Logged In Users window to send additional
messages.
6. Click Close to close the window.
Terminating an LCT-XDM
Session that Aborted
EMS-XDM enables you to terminate LCT-XDM sessions that ended
abnormally without a proper user logout.
To release/terminate LCT-XDM:
| In the Shelf View or EMS-XDM main window, on the menu bar, select
Security > Release LCT-XDM. The following happens:
The "LCT-XDM connected" string displayed in the title bar of the
Shelf View is deleted.
All changes made by the LCT-XDM user are uploaded to the
EMS-XDM database.
EMS-XDM enables the system administrator to view the history of login and
logout activities.
By default, the file names listed in this window reflect the XDM station or
the X-terminal for which the log file was generated. However, the file name
can also be a name assigned by the user to a merged file.
2. To sort the order of the entries listed in the Login File window, on the Sort
menu, click one of the following options:
By User: in alphabetical order, according to user name who registered
log activity
By Host: in alphabetical order, according to name of host at which log
activity was registered
By Time: according to time and date of log activity, with most recent
log actions first
3. To print a login file, on the File menu, click Print. The login file is printed.
Overview
This section describes how to use EMS-XDM to configure and manage XDM
NEs via the EMS-XDM Shelf View.
For more information about the basic organization and conventions used in the
Shelf View, see Accessing the Shelf View and Using the Shelf View.
Refer to the following sections:
| Workflow
| Accessing the Shelf View
| Activating the Virtual Shelf View
| Creating NEs
| Uploading NE Data
| Viewing and Modifying NE Data
| Propagating Object Attributes
| Setting NE IP Routing
| Setting NE Time
| Accessing Card Internal Objects from the Shelf View
| Pinging ETY Communications
| Setting NE Passwords
Workflow
The Shelf View is the starting point for many NE management operations,
including:
| Creating NEs
| Uploading NE Data
| Viewing and Modifying NE Data
| Setting NE IP Routing
| Setting NE Time
Creating NEs
Creating NEs
EMS-XDM allows you to add new NEs to the database. You can add one or
multiple NEs concurrently.
Whenever you create an NE, an NE icon appears in the EMS-XDM main
window. You can freely move NE icons to any location in the main window by
dragging and dropping.
| Creating a Single NE
| Creating Multiple NEs Using NE Discovery
Creating a Single NE
EMS-XDM allows you to create NEs on a one-to-one basis.
If you decide not to exclude a designated IP address range, you can delete it
from the Exclude IP List area by selecting it and clicking Remove.
The NE creation process creates an icon for each NE and places it on the
EMS-XDM desktop. If the EMS-XDM is integrated under an upper-level
management system, you may need to manually create the discovered NEs
there. You can, however, view the results of the NE discovery operation by
opening the Inventory window.
Uploading NE Data
Initially, after NE creation, the NE status LED in the main window is gray (that
is, no communication). After a few moments, it turns blue, indicating that NE
data is being uploaded to the EMS-XDM database.
The data is uploaded in the following stages:
| Core upload: data to begin configuration of the NE including alarm and
PM severity profiles. When this data is uploaded to the EMS-XDM
database, the NE LED color changes to indicate the current alarm state.
| NE cross connects: data relevant to the NE's XCs.
| Background upload: slot assignment and payload internals data uploaded
by the operator, as required. When this upload process is in progress,
system operation can be slower than normal, and the system initiates a start
and stop of the background upload, as required.
Viewing NE Status
Modifying NE Configuration
2. To edit a text field, click the relevant field to enable it for typing and type
the relevant text.
3. To edit a field marked by a dropdown arrow, click the arrow and choose an
option from the dropdown list. The modified fields and the Configuration
tab label are colored blue, indicating changes have been made. The blue
coloring remains until you apply the changes (see Step 4) or you choose the
original value again.
4. Fill in the fields, as described in the following table.
5. To save the changes, on the toolbar, click to apply the changes. The
changes are applied and the Configuration tab label and fields revert to the
default coloring.
If you attempt to close the Info window (after making changes, but without
applying the changes), a reminder/confirmation window opens prompting
you to confirm closing the window. Click Yes to confirm.
Field Description
NE TIM NE TIM alarm detection. Indicates trace identifier mismatch
Detection J1 caused by incorrect provisioning of expected trace or
misconnection. Results from comparing expected J1 byte to
received one.
NE TIM NE TIM alarm detection. Indicates trace identifier mismatch
Detection J2 caused by incorrect provisioning of expected trace or
misconnection. Results from comparing expected J2 byte to
received one.
Comment Comments, entered by XDM user.
LCT-XDM Presets Handshake request status, which determines whether to
Approval grant NE configuration rights to LCT-XDM stations. Options:
| Waiting for Approval: (default) when LCT-XDM station
requests configuration rights and EMS-XDM operator
does not respond to request within predefined time period,
Handshake request is granted. (Default)
| Approved: configuration rights are granted. Approved
value is good for only one LCT-XDM entry, after which it
reverts to default "Waiting for Approval" state.
| Not Approved: configuration rights are rejected.
Hybrid Mode Whether XDM-100 is configurable as a hybrid shelf. Options:
Enabled, Disabled.
SIM Allowed Whether SIM is Enabled or Disabled. (Relevant only for
XDM-50)
Propagating NE Info
To propagate NE info:
1. In the Configuration tab of the NE Info window, in the Propagation
column, select the checkboxes adjacent to the relevant NE attributes to be
propagated.
Viewing NE Inventory
To view NE inventory:
1. In the Configuration tab, in the Propagation column, select the
checkboxes adjacent to the relevant NE attributes to be propagated.
2. In the NE Info window, click the Inventory tab to display read-only fields
described in the following table.
Viewing NE Alarms
To view NE alarms:
1. In the Alarms area (top of Info window), view the Total and
Unacknowledged alarms, color coded to reflect alarm severity.
2. To view visible alarms, click the Visible Alarms tab, where you can view
the same alarms that appear in the Current Alarms list.
3. To view invisible alarms, click the Invisible tab, where you can view the
alarms that appear in the Current Alarms list, with the addition of
Invisible alarms (alarms assigned the nonreport feature in the alarm
severity profile).
Setting NE IP Routing
This section discusses how to use EMS-XDM to set XDM NE IP routing.
EMS-XDM uses TCP/IP communications to send datagrams (or data packets)
to SDH NEs. The datagrams can be routed over separate LANs.
EMS-XDM supports user-defined IP routing, which defines how datagrams are
routed between LANs. Datagram routing can also be defined using the Set
Route utility (accessed via the CDE).
The NE routing table defines the destination subnets that an NE communicates
with on the IP network. It allows system configurations where an NE is used to
route datagrams to other LAN segments; this type of NE is referred to as a
gateway.
All NEs have a default routing table with the destination (typically
EMS-XDM) and the GNE used to route the datagrams.
IP Address Scheme
Each IP network is assigned a unique network ID. Each host on an IP network
is assigned a unique 32-bit (or 64-bit) hardware independent address.
An IP address looks like 102.54.94.97. This is referred to as dotted decimal
notation, with each eight bits of an IP address (called an octet) separated from
the next eight bits by a period.
The 32-bit address has two parts. The prefix identifies the IP network to which
the host belongs. The remaining bits form the Host ID, which uniquely
identifies the host within the network. All hosts on the IP network have the
same network ID.
Each host on the network uses the network ID and the host ID to determine
which datagrams it should receive or ignore, and to determine the scope of its
transmissions.
Pinging the NE
EMS-XDM enables you to ping the NE to determine the quality of its network
connections, by comparing the transmitted and received signals.
In the EMS-XDM main window, select the NE, and on the menu bar select
System > Ping.
OR
Right-click the selected NE, and select Ping from the shortcut menu.
Addresses of specific NEs and the data bytes sent at the top of the list
Number of bytes received and approximate duration of the signal cycle
in each line
2. To clear the list of results from the previous ping session, click Clean.
3. To select the packet size in bytes, click the Packet Size slider. Standard
value is 64 bytes.
4. To stop transmitting packets, click Stop (default when window opened;
toggles Start/Stop when clicked).
5. To resume the transmission of packets, click Start.
IP Address Classes
In IP addressing, the value of the first octet determines the number of host ID
bits available in the IP address. The following table lists the relevant classes.
IP address classes
Network Range of first Network Available Available hosts per
class octet address bits networks network
A 1-126 8 126 16,777,214
B 128-191 16 16,384 65,534
C 192-223 24 2,097,151 254
As shown in the table, Class A IP networks support the largest number of host
addresses, while Class C supports the least.
IP Address Conventions
The Network Address, an IP address with all host ID bits set to zero, refers to
all hosts in the network identified by the network ID prefix.
An IP address with all host ID bits set to 1 is a Directed Broadcast to all the
hosts in the network identified by the network ID prefix.
If the source and destination hosts have the same network ID prefix in their IP
addresses, then they both belong to the same logical IP network. Therefore, the
source host can transmit the datagram over the LAN and assume that the
destination host will receive it.
If the source and destination hosts have different network ID prefixes in their
IP addresses, then they do not belong to the same IP network. Since the source
host cannot communicate with the destination host directly, it must send the
datagram to a router or gateway, which forwards it to another IP network.
IP Routing Features
GNEs support user-defined routes towards Ethernet LANs. This information is
entered in the IP routing table.
Subnet Masks
Subnet masks can be used to divide a subnet into several subnets, with fewer
hosts per subnet. This is of special significance when planning an IP network
with few hosts that does not require an entire Class C address range (254
hosts).
A subnet mask (a 32-bit number) determines the number of bits used for the
subnet and host portions of the address. In the subnet mask number, the number
1 determines a subnet division.
NE Network Interfaces/Routing
NEs may have the following IP network interfaces:
| Ethernet interface (named gtw)
| DCC network interfaces (name dcc0, dcc1, dcc2, and so on)
NEs can be installed in one of the following configurations:
| GNE: The NE is connected to EMS-XDM via Ethernet and communicates
with additional NEs through its DCC LAN interface. EMS-XDM uses the
GNE as the router to send datagrams to the NEs on the DCC subnet.
| DCC-only NE: The NE communicates only on its DCC subnetwork and is
not connected directly to a manager.
| Ethernet-only NE: The NE communicates with the manager via Ethernet
only.
GNEs and DCC-only NEs have a default entry in their routing table that
includes the destination (typically the manager) and the GNE used to route the
datagrams.
EMS-XDM displays the IP routing table, in which you can view and modify IP
routing entries for a selected XDM NE, allowing system configurations where
an NE is used to route datagrams to other LAN segments.
IP Routing Table
The IP routing table is used by EMS-XDM to route/forward management
communication packets between DCC channels and between DCC channels
and the Ethernet gateway.
It contains direct routes indicating neighboring elements derived autonomously
by the XDM static routes (including the default route) configured by the
operator, and routes derived by the OSPF protocol when the protocol is
enabled.
In the EMS-XDM main window, select the NE, and on the menu bar, select
Configuration > Routing Table.
The Routing Table window opens, displaying the Actual Routes tab,
where you can view a listing of the IP Routing Table used by the XDM NE.
(The read-only fields described in the following table.)
2. To refresh the window, on the menu bar, select Refresh > Refresh. The
read-only field Refreshed At displays the last refresh time.
Adding IP Routes
To add an IP route:
1. In the Static Routes tab of the Routing Table window, on the menu bar,
select Configuration > Create. The Add New Route window opens,
where you can add new routes to the Routing Table. The Main IP area
displays the main IP address and subnet mask of the NE read-only fields.
If the values you entered are valid, the OK button becomes active.
Editing IP Routes
To edit an IP route:
1. In the Static Routes tab of the Routing Table window, select the relevant
row.
2. On the menu bar, select Configuration > Edit. The Edit Route window
for the selected NE opens. The fields are the same as for the Add Route
window (as shown in the previous procedure).
3. Fill in the fields, as described in the previous procedure.
4. Click OK to submit the changes.
Deleting IP Routes
To delete an IP route:
1. In the Routing Table window, select the relevant row.
2. On the menu bar, select Configuration > Delete. A confirmation window
opens, prompting you to confirm the deletion.
3. Click Yes to confirm. The selected IP route is deleted from the routing
table.
Field Description
OSPF Area Range Supports up to 12 distinct area ranges summarizing NEs
Table advertised over area boundaries. Instead of advertising NEs
individually, the ABR advertises the range.
Table rows are ordered by area ID and within that by range
address. You can edit selected rows and add and remove area
ranges from the table. Default Area Range table contains no
entries.
Range Address and Range Mask fields define subnet of NEs.
Area ID dropdown list displays area IDs already defined.
LAN Emulation Toggles built-in LAN emulation interworking function. When
Interworking enabled, prevents packet duplication from flooding domain with
multiple XDM gateways (dynamic routing "islands"). When
performing OSPF over LAN Emulation interface, EMS-XDM
performs multicast address translation to allow elements in
flooding domain. Part of this mechanism works by decreasing
OSPF router priority to management station. Default value of
priority decrement is 1 (range 1-100).
Management Address and Management Mask must match IP
address of Management Station defined as subnet.
3. On the toolbar, click to apply the changes to the NE. The system
downloads the configuration to the NE after performing a validation check
to confirm that the new entry is unique.
3. On the toolbar, click to apply the changes to the NE. The system
downloads the configuration to the NE after performing a validation check
to confirm that the new entry is unique.
Terminating DCCs
To terminate a DCC, you need to connect the MS or RS DCC object to a DCC
TTP and then associate the termination with an IP network interface.
The RS-DCC or MS-DCC for a selected port is terminated. In the MS or RS
Internals window, you can begin the process of associating a selected DCC
object with an existing network interface.
| Terminating DCC Process
| Changing Default Encapsulation Attribute
| Viewing Terminated DCC Channels
| Editing Terminated DCC Channels
| Deleting Terminated DCC Channels
To terminate DCCs:
1. In the Shelf View, double-click a card to open its Card Internals window.
The Card Internals window for the selected card opens.
2. Select the relevant port to display the MS or RS objects in the Zoom area.
3. In the Zoom area, double-click the MS or RS object. The relevant MS or
RS Overhead Bytes window opens, displaying DCC and OW tabs.
4. In the DCC tab, in the Port area, right-click a DCC object, and on the
shortcut menu, select Terminate DCC. The Zoom area displays a
connection arrow between the DCC object and relevant MS or RS DCC
object.
2. To edit an OSPF interface, select the relevant row, and on the menu bar,
select Configuration > Edit.
3. Fill in the fields, as described in Network I/fs window.
Additional read-only fields in the OSPF I/fs tab include:
The Start Time field shows the date and time when the EMS-XDM
started collecting PM data
The Duration field shows the PM time interval (one day or 15 minutes)
The Monitored Seconds field shows the monitored seconds
4. To refresh the contents of the Current PM window, on the menu bar select
File > Refresh.
For example, if you specify a period of two hours in the From and To
fields, and select the 15 Min option in the Window Duration field, the
data table shows eight lines of (nonzero) PM data.
6. When you finish setting the relevant period and the window duration, on
the toolbar, click the relevant 24 Hours or 15 Min button to retrieve the
data. Results vary depending on object counters.
Setting NE Time
EMS-XDM enables you to manually set the NE real-time clock (date and time)
(even though EMS-XDM automatically updates the clock settings every few
minutes).
In the EMS-XDM main window, select the required NE and on the menu
bar, select Configuration > Set NE Time.
A message window opens confirming that the system clock for the selected
NE was updated.
If you are accessing the Card Internals View for the first time after an NE
was created using the process described in Workflow, it may take a few
extra moments for the Card Internals View to open, as the system uploads
the relevant data from the NE. When opening a Card Internals View that
has been opened previously (and whose data has already been uploaded),
EMS-XDM compares the actual NE data with the reflection of that data in
its database, and only uploads the differences.
Setting NE Passwords
EMS-XDM provides the NE password security feature to prevent unauthorized
users from accessing the NE. Once an NE password is assigned, users who
attempt to access the NE must submit the NE password prior to logging in.
To set an NE password:
1. In the Shelf View, on the menu bar, select System > NE Password.
OR
In the EMS-XDM main window, select an NE and on the menu bar, select
System > NE Password.
Uploading a Specific NE
EMS-XDM enables administrators to manually upload basic data stored in a
selected NE.
In the EMS-XDM main window, select an NE and on the menu bar, select
System > Upload NE Data.
When performing this procedure, only the basic data (including the NE
configuration, as stored on its xMCP/MXC card and NE XC sets) is
uploaded.
Managing NE Inventory
EMS-XDM enables you to view a wide range of information about the NEs
managed by the system.
| Viewing NE Inventory
| Viewing NE States
| Filtering NE Inventory
| Printing NE Inventory Lists
Viewing NE Inventory
To view NE inventory:
1. In the Shelf View or EMS-XDM main window, on the menu bar, select
System > Inventory. The Inventory window opens.
The expected cards can also be viewed in the NE list by clicking the plus
sign (+) next to the NE. The expected cards, equipment, and subequipment
appear in the tree beneath the NE.
Viewing NE States
EMS-XDM enables you to view a comprehensive list of all NEs and their
current states during an upload.
To view NE states:
1. In the Inventory window, click NE State. The NE State window opens,
displaying read-only fields, as described in the following table.
2. Click Save to save the information that appears in this window as an ASCII
file in the location: \temp\NEState.log.
3. Click Refresh to update the information in the window.
Field Description
Main Address NE IP address.
Gateway Address NE gateway address.
NE ID NE ID determined during NE installation.
Subnet NE subnet ID defined during NE creation.
% Background Percentage of background upload currently completed.
Summary Displayed after upload, includes number of NEs involved in operation.
Filtering NE Inventory
EMS-XDM enables you to filter the criteria of the card inventory displayed.
2. In the Filter area (at the bottom of the window), select the relevant option
button. (Options: Modules Cage Cards, XMCP Cards, PIO Cards,
HLXC Cards, SIO Cards, Other, and OM Cards.) The Cards Inventory
area displays the relevant card criteria, according to your selection.
A redundant GNE is configured using the Set Route utility, which can be
accessed via the CDE.
The Set Route utility makes changes in a file named /etc/routing. When EMS-
XDM is initialized upon start-up, it configures EMS-XDM routing to the
network according to the definitions made in this file. This includes the
primary and secondary (if it exists) routes to the network.
2. Select utility options via the Main Menu at the bottom of the window.
5. To save the settings, return to the Set Route main menu, and type 7.
Deleting NEs
EMS-XDM enables you to permanently delete NEs, as required.
To delete an NE:
1. In the EMS-XDM main window, select the NE to delete.
2. On the menu bar, select Configuration > Element > Delete. A
confirmation window opens, prompting you to confirm the deletion.
3. Click Yes to delete the selected NE.
Workflow
Using EMS-XDM, you can access the Shelf View of the managed NEs. The
Shelf View displays a map of the cards installed in the NE shelf, together with
information relevant to each, for example, alarms.
The Shelf View has its own menu for selecting management functions, which
is useful when EMS-XDM is integrated under an upper-level management
system like LightSoft.
After a card has been physically installed and commissioned, you can view or
modify its configuration details. These generic functions are typically
performed during routine system operations, as needed. In addition, you may
need to perform certain configuration operations for specific card types, such as
for the Main Control Processor/Main Cross connect and Control (xMCP/MXC)
card and XDM protection cards.
You can perform the following configuration operations using the Shelf View,
in any order, as required:
| Assigning Cards to Slots
| Viewing and modifying card configuration parameters
| Performing xMCP/MXC card synchronization
| Configuring various protections options, such as:
IO Protection
MSP Linear Protection
TRP/CMBR Protection
RSTP Protection
MS Shared Protection Ring
ALS protection for TRP10, TRP 25, and OFA cards
XDM Shelves
The following XDM NEs are managed by EMS-XDM:
| XDM-40 Shelf
| XDM-50 Shelf
| XDM-100/XDM-100H Shelf
| XDM-200 Shelf
| XDM-300 shelf
| XDM-400 shelf
| XDM-500 Shelf
| XDM-1000 Shelf
| XDM-2000 Shelf
Shelf Views vary somewhat in their appearance, depending on the specific
shelf configuration in use.
XDM-40 Shelf
The XDM-40 shelf consists of an upper cage housing DWDM and
amplification modules and a card cage housing the I/O cards, common cards,
xFCU40, and fans power supply (PSFU).
The XDM-40 shelf consists of the following:
| Upper cage slots, designated M1 and M2 for DWDM and amplifier
modules.
| Two slots for redundant input filter units (xINF40).
| External Connection Module (ECM40) that provides connections for
alarms, orderwire (OW) interfaces, and LCT-XDM.
| Card cage with the following slots:
Two slots, designated I1 and I2 for I/O optical
transponders/combiners/amplifiers.
One slot, designated C1 for an xMCP_B card.
One slot, designated C3 for the MECP_OSC or MECP_OSC_OW card
(OW in the card designation indicates built-in support for the OW),
which provides optical out-of-band management communication
interfaces for the xMCP_B card. The physical connection to the OW is
made through the ECM40.
One slot, designated F2 for the PSFU.
One slot, designated F1 for the fan cooling units (xFCU40).
XDM-50 Shelf
The XDM-50 is available in two configurations: a basic shelf, and an expanded
shelf.
The basic XDM-50 shelf consists of the following:
| Slots for I/O interface modules
| Dedicated slots for the following cards and modules:
MXC (2 cards)
CCP_2
INF50
FCU50
ECU50
The module and card slots are distributed as follows:
Two (2) slots, A and B, allocated for the MXC cards (main and
protection). Each card has three SFPs (OTRs) and a PDB2_21.
Four (4) slots, I1 to I4, optimally allocated for I/O interface modules.
One (1) slot allocated for the ECU50 card, which is located beneath the
MXCs.
The expanded XDM-50 shelf consists of the following:
| Basic XDM-50 shelf.
| TPU/OCU (Tributary Protection Unit /Optical CWDM Unit) expansion
shelf mounted on top of the basic shelf, providing protection for electrical
I/O modules.
The TPU/OCU is a single-shelf cage with slots for Tributary Protection
Modules (TPMs) and Tributary Control (TC) or Tributary Control and Fan
(TCF) modules.
XDM-100/XDM-100H Shelf
The XDM-100 shelf is available in the following shelf configurations:
| Basic XDM-100 shelf with two MXC cards for supporting system
redundancy
| Expanded XDM-100 shelf with I/O protection (TPU/OCU mounted on top
of the basic shelf providing protection to the I/O modules)
| XDM-100H
The basic XDM-100 cage consists of the following:
| Slots for I/O interface modules
| Dedicated slots for the following cards and modules:
MXC
ECU/ECUF
The modules and cards are distributed as follows:
Eight (8) slots, I1 to I8, optimally allocated for I/O interface modules.
Two (2) slots, A and B respectively, allocated for the MXC cards (main
and protection). Each card has two slots (A1/A2 and B1/B2) to
accommodate SDH aggregate modules.
One (1) slot allocated for the ECU card, which is located beneath the
MXCs.
XDM-200 Shelf
The XDM-200 shelf consists of the following:
| Basic XDM-100 shelf with the common cards and I/O (transponder and
combiner) modules
| OCU shelf located on top of the basic shelf, accommodating passive optical
networking modules (Mux/DeMux, OADM, and splitter/coupler) and a
control module
EMS-XDM can be installed in either 2200 mm or 2600 mm ETSI racks, as
well as in 19" racks.
XDM-300 Shelf
The XDM-300 shelf is available in the following shelf configurations:
| Basic XDM-300 shelf with two MXC cards for supporting system
redundancy
| Expanded via three expansion shelves, TPU shelves which add tributary
protection capability, or CWDM modules (Mux/DeMux, OADM, optical
filters), respectively
The basic XDM-300 cage consists of the following:
| Two slots (MXC-A and MXC-B) allocated for the matrix card
| One (1) slot allocated for the ECU300/ECU300F cards, located beneath the
MXC-B
| One (1) slot allocated for the FCU300 (Fan Control Unit)
XDM-400 Shelf
The XDM-400 shelf consists of a single-row cage housing the I/O, matrix,
processor, and common cards. The shelf also includes two Input Power Filter
units (xINF4) and one Fan Control unit (xFCU4) containing five separate fans.
Slot assignment is as follows:
| Five slots (IS1 to IS5) allocated to I/O cards
| Two slots (X1 and X2) allocated to the matrix cards
| Two slots (C1 and C2) allocated to the xMCP cards
| Two slots (MS1 and MS2) allocated to electrical interface connection
modules
XDM-500 Shelf
The XDM-500 shelf consists of a single-row cage housing the I/O, matrix,
processor, and common cards. The electrical interface connection modules and
DWDM/OADM modules are housed in the central modules area. The shelf also
includes two xINF units and three xFCU units. Slot assignment is as follows:
| Six slots (IC1to IC6) flexibly allocated to I/O cards and/or transponders
| Four slots (MC1 to MC4) allocated to electric interface connection modules
or DWDM/OADM modules
| Two slots (X1 and X2) allocated to the matrix cards
| Two slots (C1 and C2) allocated to the xMCP cards
XDM-1000 Shelf
The XDM-1000 shelf consists of two cages. The cards (lower) cage houses the
I/O, matrix, processor, and common cards. The modules (upper) cage houses
the electrical interface connection modules and DWDM/OADM modules. The
shelf also includes two xINF units and three xFCU units. Slot allocation is as
follows:
| Cards cage:
12 slots (I1 to I12) flexibly allocated to I/O cards
Two slots (X1 and X2) allocated to the matrix cards
Two slots (C1 and C2) allocated to the xMCP cards
| Modules cage:
11 slots (M-IO1 to M-IO11) allocated to electric interface connection
modules or DWDM/OADM, optical booster, and optical preamp
modules
XDM-2000 Shelf
The XDM-2000 shelf consists of a single cage containing two slots for
Mux/DeMux cards and/or HLXC cards; 12 slots for transponders, optical fiber
amplifiers, and other optical modules; and 2 slots for the xMCP cards. The
external connection module MECP is located in the upper section of the cage.
The shelf also includes two xINF units and three xFCU units. Slot assignment
is as follows:
| 12 slots (I1 to I12) allocated to transponders and other optical modules
| Two slots (X1 and X2) allocated for Mux/DeMux cards or for the matrix
HLXC cards (depending on system configuration)
| Two slots (C1 and C2) allocated to the xMCP cards
| MECP
Card Symbols
Each card shown in the Shelf View is displayed with color-coded indications of
the card status. Alarm indications are shown as two colored LEDs on top of
cards that can cause alarms. Color coding of the alarm indicators is described in
the next section.
Card symbols
Icon Name Description
Usage XC is carrying live traffic through card or card is serving
as timing reference for NE. Icon appears on EIS card after
flow creation, even when no traffic is present.
Alarm Highest severity transmission, module, or transceiver
Severity alarm present on card, according to color coding.
Maintenance Maintenance operation (for example, loopback) currently
active on a card internal object. When icon appears, you
can drill down to Card Internals View and check
Maintenance List for active operation.
Protection Card has been configured as protection card in protection
configuration supported by EMS-XDM. Letters or
numbers displayed on top of icon indicate protection
scheme, as follows:
| IOP: IO Protection
| 1+1: MSP Linear Protection)
| TRP Protection
| Ring: MS Shared Protection Ring
The color of shield-shaped Protection icon determines
whether card is currently active or not. Blue indicates an
active card; yellow an inactive card not carrying traffic.
Main Card is main (protected) card (with IOP protection
(Protected) scheme).
Standby Card is protecting (standby) card in a protection
configuration supported by EMS-XDM (with IOP
protection scheme).
Note: A card initially designated as standby has a yellow
shield icon. If a failure occurs on card, icon changes to
blue.
Panel Layout
EMS-XDM features a card panel layout which enables you to view the physical
panel of selected cards, including ports and LED positions.
If you open the Slot Assignment window on a card that has been
previously assigned, the window opens with the card type selected.
3. Click Assign. The Select Expected Type tree displays the XDM card
categories.
4. Click the plus sign (+) to the left of the XDM card category to display the
available card types. These appear according to the slot number selected.
5. Select the card to assign.
If you are assigning a card that requires a matching module in the modules
cage of the XDM 100 through XDM 1000 NE shelf, a second Slot
Assignment window is opened automatically, allowing you to assign the
modules cage card. Complete the slot assignment details in both Slot
Assignment windows.
When the card is defined as an IOP standby card, the icon appears at the
bottom of the card in the Shelf View.
7. Select the Include Upload checkbox to upload comprehensive data for the
card, including card internals data; clear it to upload only a minimal set of
data for the card. Assigning a card with Include Upload selected can take
far longer.
When a card is assigned with the Include Upload checkbox cleared,
further uploading of the card objects is done, as required (for example,
when selecting the card in the XC Browser). However, it should be noted
that subsequent uploading is done in the background (background upload)
and can take considerably longer. It is recommended to select Include
Upload when you want to do advanced provisioning on the card
immediately.
8. Click Apply to apply the changes. A progress bar indicates the progress of
the data download. The Slot Assignment window remains open for further
slot assignment operations.
9. Click Close to close the window.
To reassign a card:
During the background assignment process, the icon marks the actual slot
being assigned. No other actions should be performed that may affect this slot
until the process is completed.
Alternatively, users can use the ASA feature in GUI mode to assign one or
more cards on an as-needed basis. Unlike non-GUI mode which automatically
triggers the assignment process when a new card is inserted in the shelf, you
can activate the automatic slot assignment GUI when necessary from the Shelf
View Configuration menu.
2. To change the expected card type for a card/module, in the Expected Card
column on the right, select a card type option from the dropdown list. In
some cases, you may deliberately not want to assign a card when it is
encountered during the assignment process. If this is the case, select None
in the Expected Card dropdown list for that card, and on the toolbar, click
.
3. To reset all cards in the Actual Card list to the factory-default expected
card types, on the toolbar, click .
To activate ASA:
1. In the Shelf View, on the menu bar, select Configuration > Setup > Auto
Slot Assignment > Auto Slot Assignment. The Auto Slot Assignment
window opens.
2. In the Select NE/Slots to assign area on the left, select a slot and click
.
The selected NE and slot appear in the Selected NE/Slots area on the right.
To remove a slot from the Selected NE/Slots area, select the slot and click
.
Use and to add or remove all NEs/slots from the Selected
NE/Slots area.
ASA Troubleshooting
When operating in GUI mode, ASA features an additional table to determine
the appropriate card to be assigned. This table identifies module mismatch
errors that can occur when the expected card type does not match the actual
module on the card. The system first reads the actual card/module pair and then
checks this information against the table in the Actual to Expected Map
window to determine the expected card type for this actual card/module pair.
This expected card type is then assigned by the system.
If a module mismatch error occurs when operating in GUI mode, the system
attempts to fix the error by referring back to the Actual to Expected by
Module Map window. You can view the error message in the action history
log, and then refer to the table in the Actual to Expected by Module Map
window to determine the correct expected card for the assignment process. You
can use GUI mode to repeat the ASA assignment process for the affected card.
EMS-XDM enables you to readily identify section and automatic assignment
processes. In the Action History Log, ASA slot assignment processes appear
with an "(ASA)" prefix whereas Manual Slot Assignment processes do not.
| EIS/EISM cards may not be assignable if the card number specified in the
optional feature has been exceeded.
| OADM cards (of type OADM_AB for ALS functionality) assignment rules
are the same as TRP rules.
| MO_OADMxx cards must be inserted in the modules cage before they can
be assigned.
The following topics describe slot assignment limitations pertaining to specific
XDM shelves.
| XDM-100 Slot Assignment Limitations
| XDM-200 Assignment Limitations
| XDM-300 Assignment Limitations
| XDM-400 Assignment Limitations
| XDM-500 Assignment Limitations
| XDM-1000 Assignment Limitations
| XDM-2000 Assignment Limitations
5. In the Source NE field, type the name of the source (the NE from which
slot assignments are to be copied).
6. In Destination NE field, type the name of the Destination NE (the NE to
which the slot assignments are to be copied).
7. Click Duplicate to start the operation.
In the EMS-XDM main window, select System > Save Topology to XML.
2. Type the name of the file under which to save the NE configuration, and
click Save. There is no need to specify a file extension, since the system
automatically appends the *.XML extension to the file name you enter.
A message window opens, confirming the successful operation.
2. Select the file to import, and click Open. The EMS-XDM main window
opens with the imported topology and displays the NE icons colored in blue
to indicate that the upload process has begun.
Slot assignments are expressed by specifying the slot number, the equipment
type (expressed as the equipment expected type enumerator value), and the
Standby and Reassignment status of the card. For example, if a value of TRUE
is specified in the Standby line, the card is assigned as a standby card in a
protection scheme. If a value of TRUE is specified in the Reassign line, the
card is reassigned.
slotType = "M7"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
DTD File
The xcs.dtd file determines the rules for the XML XC documents. The
operations supported in this file are:
x CDATA #IMPLIED
y CDATA #IMPLIED
<CNE>
<CREATE_NE
ipAddress = "192.168.31.15"
x = "133"
y = "83"
dccSubnet = "1">
<ASSIGN_SLOTS
slotType = "M11"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M10"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M9"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M8"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M7"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M6"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M5"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M4"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M3"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M2"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "M1"
equipType = "4029"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "C3"
equipType = "10001"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "X2"
equipType = "2001"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I12"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I11"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I10"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I9"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I8"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I7"
equipType = "2021"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I6"
equipType = "2096"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I5"
equipType = "2002"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I4"
equipType = "2072"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I3"
equipType = "2037"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I2"
equipType = "2064"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "I1"
equipType = "0"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
<ASSIGN_SLOTS
slotType = "X1"
equipType = "2001"
standBy = "FALSE"
reassign = "FALSE">
</ASSIGN_SLOTS>
</CREATE_NE>
</CNE>
2. If desired, you can sort the data according to any column in the Topology
Links window by clicking the appropriate column header and clicking
for an ascending sort, or for a descending sort. (By default, the data
displayed is automatically sorted by A-EndPoint.)
RED Curves
Random Early Discard (RED) in EIS/EISM/EISMB cards is an advanced
technique for managing a switch buffer's queue and priority. It improves
network performance and is the optimal buffer management method. RED
drops packets on a random basis from overloaded queues at the network edge,
based on predefined thresholds triggered by the traffic on the network.
Typically, the percentage of packets dropped by RED is determined by a curve
that gradually increases until a maximum, at which point all packets are
dropped. This prevents the buffer on the EIS/EISM/EISMB port from
overflowing.
The EIS/EISM/EISMB has a 36 MB shared buffer for all of its ports. In EMS-
XDM, RED curves can be defined at the EIS/EISM/EISMB port level (EoS
and ETY) for each of the available Class of Service (CoS) levels: CoS6 (Gold),
CoS4 (Silver), CoS2 (Bronze), and CoS0 (Best Effort).
The following tables list the default RED curve settings for EoS and ETY
ports, where:
| Qmin is the threshold at which traffic from the selected queue begins to be
reduced through RED
| Qmax is the threshold beyond which all traffic from the selected queue is
dropped until congestion eases
For example, assume that two ETY ports are forwarding their traffic to a single
EoS port, and this traffic contains a combination of CoS6 (Gold) and CoS 0
(Best Effort) packets. In this case, the EoS port is configured with the default
RED value of 1,808 KB for the queue minimum. When congestion occurs on
the network and the buffer reaches 1,808 KB, the EIS/EISM/EISMB begins to
drop CoS0 (Best Effort) packets. When the buffer reaches 3,008 KB (the
default queue maximum), all CoS0 (Best Effort) packets are dropped.
Refer to the following sections:
| Viewing RED Curves
| Editing RED Curves
| Restoring Default RED Settings
2. To filter the table, select a port and/or S-VLAN CoS from the relevant
dropdown lists.
2. Edit the Qmin, Qmax, and Drop Probability fields, as required. Modified
settings appear highlighted in blue.
3. On the toolbar, click to apply the changes. A confirmation message
window opens, confirming that RED updated successfully. Changes are
reflected in the table and graph, and are applied to the EIS/EISM port.
1. In the Shelf View, select the card (it turns gray) and click . The Info
window for the selected card opens. If the data in the Info window does not
fit in the window, use the scroll bars to view all of it.
2. Click the Configuration tab to view and modify the configuration
parameters.
3. In the Attribute New Value column, modify the relevant fields. Choose an
option from a dropdown list or type new information into a text field.
4. To propagate the changes, in the Propagation column, select the relevant
checkboxes.
5. On the toolbar, click to apply the changes.
Field Description
Out Utilization (%) (Relevant only for PIO and SIO cards) Utilization of outgoing
2M/TU drop objects on the card.
In Utilization (%) (Relevant only for PIO and SIO cards) Utilization of incoming
2M/TU drop objects on the card.
Operational State Operation state:
| Enabled: operating properly
| Disabled: not operating due to, for example, a card reset or
power supply failure
(Read only)
Field Description
Vendor Serial number sorted in the ID ROM on each card and product
version number. A 0 or 0.0 in the Version Name field indicates
the card does not support this version. May be both a hardware
and software version number. Displays ECI Telecom. (Read
only)
HW Version Hardware version. (Read only)
HW Option Hardware options, if any. (Read only)
Serial Number Serial number. (Read only)
User Data User-defined description. (Read only)
UPack ID UPack ID. (Read only)
Workflow
Basic timing configuration operations include:
| Viewing and modifying timing configuration, including:
Defining NE-level timing
Selecting reference tributaries for the reference clock sources
Selecting the active timing sources
Setting the quality of the various timing sources, if needed
Defining the T3 (external clock) input type
Defining the T4 output port signal source and its parameters
| Performing Maintenance Operations on Timing Objects and TMUs
Available timing sources can be divided into four groups, according to quality:
| SDH signals that contain an SSM (S1 byte in the section overhead), which
defines the quality of the signal as a timing source
| 2 MHz/2 Mbps External Clock and 2M Unframed PDH tributary, which
have no indication as to their quality
| 2 Mbps-F (framed) External Clock and 2M Framed PDH tributary, which
have SSM quality value
| Internal clock of NE, which has a fixed predefined quality
You must manually assign quality values for each NE that has either a 2 MHz
External Clock or 2M Unframed PDH source. Before assigning these qualities,
it is the user's or administrator's responsibility to verify quality values,
according to the product specifications of each timing source. For the defined
levels of timing quality, refer to the "Timing Source Configuration - Quality"
field in the following table, Timing Configuration Window fields.
In the EMS-XDM main window, select the NE and on the menu bar, select
Configuration > Timing.
To modify timing parameters, in the Mode area, select Edit Mode from the
dropdown list (all fields in the window are enabled; most data in the
window is not refreshed).
Field Description
TMU Info Current active timing source (Internal/T3/IO). Working Mode fields
display whether TMU is Active or Standby.
TMU Left Internal or External.
Working Mode TMU Left Active or Standby.
TMU Right Internal or external.
Working Mode TMU Right Active or Standby.
T3 Input Consists of two external clock inputs (T3-1 and T3-2).
Configuration
<T3> <T3>-1 input:
| None: to remove/inhibit any signal on the <T3>-1 port
| 2 MHz
| 2 Mbps
| 2 Mbps-F (Framed)
<T3>-2 <T3>-2 input:
| None: to remove/inhibit any signal on the <T3>-2 port
| 2 MHz
| 2 Mbps
| 2 Mbps-F (Framed)
Timing Sources Assign logical reference to physical I/O port to be used as timing source.
Configuration NE uses timing source Quality parameter to determine preferred timing
source (active source) and inferior source (standby timing source).
Timing Source Select one of I/O Line references: I/O 1-4 or <T3>-1, <T3>-2 input.
Quality Timing source quality of selected timing source input. Options:
| PRC: Primary Reference Clock (10-11), such as atomic clock
source.
| SSUT: Synchronization Source Unit – Transit (5 x 10-9).
| SSUL: Synchronization Source Unit – Local (10-7).
| SEC: SDH Equipment Clock (4.6 x 10-6). NE Internal clock is
defined as SEC quality.
| DNU: (Do Not Use), cannot be selected for timing source.
| Invalid: Cannot be selected for timing source.
If Quality field is disabled, an SDH I/O is used as timing source and
transmitted as SSM or <T3> framed quality indication through S1 byte.
When this happens and you want to enter a different quality setting, you
can override SSMs received on tributary to allow operation, regardless of
quality level indicated by SSM.
To override SSM, on menu bar, select Edit > Override SSM > Enable,
and click User Quality button so that it appears pushed in.
Set Ql Select checkbox to manually set timing source quality.
Slot Slots with appropriate card assigned from which I/O line can be selected.
Tributary Physical port. You can select port in list for use.
<T4> Output Source for timing signal passed to two <T4> output ports on NE. Any
Configuration NE has ability to provide clock signal to external equipment
(<T4> signal) through relevant XDM ports.
Field Description
<T4>-1 Signal on <T4>-1. Options:
| OFF: to inhibit any signal on <T4>-1 port
| 2 MHz
| 2 Mbps
| 2 Mbps-F (Framed)
<T4>-2 <T4>-2 output. Options:
| OFF: to inhibit any signal on <T4>-2 port
| 2 MHz
| 2 Mbps
| 2 Mbps-F (Framed)
Source T4 output source (only from values in Priority table or as TMU output
(active source)):
| Tributary
| External
| Internal
| TMU
Squelch Whether timing signal is to be squelched, and at what threshold.
Status Squelch status. (Read only)
Enabled Enable squelching by clicking ON. When button is pressed (appears
pushed in), you can select value in Threshold dropdown list.
Threshold Squelch threshold defining minimum quality of T4 signal. If T4 signal is
degraded to quality below this value, it is automatically squelched, if
squelch is enabled.
Overview
This section discusses how to use EMS-XDM to configure and manage XDM
cards.
| Configuring Cards and Internal XDM Objects
| Common Cards
| Data Cards
| Optical Cards and Modules
| ASON ACP Cards
| AURORA-G Encryption Card
| Card and Internal XDM Objects Configuration
This section presents only some of the many card types available on the XDM.
Workflow
In the Card Internals View, you can view transmission information for a
selected card's internal objects and perform operations on internal XDM
objects, in any order as required. Note that some of the configuration options
described in this section may not be relevant to the configuration of your
system.
For easy navigation, you can open the parent Shelf View window for a
specific card directly from the Card Internals View window by selecting
File > Open Parent Window on the menu bar.
Zoom area
In the Zoom area of the Card Internals View window, you can view specific
information regarding a connection, and perform maintenance operations on
selected objects.
Common Cards
This section describes the Card Internals View windows of the common cards
used in the XDM shelf.
| HLXC/MXC Card Internals
| XIO Card Internals
| xMCPB Card Internals
| MECP Card Internals
For descriptions of additional common cards, including wiring interface units,
fan cooling unit, and input power filters, see XDM-40, 400, 500, 1000, 2000
Cards and Modules and XDM-50, 100, 200, 300 Cards and Modules.
HLXC/MXC/xMCP Cards
This section described the XDM matrix and main control cards.
SAM Modules
Two SDH Aggregate Modules (SAMs) are associated with each MXC-100/B
card. SAM1_4/E is an electrical aggregate module with four electrical STM-1
(155 Mbps) interfaces. SAM1_4/O is an optical aggregate module with four
STM-1 (155 Mbps) interfaces with slots for SFP transceivers. A maximum of
four SAM1_4/E (or SAM1_4/O) modules, totaling 16 interfaces, can be
incorporated in an XDM-100 shelf with full MXC-100/B redundancy, and a
maximum of two SAM1_4/E (or SAM1_4/O) modules, totaling 8 interfaces,
can be incorporated in an XDM-100 shelf with no MXC-100/B redundancy.
The XIO384F card combines the functionality of an HLXC card with that of
SDH I/O cards. XIO384F cards are installed in slots X1 and X2 of the shelf. It
is not possible to install an HLXC or XIO192 card together with an XIO384F
card in the same shelf. The XIO384F card includes the following:
| I/O subsystem: Supports one extractable optical module with either one
STM-64/OTU-2 port or four STM-16/OTU-1 ports:
| One STM-64/OTU-2 port: Supports the following extractable module
versions:
OMTX10_S: Includes a standard STM 64 XFP transceiver.
OMTX10: Includes an OTU-2 SFF transceiver with Forward Error
Correction (FEC) per ITU-T Rec. G.709, which improves the minimal
OSNR by more than 5.8 dB. The OMTX10 can be ordered with a fixed
single channel optical transceiver.
OMTX10_EF: Includes an OTU-2 SFF transceiver with Enhanced
Forward Error Correction (EFEC) which further improves minimal
OSNR by 2 dB relative to the G.709 FEC. FEC support is software
configurable (no FEC, FEC, or EFEC). The OMTX10_EF is available
with a tunable or fixed optical transceiver covering 40/80 channels in
the C band. The OMTX10_EF is also available with either NRZ or RZ
tunable transceivers, for a significant improvement in OSNR tolerance.
The OTX10_AT and OTX10_ATR are intended for exclusive use with
the OMTX10_EF transceiver. OMTX10_EF module can also be used
for the SIO164 card, and for 10 Gbps transponders and combiners
based on the CHTRB base card.
Four STM 16/OTU-1 SFP transceivers, supporting the extractable
module OMSC16_4, which can contain four independent SFP
transceivers featuring software configurable FEC. Two versions,
simultaneously enabled/disabled per port, are available:
Standard STM 16 SDH interface
OTU 1 interface with Forward Error Correction (FEC) per ITU T
Rec. G.709, which increases the maximum range by several dBs
There are four basic configuration variations possible when working with the
XIO384F card. The four configuration modes are grouped into two categories,
enabling optimization for different network working conditions, as follows:
| Category A:
Configuration 1 (XIO384F-1): Optimized for network designs that
include 2.5 G and 5 G SDH/data cards with an average level of low
order drop.
Configuration 2 (XIO384F-2): Optimized for network designs that
include 2.5 G, 5 G, 10 G SDH/data cards with a few DWDM cards used
in the zero capacity slots.
| Category B:
Configuration 3 (XIO384F-4): Optimized for network designs that
include 2.5 G and 5 G SDH/data cards with a higher level of low order
drop.
Configuration 4 (XIO384F-4): Optimized for network designs that
include 2.5 G, 5 G, 10 G SDH/data cards with an average number of
DWDM cards used in the zero or small capacity slots.
ECI Telecom offers different XIO384F configuration options to enable slot
capacity changes that reflect a network's changing needs. Administrators can
easily upgrade their slot capacity assignments by switching between
configuration options within the same category. All configuration details for
the NE remain the same except for the specific slot capacity definitions. There
is no need to redefine the cross connects or traffic trails or severity profile or
any other aspect of the NE configuration definition.
The following figure shows a sample XIO384F Card Internals View showing
an OMTx10 module (with 64 AU-4s, 1 stream, and FEC enabled, indicated by
OCH headers on Src/Snk objects in the Zoom area).
2. In the XIO card Setup window, click FEC Enable (or EFEC) to enable
Forward Error Correction on transponders. Transponders connected to each
other (as endpoints or regenerators) must have the same settings.
3. Click ALS ON or ALS OFF to adjust the ALS setting. When the ALS state
is set to ON, the laser transmission on the object is shut off when an LOS is
detected on the fiber on which it is transmitting.
Data Cards
This section describes the Card Internals View windows of the data cards
used in the XDM shelf.
| PIO/PIM/PDB Card Internals
| SIO/SIM Card Internals
| MPLS and Ethernet I/O Cards:
MCS Card Internals
EIS/EISM Card Internals
EISMB Card Internals
DIO Card Internals
DIOB/DIOM Card Internals
| ATS Card Internals
Both the physical interface and logical interface icons are displayed in pairs, to
indicate the Src and Snk objects of the respective interface.
The following figure shows a sample SIO164 Card Internals View displaying
an OMSC16_4 module with 16 AU-4s, 4 streams, and a concatenation group
(shown on objects 13 through 16 and 41 through 44 marked by "C"). (The
SIM64_XFP, SIM64_4, and SIM16_4 cards supported by XDM-300 are
similar to the SIO164.)
The area at the top of the window displays a view of the HO XC, such as the
VC-4 object to which the AU-4 is connected. If the HO XC is protected, both
AU-4s are displayed, with the arrow indicating the active connection.
The matrix displayed at the center of the AU-4 internals window displays the
LO XCs going through the HO XCS (XC set). Each of the squares in the matrix
represents a TU-12 (2 Mbps)-level XC. A 21 square block represents a TU-3-
level XC.
Select one of the LO XCs to display the details in the Zoom area at the bottom
of the AU-4 window.
If XCs were created on external DCC objects, select the object to view the
XCs in the Zoom area.
To view OW:
| In the RS or MS DCC window, click the OW tab. The RS or MSDCC
internals window opens, displaying the OW tab.
Mixed SIO
An SIO card consists of a common base card and plug-in modules. Mixed SIO
cards enable you to configure both STM-1 and STM-4 ports on the same SIO.
The mixed SIO feature provides enhanced flexibility and simplified slot
assignment by enabling you to select the number of ports and bitrates on the
card. One mixed SIO card type is available, the SIO1n4_16. For each
daughterboard on the card, you can select a separate plug-in module that
determines the bitrate and number of ports to be configured on the
daughterboard.
The following figure shows the SIO1n4_16 mixed SIO card type, which
contains four daughterboards and a maximum of 16 ports.
Plug-in modules use a simple convention that enables you to readily determine
the bitrate and number of ports that can be configured on any given
daughterboard. An EM in the module name signifies an equipment module; an
OM designates an optical module. The first two digits after the EM or OM text
designate the STM bitrate. For example, 01 indicates an STM-1, and 04
indicates an STM-4. The next digit in the sequence indicates the number of
times the specified STM rate is present on the daughterboard. For example, 1
indicates once, 2 means twice, and 4 specifies four times; an EM01_2_MIX
plug-in module is an equipment module containing two STM-1s.
The default state of the SIM card is disabled. Enabling the SIM
card is an optional feature and is available only for XDM-50
shelves.
In the About window, you can view your EMS-XDM system current
configuration details to check the maximum number of XDM-50 SIM NEs that
can be enabled for your system.
2. In the SIM Allowed field, enable the SIM mode if it is disabled. In the
dropdown list, select Enabled. (Once you have enabled the SIM mode, this
field is disabled for editing.)
Ports appear in the upper part of the window, where ports 1-16 are allocated to
Bank A and Ports 17-32 to Bank B. The bank is automatically selected by the
MCP and EMS according to the port ID.
2. Fill in the fields, as described in the following table. When changes are
made, the tab is highlighted in blue until you apply the changes.
3. On the toolbar, click to apply the changes.
Modifying TM Configuration
You can view and modify MCS traffic management (TM) CoS settings.
Viewing Alarms
You can view visible and invisible alarms and alarm severity profiles of MCS
ports.
3. Select a profile from the dropdown list and click Open. The Severity
Assignment window opens, displaying the severity profiles assigned to the
selected MCS port object.
Viewing Status
You can view a list of all the SDH and VSIs connections associated with the
MCS ports.
You can view and propagate equipment maintenance parameters of MCS ports.
Viewing Performance
You can view current and history PM counters, and PM threshold profiles for
MCS ports.
3. To refresh the contents of the Current PM window, on the menu bar select
File > Refresh.
To view PM thresholds:
1. In the MCS Card Internals window, select a port, and click the
Performance tab.
2. Click the Thresholds tab. The Thresholds tab opens, displaying a
dropdown list of options for viewing PM thresholds.
3. Select an option from the dropdown list, and click Open. The Thresholds
Profile window opens, where you can view and assign a PM profile and
modify threshold values for MCS objects.
Viewing Inventory
| Multicast VSI
| Viewing Switch FDB Maintenance Parameters
| VSI Policers
You can configure General, WRED, RSTP, and FDB parameters for the MCS
card Switch and its EIS ports (ETH UNI/NNI and MPLS NNI).
The remaining 12 profiles are fully configurable and can be associated with
every CoS within any port. Once the COS is associated with a WRED
profile, it is possible to change it to another profile (also to the default
profile). It is possible to select a specific WRED profile for a CoS within a
port instead of the default profile. Changes are logged into the activity log
file.
3. To change the FDB Over Quota Action attribute value, select an option
from the Attribute New Value dropdown list (Dropped or Forwarded).
4. In the Propagation field, select the Propagation button to propagate the
parameters.
You can view visible and invisible alarms and alarm severity profiles for the
Bridge and FDB of the MCS Switch (performed in a similar manner as for the
MCS ports).
You can view the RSTP, Bridge, and FDB status of the MCS card Switch.
You can view a list of all the SDH connections associated with the MCS
Switch.
3. Select an option from the dropdown list (Bridge or FDB) and click Open.
The relevant XC Set List window opens, displaying the XCSs associated
with the Bridge or FDB.
If there are no XC sets associated with the Switch, a message window
opens stating that no XCs were found.
You can manage Virtual Switch Interface (VSI) connections defined in the
network for the selected MCS card. You can view, create VSIs for MCS cards
to connect two networks for regulating traffic according to specified CoS
levels, modify, or delete them.
Creating VSIs
You can create VSIs for MCS cards to connect two networks to regulate traffic
according to specified CoS levels.
To create a VSI:
1. In Shelf View, select an MCS card, and on the menu bar, select
Connections > Create VSI.
OR
The VSI window opens, displaying the General tab. You can configure the
general parameters of the VSI.
2. In the Eth VPN ID field, enter the Etherent VPN ID that will identify this
VSI. (The range of values is from 1 to 4294967294). Each VSI has its own
unique Ethernet VPN ID.
3. In the VC Label field, enter the VC label.
4. In the User Label field, enter the user label.
5. In the Customer field, enter the customer name.
6. In the General Configuration area, in the Administrative State field,
choose an option from the dropdown list (Enabled or Disabled).
7. In the S-VLAN field, enter the S-VLAN that will identify this VSI. (The
range of values is from 1 to 4094). Each VSI has its own unique S-VLAN
ID.
8. In the VSI Type area, select the relevant options:
Select the VSI type:
Multipoint-to-Multipoint: allows an unlimited number of ports on
the VSI
OR
Point-to-Point: allows only two ports per VSI (paired as: two UNI,
two NNI, or one NNI and one UNI)
A Confirmation window opens, prompting you to confirm overwriting the
existing configuration.
11. To assign a NNI port, in the Service Ports List area, select the relevant
port from the dropdown list (so that the Type field displays NNI) and click
Add.
12. To assign a UNI port, in the Service Ports List area, do the following:
Select the relevant EoS or ETY port from the dropdown list (so that the
Type field displays UNI) and click Add.
In the C-VLAN field, to associate a C-VLAN ID with the current
L2VPN ID, select an option from the dropdown list:
Untagged: to associate any untagged packets from this customer
with this L2VPN ID.
All/Other: to associate all undistributed C-VLAN IDs from this
customer (that is, those CD-VIDs that have not been associated
with any other L2VPN IDs, including this current one) to this
L2VPN ID.
An available C-VLAN ID (range: 1-4094). (C-VLAN IDs already
in use on this port do not appear and cannot be selected.)
For VSIs, all C-VLAN IDs are assigned to the same port. There are 7 CoS
levels (shown as CoS0 through CoS7).
C-VLAN with All/Other will also carry untagged data since it also contains
CVLAN 0.
Repeat Steps 9 and 10, as needed, to continue adding ports and C-VLAN
IDs to the list. (You can associate additional C-VLAN IDs to a UNI port,
and after each association, add each to the list to the same port group.)
13. After adding all necessary ports and C-VLAN IDs to the selected L2VPN
ID, click the CoS tab to display the CoS Mapping area, where you can
map the customer priorities to the CoS levels supported by the XDM by
clicking the relevant PRI/CoS mapping options.
The number of policers (shown in the Service Ports tab) corresponds to the
CoS mapping in the CoS tab. The available policer profiles (shown in the
Service Ports tab) for UNI ports corresponds to the configured policer
profiles listed in the Policer Profiles tab of the MCS Card Internals
window.
By default, the CoS mapping is set to zero (as shown in the following
figure). PRI (priorities) are packets that pass from the user to the MCS card.
For Each PRI (priority), you can assign one CoS. However, for each CoS,
you can assign several PRIs.
Each successive port has the same number of CoS levels assigned as the
first UNI port in the list, according to the CoS/PRI mapping. For example,
if the first UNI in the list is mapped to three CoS/PRIs, and consequently
has three policers, then the second port also has three available policers
(that need to be configured separately).
14. In the Service Ports tab, select each port and configure its policing
parameters separately in the Policers area by choosing an option from the
relevant dropdown list:
State: for each policer, there are three possible states:
Blocking (traffic is blocked, policer parameters are disabled for
configuration)
Policing (regulates traffic according to specified CoS levels; policer
parameters CIR, CBS, EIR, and EBS are enabled for configuration)
No Rate Limit (allows unlimited traffic to pass through; policer
parameters are disabled for configuration)
CIR (KB/S): Committed Information Rate
CBS (KB): Committed Burst Size, value corresponds to selected CIR
option
EIR (KB/S): Excess Information Rate
EBS (KB): Excess Burst Size, value corresponds to selected CIR
option
This defines the corresponding CoS and traffic levels for the selected
customer priorities.
The Policers area displays the relevant policers per assigned CoS for the
selected UNI port.
15. When you have finished constructing the VSI, on the toolbar, click to
activate the new settings. A successful confirmation window opens.
Editing VSIs
To edit a VSI:
1. In the VSI Connections tab (of the MCS Card Internals window), select
the relevant row.
2. On the menu bar, select Configuration > Edit. The relevant VSI window
opens, displaying the same tabs and fields as for creating the selected VSI.
3. Edit the fields, as required. The L2VPN ID and S-VLAN cannot be
modified. Some editing actions can be traffic-affecting.
Deleting VSIs
To delete a VSI:
1. In the VSI Connections tab, select the relevant VSI in the table.
2. On the menu bar, select Configuration > Delete. A confirmation window
opens, prompting you to confirm the deletion.
3. Click Yes to confirm. The selected VSI is deleted.
EMS-XDM enables you to use the network IDs for propagating/copying NNI
port definitions (S-VIDs). You can fine-tune/prune traffic distribution by
propagating S-VLAN flows to assigned network and subnetwork IDs.
To register a flow:
1. In the VSI Connections tab, select the relevant VSI in the table.
2. Right-click and select S-VLAN Registration from the shortcut menu. The
S-VLAN Registration window opens, displaying the S-VID (in both the
first field as well as in the title bar), the S-VLAN name, and the customer
name (as read-only attributes), and two trees: Entire Network and
Propagation Target.
The Entire Network tree displays all NNI ports not displayed in the
Propagation Target tree. The Propagation Target tree displays the EoS
ports of the network of the selected (source) flow and all contained
subnetworks, except for ports of any bridges which have a flow of this S-
VLAN ID already assigned to them.
You can propagate/connect the VSI to the same NE, to another NE, or to
another MCS card, and you can add additional ports to the VSI.
3. In the Entire Network Tree, select the relevant object, which may be an
entire network, subnetwork, or EoS port, and click to add the
targets to the Propagation Target tree.
6. Click Yes. A results window opens showing how many new flows have
been created and how many failed. If successful, the selections in the
Propagation Targets list result in the creation of new flows or additions to
existing flow(s).
Flows are created based on separate MCS cards. If multiple ports are
included for the same MCS card, they will be created in the same flow. EoS
ports that already exist on the same card as the prototype flow will be
added to the prototype flow.
3. In the Select Entity field, choose the relevant option from the dropdown
list.
4. In the Window Duration field, select the relevant option (15 Min or 24
Hours, depending on the period you want to analyze).
5. In the From and To fields, specify the period of time for which you want to
retrieve historical data. The 15-minute or one-day interval is applied to that
time span. For example, if you specify a period of two hours in the From
and To fields, and select the 15 Min option in the Window Duration field,
the data table shows eight lines of (nonzero) PM data.
6. View the results in the table.
Filtering VSIs
You can filter the VSI connections displayed in the VSI Connections tab,
according to specified criteria.
3. To filter by VPN ID, in the VPN ID From and To fields, enter the range
for the VPN ID numbers (must be numeric).
4. To filter by user label, in the User Label field, enter a user label. Select the
adjacent Exact Match checkbox to display filtered results with an identical
matching name. Select the adjacent Case Sensitive checkbox to display
case-sensitive matching entries.
5. To filter by customer, in the Customer field, enter a customer name. Select
the adjacent Exact Match checkbox to display filtered results with an
identical matching name. Select the adjacent Case Sensitive checkbox to
display case-sensitive matching entries.
6. To filter by service type, in the Service Type field, choose an option from
the dropdown list.
Printing VSIs
Exporting VSIs
To export a flow:
1. In the VSI Connections tab (of the MCS Card Internals window), do one
of the following:
To export a selected VSI connection, select the relevant VSI connection
row, right-click and select Export Selected to File on the shortcut
menu.
OR
To export the entire VSI connections list, right-click in the list and
select Export to File on the shortcut menu.
The Save VSI window opens for defining a file name and location.
Importing VSIs
EMS-XDM allows you to import information into the VSI connections list.
To import a VSI:
1. In the VSI Connections tab (of the MCS Card Internals window), select
the relevant row.
2. Right-click and select Import on the shortcut menu to open a window
where you can select the file.
3. Browse to the file, select, and click OK. The file is imported into the VSI
connections list and the information it contains is added to the table.
5. Select two Ethernet ports of the same type (two ETY or two EoS UNI/NNI
ports) and click Add to add them to the Selected Ports list.
By default, RSTP is disabled for UNI ports and therefore they are
available/enabled for selection in Available Ports list in the Service Ports
tab.
However, NNI ports with enabled RSTP appear disabled in this list, and
you must first disable RSTP before proceeding to configure dual homing.
To disable RSTP for NNI ports:
a. Select the Switch, click the Configuration tab, click the RSTP tab,
and in the Ports RSTP Configuration area, in the relevant port row,
select Disable from the dropdown list.
b. On the toolbar, click to apply the changes. A message window
opens confirming the successful operation.
6. Click the CoS tab and set the CoS options in the Ingress and Egress areas.
7. In the Eth VPN Id, VC Label, User Label, and Customer fields, enter the
relevant information.
Multicast VSI
At the same time, the same infrastructure is used for bidirectional VPLS traffic,
carrying the IPTV subscriber control traffic (IGMP packets) back upstream to
the edge routers, as well as transporting additional bidirectional VOD, VoIP,
and HSI services. This means that a single infrastructure can be used to supply
all triple play service requests, optimizing network efficiency and capacity with
minimal overhead in cost or complexity.
In summary, EMS-XDM provides a full triple play solution, incorporating
P2MP multicast tunnels, star VPLS, and IGMP snooping:
| P2MP multicast tunnels carry IPTV content in an efficient drop-and-
continue manner from the head-end router, through the root PE to all leaf
PEs.
| VPLS star carries all other P2P triple play services such as VoIP, VoD, and
HIS, as well as IGMP messages both upstream (request/leave messages
from the customer) to the root, and downstream (query messages from the
router) to the leaf PEs.
| IGMP snooping can be enabled at the leaf PEs to deliver only the IPTV
channels dynamically requested by the user. Alternatively, the flood-all-
groups option allows to unconditionally transmit the traffic to the access
ports.
| Finally, each service can be configured to deliver traffic of specified static
multicast addresses per access port, instead or in addition to enabling
IGMP.
In the MCS card, you can configure multicast (MC) VSIs.
5. On the toolbar, click to activate the new settings. For Rooted-MP Leaf
VSIs, the Multicast Configuration and Multicast Status tabs are enabled,
allowing you to configure additional MC settings, including IGMP
snooping and configuration and MC configuration and status. For Rooted-
MP Root VSIs, the P2MP XC tab is enabled, allowing you to configure
point-to-multipoint XCs (tunnels).
4. In the Service Ports tab, select each port and configure its policing
parameters separately in the Policers area by choosing an option from the
relevant dropdown list.
5. When you have finished constructing the VSI, on the toolbar, click to
activate the new settings. A successful confirmation window opens.
In the VSI Connections tab, the Service Type column displays the new
value: Rooted Multipoint (Root or Leaf). Up to 20 Multicast VSIs (Root
and Leaf) per MCS can be created.
You can sort the table per column title. After clicking Apply a new row
appears at the appropriate location (per current sort order).
If you attempt to add the same address twice, a message appears warning
that the address already exists. (The system does not allow duplications.)
3. In the P2MP XC List, select the relevant tunnel ID to map to a CoS. You
can select one tunnel ID per CoS.
4. In the Add P2MP XC area, choose a CoS from the dropdown list, and
click Add.
(When you connect a VSI to a tunnel, the Tunnel Usage Number changes
in the MPLS XC Connections tab.)
5. On the toolbar, click to apply the changes to the NE.
You can view FDB and Bridge maintenance parameters for the MCS Switch.
VSI Policers
In the MCS Card Internals window, you can create VSI policer profiles and
configure VSI policers.
Before you can configure VSI policers, you have to configure ports, as
described in the first two steps of the following procedure.
4. Click the CoS tab, and in the UNI and E-NNI areas, edit the fields as
required by choosing relevant options from the dropdown lists. Select Map
All as checkbox or clear it and select individual priority and CoS options in
the Ingress and Egress areas.
5. Click the Service Ports tab.
6. In the Available Ports area, select the port(s) and click Add to add the
port(s) to the Selected Ports list.
7. In the Selected Ports list, select the UNI or E-NNI port. The EoS area
displays the selected port's details in the Domain, Type, and Bandwidth
fields. (C-VLAN and Policers areas vary per port as well.)
8. In the C-VLAN field, select an option from the dropdown list (All/Other,
Untagged, or a C-VLAN value) and click Add.
9. To map a policer to a policer profile, in the Policers area in the relevant
CoS row(s), select the state (Blocked, Policing, No Rate Limit) and
policer profile from the dropdown lists.
10. On the toolbar, click to apply the changes. A message window opens,
confirming the successful creation of the VSI. The new VSI appears in the
list in the VSI Connections tab. The CoS tab of the VSI window displays
the CoS mapping as External NNI (E-NNI).
3. Select an option (Bridge or FDB) from the dropdown list, and click Open.
The Performance History window opens, where you can view history PM
counters (at 15 minute and 24 hour intervals) per selected dates.
Viewing PM Thresholds
To view PM thresholds:
1. In the MCS Card Internals window, select a port, and click the
Performance tab.
2. Click the Thresholds tab. The tab opens, displaying a dropdown list of
options for which you can choose to view PM thresholds.
| Viewing VSIs
| Filtering MPLS XCs
| Exporting/Importing XCs
| Printing MPLS XC List
| Enabling Huge PM Mechanism
| Viewing MPLS XC Alarms
| Viewing MPLS PM Counters
For further information regarding MPLS, refer to the MPLS user manuals.
MPLS Overview
EMS-XDM supports MPLS tunnels (XCs) as part of its Virtual Private LAN
Service (VPLS) management solution. VPLS provides connectivity between
geographically dispersed Customer Ethernet (CE) sites across a Provider
network, as if they were connected with a LAN. The interconnected CEs form a
private MPLS VPN and communicate among themselves using Ethernet
bridging and MAC learning.
Label switching facilitates packet forwarding via a full mesh of MPLS label
switched paths (LSPs) or tunnels between the Provider's edge (PE) sites. The
source PE appends the following two MPLS labels to each customer's Ethernet
packet entering the tunnel:
| VC label: Represents the VPN to which the packet belongs. It serves as
demultiplexor field, aggregating multiple VPNs into a single tunnel,
providing scalable tunneling (unlike a dedicated tunnel per VPN).
| Tunnel label: Represents the tunnel to which the packet is mapped.
The transit Ps switch the MPLS packets from the incoming port and label to the
outgoing port and label. The Destination PE determines it is the tunnel
destination based on the Tunnel label, and derives the packet VPN from the VC
label. It then forwards the packet to the destination Ethernet port, based on the
packet's MAC DA, after removal of the two MPLS labels, and forwards the
packet to the CE port.
QoS
| Two Colors per tunnel: Packets within each tunnel are marked with one of
two colors: Green or Yellow. A congested MCS, by default, discards
Yellow packets before Green packets. The color of a packet is assigned by
the service policer at the source PE, after which it is indicated in special
bits called EXP in the Tunnel label. This color remains with the packet
until it leaves the MCS network towards the CE.
| Protection per tunnel: P2P and P2MP tunnels can be protected against a
failure of a link or node along their path, using pre-establishing backup
LSPs called bypass tunnels.
| Traffic Management per MCS: To ensure the QoS assigned to each P2P
or P2MP tunnel in the data plane, MCS applies advanced traffic
management (TM) mechanisms.
| OAM per tunnel: P2P and P2MP tunnel OAM allows to verify that a
tunnel has correct connectivity and delivers the required availability and
QoS.
| CAC and Path Finding per tunnel (currently supported only via
LightSoft NMS): CAC verifies that there is enough bandwidth on the path
before a tunnel is established. If the bandwidth is insufficient, the new
tunnel is rejected. Path calculation finds out an optimal path for the tunnel
subject to user-preconfigured constraints such as bandwidth and explicit
path.
Traffic Manager
The MCS Traffic Manager (TM) ensures that each tunnel gets its assigned
bandwidth and other QoS parameters.
The TM works on the egress port, that is, after packet classification and right
before packets are transmitted into the MoT line. Each tunnel undergoes the
following TM functions:
| WRED at Tunnel, Class, and Port levels: Provides buffering and TCP-
friendly congestion management. Each tunnel is assigned a dedicated
queue to ensure that the traffic of one tunnel will not affect another tunnel,
this forms the basis for tunnel bandwidth guarantees in the MCS. Each
queue is assigned a WRED drop profile that consists of two WRED curves,
one for Green and one for Yellow-marked packets.
| Shaping at Class level: Each Class is assigned two rate limits, committed
(CIR) and peak (PIR). The CIR is automatically configured as:
Class CIR = Sum(Tunnel User BW)/CoS Booking Factor
where Tunnel User BW is the bandwidth configured by the user for the
tunnel and CoS Booking Factor is a user-configurable value per Class per
MCS to allow overbooking.
For example, if a Class in port contains 10 tunnels of 1Mbps and the CoS
Booking Factor is 2 then CIR=(10x1)/2=5Mbps.
Workflow
Assigning PE IDs
You need to assign the PE ID per each new XDM NE to which you want to
create MPLS XCs. (By default, the PE ID is set as 65535 and needs to be
changed per XDM NE.) You cannot assign MoT ports before defining the PE
ID.
If the NNI port is connected to a VSI (indicated by a traffic icon on the port)
before changing the port type, remove the VSI by deleting it in the VSI
Connections tab.
4. Click the Configuration > General tab. The General tab opens, displaying
general parameters, including tunnel ID, name and type and XC parameters
including role and incoming/outgoing ports, labels, and source/destination
PEs. (The Tunnel ID and Subtunnel Destination PE fields are read-
only/empty untl after the XC is created.)
5. In the Tunnel Name field, type the tunnel name.
6. In the Customer field, type the customer name.
7. In the Tunnel Type area, select P2P.
8. In the CoS field, select an option (0-7) from the dropdown list.
9. In the Bandwidth (MB/s) fields, type the relevant bandwidth.
10. In the MPLS XC area, in the Select Role field, choose an option (Head,
Transit, or Tail). The fields in the IN (incoming) and OUT (outgoing)
areas are enabled per XC Role selection.
11. (Enabled when XC Role is Transit or Tail) In the IN area, choose the
relevant in-segment (SEG-IN) parameters for the tunnel:
In the In Port field, choose an option from the dropdown list.
In the In MPLS Label, type the relevant value.
In the Source PE field, type the relevant value.
12. (Enabled when XC Role is Head or Transit) In the OUT area, choose the
relevant out-segment (SEG-OUT) parameters:
In the Out Port field, choose an option from the dropdown list
(displays a list of configured MoT ports).
In the Out MPLS Label field, type the relevant value.
In the Destination PE field, type the relevant value.
13. On the toolbar, click to apply the changes.
P2MP XC highlights:
| Comprises one or more subtunnels, where each subtunnel must have a
different destination PE
| Common parameters shared by all its subtunnels, and per subtunnel
parameters dedicated per subtunnel (such as unique Out Port assigned per
subtunnel)
| All subtunnels MUST share a single In-Segment
| Subtunnels MAY share an Out-Segment ("branch") or Out Port
| XC Role can only be of the following two types:
Head: when all subtunnels are Head
OR
Transit & Tail: when up to one subtunnel is Tail and all other
subtunnels (if exist) are Transit
| Subtunnels MAY share bypass tunnels
| Data plane (NP and TM) is aware of branches not subtunnels, therefore:
If subtunnels share an Out-Segment, only one of them is configured in
the data plane (P2MP ID, Branch)
If subtunnels share a bypass tunnel, the bypass tunnel is configured for
only one of them in the data plane (P2MP ID, Branch, Alternative
Branch
You can create P2MP XCs for MPLS EoS/MoT ports.
You can view P2MP XCs for a selected MoT port or for the entire NE by
selecting the MCS Switch.
After you create a P2MP XC, you must configure at least one subtunnel to
enable traffic flow on the P2MP tunnel. To configure a P2MP subtunnel, you
must first configure a P2MP XC with the relevant common parameters, and
then configure the subtunnel. (The common parameters are shared by all
subtunnels belonging to the P2MP XC.) You can create and delete a subtunnel
independently of other subtunnels.
You can configure protection for P2P and P2MP XCs to designate bypass and
protected tunnels. By default, the XC protection type is set as "unprotected".
For information regarding MPLS protection schemes.
To configure MPLS XC protection, first you must provision the bypass port
and XC before you can provision the protected port and XC.
For P2MP XCs you provision protection within the common tunnel.
6. Click Apply to apply the changes. The Edit NMS Tunnel Id window
closes and the changes appear in the NMS Tunnel ID field (in the
Advanced tab).
7. View the Tunnel Oper State field to view the current operational state of
the tunnel (Up or Down).
8. View the Tunnel Usage field to see the relevant tunnel usage value.
9. Click OK to submit the changes.
You can view a list of MPLS XCs provisioned in the MCS card.
2. Click the Connections > MPLS XC Connections tab, where you can view
the MPLS XC list.
3. View the fields, as described in the following table. Fields are relevant for
both P2P and P2MP XCs unless marked otherwise. (You can sort the XC
list per field, by clicking a column title.)
Field Description
Out Port Outgoing port. Must differ from In Port when Role is Transit.
Out Label Outgoing label. Must equal In Label when Role is Transit.
Tunnel Type Tunnel type (P2P or P2MP).
Source PE PE ID of Source PE of tunnel with which this XC is associated.
Not relevant for P2MP and Bypass tunnels. Cannot be current
MCS.
Destination PE PE ID of Destination PE of this XC. Not relevant for Bypass
tunnels. For P2MP XCs this parameter is configured per
subtunnel. Cannot be current MCS. Per P2MP XC, each
subtunnel must have different destination PE.
Bypass Protected Bypass tunnel protected port. Relevant only for Bypass Head
Port XC. Cannot be the Out Port of the Bypass tunnel.
Tunnel Usage | When Protection Type is Bypass: number of Protected XCs
Number using this XC for protection
| When ProtectionType is Unprotected or Protected: number
of VSIs using this XC
(When you connect a VSI to a tunnel, the Tunnel Usage Number
changes in the MPLS XC Connections tab, see Multicast VSI.)
Tunnel Oper State Current operational state of tunnel. State is down, when
determined so by tunnel OAM.
OAM State Enables OAM connection verification for this XC.
Enable PM Enables performance counting for this XC.
Viewing VSIs
A popup window opens, where you can choose the criteria by which to
filter the display. When a list is filtered, a Filter icon appears at the upper
left of the list. When a list is filtered within a specific port, the Port field is
disabled for editing.
The Huge PM mechanism runs in the background of the system and collects
and records history PM data per day. You can enable this mechanism to
accommodate the vast PM data collected for MPLS objects.
MPLS PM Counters
You can view MPLS tunnel PM current and history counters and PM threshold
profiles for the following tunnel objects for the MCS Switch:
| Tunnels (In/Out)
| VSI
| MCS Policers
You can view the current PM data for multiple policers simultaneously.
However, for all other objects (VSIs, SEG-IN, SEG-OUT, and so on), you
can view PM data for only one object at a time.
Each EIS/EISM card has multiple Ethernet ports for direct connection to
customer sites (either directly or through a CLE), and functions as an
embedded Ethernet switch. The EIS/EISM card provides 10BaseT, 100BaseT
(Fast Ethernet), and GbE services.
EIS card types include:
| EIS2_8: consisting of two EoS and eight ETY ports (up to 4 x GbE ports),
and fits into slots of 2.5G or more
| EIS8_8: consisting of eight EoS and eight ETY ports (up to 4 x GbE ports),
and fits into slots of 5G
| EIS2_14: consisting of 2 EoS and 14 ETY ports (up to 4 x GbE ports), and
fits into slots of 2.5G or more
EISM card types include:
| EISM_208
| EISM_226
| EISM_244
| EISM_804
| EISM_840
The following figure shows a typical EISM_244 Card Internals window,
displaying eight ETY ports and two EoS ports.
In the EoS Ports area, you can select which EoS port/VC-3/VC-4 summary to
view. Each port can support up to 21 VC-3 or 7 VC-4s. The VC Summary
area contains the following fields:
| Allocated: number of VCs allocated to the port
| Connected: number of VCs to which the EoS port is cross connected
| Payload Carrying: numerical value indicating activity
In the EIS/EISM/EISMB Card Internals View, you can also enable LCAS
protection.
You can view granularity settings in the Info window of VCG Src or Snk
objects of selected EIS/EISM EoS ports.
Removing VCs
You can remove VCs in the EIS/EISM Card Internals View.
To remove VCs:
1. To remove a specific VC, in the EIS/EISM Card Internals View, in the
Port area, select the VC to be removed, right-click, and on the shortcut
menu, select Remove VC from Rate.
OR
To remove multiple VCs, in the Port area, select one VC and then on the
menu bar, select Configuration > Select All.
All the allocated VCs in the Port area are highlighted in blue.
2. On the menu bar, select Configuration > Remove VCs from Rate. A
confirmation window opens, prompting you to confirm the deletion.
Creating LAGs
To create a LAG:
| In the EIS/EISM Card Internals View, select an EoS port, right-click, and
on the shortcut menu, select LAG Enable > Enable.
The selected port becomes the master port of the LAG. The LAG ID is
identical to the ID of the master port. (The LAG ID label generally appears
below the slave port.)
EMS-XDM determines the VLAN set of the LAG from the master port.
The configuration of the port must be validated before adding it to a LAG.
Note that any subsequent member added (that is, the second port) cannot
have any VLANs configured on it.
When adding a member to a LAG, add the member to both sides of the LAG,
and enable the LAG port on both sides of the LAG (by selecting the LAG port
and clicking Port Enable > Enable).
2. Select the port that you want to add to the LAG, right-click, and on the
shortcut menu, select Add Member to LAG.
3. Click Yes to confirm. The slave port with LAG (followed by a number)
appears in the EIS/EISM Card Internals View. The Path Cost Update
window opens, confirming that the action was performed successfully, and
prompting you to update the default path cost for the selected EoS port.
When you create a LAG, the bandwidth of the path increases, thereby
necessitating a change in the default path cost of the port. By default, the
displayed path cost value is calculated according to the following formula
that correlates to the VCs that are active in the EoS port:
PortPathCost = 1000*INT(20,000/RateInMBs)
4. To edit the default path cost of the selected EIS/EISM EoS port, in the
Ethernet EoS Port field, type a new default path cost value.
5. Click Apply to update the new default path cost. A confirmation message
window opens, confirming that the path cost was updated successfully.
6. Click Close to close the message window. In the EIS/EISM Card
Internals View, the second LAG (slave) port member appears.
When removing a member from a LAG, remove the member from both sides of
the LAG, and enable the LAG port on both sides of the LAG.
The following figure shows a typical EISMB Card Internals window, with 4
ETY electrical ports, 8 EoS ports, and no optical ports.
Operations available for EIS/EISM and DIO cards are also available for
EISMB cards.
| The GEoS Ports area displays the internal transmission objects of the
GEoS port.
| The Mapped VC-4 Objects area displays the VC-4 objects mapped to the
GEoS ports.
| VC-4s provisioned to carry traffic in at least one direction display
above the object. is displayed above the VC-4 Snk object when
the VC-4 Snk Payload Carrying Expected Rx attribute is enabled, and
above the VC-4 Src object when the VC-4 Src Payload Carrying Expected
Tx attribute is enabled.
| The Available VC-4s area displays the DIO card VC-4 objects available
for mapping to GEoS ports. By default, this area of the window is not
shown.
| For DIO1_31F cards, the first interface is an VC-4 line interface. All the
VC-4 interface objects are cross connected to the card AU-4 objects.
The DIOB and DIOM cards support two port types, EoS and ETY, and two
Bank groups, Bank A and Bank B, according to the number of mappers on the
card.
The Banks area displays the bank group and available VCs on the DIOB or
DIOM card. Some cards support two banks (Bank A and Bank B).
Card operations performed from the ATS are done in keeping with
conventional EMS-XDM practices. Thus, you can view card information and
current alarms, as well as handle XCs and maintenance procedures using
standard EMS-XDM procedures. The only restriction when setting up an XC is
that you cannot set up VC-4-to-AU-4 connections (as can be done on an SIO
card), as no AU-4s are available on the ATS card.
Optical networks are designed to carry tens of wavelengths on the same optical
fiber. The basic design assumes that the optical parameters of all elements on
the network are constant and steady. These parameters include:
| Span losses of optical fibers
| Insertion loss of passive optical components such as filters, switches, and
isolators
| Gain of amplifiers
| Optical parameters of other devices
As long as these parameters are constant in the network, the network will
support the NOC required. If this stability could be guaranteed, there would be
no need for automatic control of optical power in the network. However, since
some parameters (mainly, but not only, optical fiber span losses) are subject to
changes over time, methods have been devised to overcome these changes in
the network. This section describes the methods implemented in XDM optical
networks.
The power per channel (PPC) must be maintained at a constant value, defined
during initial network design (power budget design). The following rules must
be observed:
| Aggregate power of all channels present in any span of the network should
not exceed the maximum output power at the output of any amplifier
| PPC must bridge the span and arrive at the receiver input with an
appropriate margin, both from the minimum sensitivity and overload values
| Power of a single channel must be high enough to drive the amplifiers in
the span
During the initial configuration stage of the network, all variable optical
attenuators in the network must be set manually to achieve the required PPC in
every point in the network.
If the span loss increases, the OFA is requested to increase its gain. If the
span loss decreases, the gain is decreased as well. In both cases, the
principle of "gain equals previous span loss" applies.
Tracking Tolerance: Changes in span loss below this limit are ignored.
Minor changes in incoming power do not cause any reaction.
Tracking Limit: Changes in span loss above this limit are also ignored.
Minor changes in incoming power do not cause any reaction.
To prevent oscillations due to untimely changes in the chain of elements
down the line, there is a HOT period. The total HOT of an element is the
basic HOT (configurable) multiplied by the number of preceding elements
(the total number of reacting elements preceding the current element
upstream).
There is also a switch that activates or shuts down the tracking mechanism.
This switch is the Tracking Enable Configurable attribute.
Each card has a photodiode for measuring the total incoming power and a
set of parameters for calculating the expected total power. The total noise in
the line is determined from the current NOC, PPC, and actual NOA.
The card software compares the actual incoming power with the expected
power and monitors the difference. As long as the NOC and NOA are
updated, the comparison reflects the exact changes in span loss, if they
exist. Currently, updating the NOC and NOA is not done automatically. For
each card, the NOC and NOA is calculated at its output, taking into account
the incoming NOC, NOA, LOS, and possible Add and Drop channels that it
may have.
Network Setup
The functionality of the Power Control mechanism is defined for different
stages of an optical network life cycle as follows:
| Network installation and setup
| Normal operation
| Abnormal operation, fault detection, tracking, and fixing
The NEs are set for power control one by one, beginning at the segment start
point.
2. In the Card Internals View, on the menu bar, select Configuration >
Setup > Card Setup.
The Setup window opens.
The window varies according to the type of card selected. TRP10 cards have
only two optical modules, while TRP25 cards have four modules. In TRP10
cards, the same optical module performs the Tx and Rx functions; in TRP25
cards, Tx and Rx functions are performed on separate optical modules. The
TRP10_2 card is bidirectional. TRP10 cards are based on CHTR_B base card.
The TRP25_4AD and TRP25_4REG cards are also bidirectional and each
contains two transponders for a total of four channels, with each transponder
having one Add and one Drop channel. Each of its transponders works
independently. TRP25_4AD cards act as Add/Drop devices, while
TRP25_4REG cards act as regenerators. Collectively, these cards implement
the G.709 standard for bidirectional channels and constantly enabled FEC.
These cards can be used to transfer only STM-16 clients.
The Application Template field shows the name of the file where the
attributes set in the current window can be stored or retrieved. The
store/retrieval operation can be done from the File menu.
You can configure optical channels on TRP cards in the Setup window.
The TRP 10 GbE LAN is a base card with two 10 Gbps transponders (Tx and
Rx) and resides on XDM-500/1000/2000 shelves. It is carried over the Optical
Transport Network (OTN) when mapped over ODU2 into OTU2, and may
have FEC or EFEC configuration. TRP10_LAN provides functionality similar
to the TRP25_2C in a space-saving form factor, and operates in an East/West
configuration.
Features of TRP10_LAN cards include:
| Based on the CHTR base card
| Compliant mapping to G.709 10.7Gbps
| Full transparency 10 GbE LAN preamble and SFD bytes
| Configurable for EFEC/FEC/no FEC operation
| Tunable LiNbO3 Line transmitters for improved performance and
flexibility
| EML transmitters for reduced cost
| Supporting 10 GbE LAN with PM
| Hot swappable XFP client transceivers
The OMTX10_LAN module resides at the CHTR card as the client side 10
GbE LAN interface in the I/O slots of the XDM 500/1000/2000 shelves. The
line side is 10.7G OTU2 optical interface for OTN networks.
Features of the module include:
| Transparent mapping of 10 GbE_LAN Ethernet optical interface into
standard OTN-ODU2 container in two mapping modes
| Mode NPS (No Preamble and SFD) – supporting G.8021 requirements
| Mode WPS (With Preamble and SFD) - supporting transparent mapping of
the Preamble bytes as well as SFD byte, using OTN-OPU unused OH bytes
| Supporting G.709 OTN-ODU2 termination, alarms, and PM collection
| Supporting RMON of the incoming 10 GbE LAN signal according to
RFC2819 requirements
| Traffic protection based on OTN-ODU2 path layer quality
| Control by the XMCP via CHTR card uP interface
| XFP transceiver hot insertion and extraction
Field Description
Attenuation Value Attenuation value.
Attenuation Value #2 Second attenuation value.
APR Back Reflection Automatic Power Reduction back reflected power/pumps
Ratio Threshold Tx power. Options: -14 to -27, where default is -23.
APR Duration after Automatic Power Reduction after Loss of Signal.
LOS Options 2-11 sec (default).
The PCS (Process) module is responsible for clock and data recovery,
deserialization, block and link synchronization, 64/66 decoding/encoding, BER
monitor processes, and descrambling functions concerned with the Ethernet
PHY (Physical) sink side. It is responsible, as well, for the test pattern checker.
4. Fill in the PCS Rx Mode field, as described in the following table. Note,
when in test mode the Rubicon device transmits towards the OTN, GFP
Idle frames automatically.
Combiner cards must be used in pairs, with the same type of card employed on
both sides of the link. For example, if a CMBR25_2 card is used on one side of
the link, it must be used on the other side as well.
Four combiner cards are available in EMS-XDM, including the CMBR25_2
and CCMB25 for 2.66 Gbps, and the CMBR10 and CMBR10D for 10.709
Gbps. These cards support the following options:
| CMBR25_2: two modules of 2 x GbE/FC/FICON with 2.66 Gbps line and
OMSC25_2D optical module
| CCMB25: 2 x GbE/FC/FICON with 2.66 Gbps line
The COMBR10_T card, unlike other Combiner cards, has four client channels
and an Optical PG upon which you can perform maintenance operations. It also
supports ODU Src and Snk objects, including ODU1 for 2.5 Gbps service
(STM-16) and ODU2 for 10 Gbps services (STM-64 and 10 GbE ETY) for
end-to-end protection switching.
The AoC card can be assigned in 3 modes (where the Actual type of all 3
modes is the same, AOC_ACT_EQPT_TYPE):
| CMBR mode: Assignment is done from the assignment window and takes
up one slot. The expected type is AOC_CMBR_EXP_EQPT_TYPE. All
modules and transceivers have default assignment. Standby assignment is
supported as well.
| ADM mode: Assignment is feasible only on odd numbered indices and
takes up 2 slots (that is, two cards on two adjacent slots) with expected type
AOC_ADM_EXP_EQPT_TYPE. Unassignment of one card will unassign
the second one as well. The aggregate module and transceiver have default
assignment, as well as the client ports, which are all assigned as GBE-7.
| TERM mode: This mode is an unprotected AoC-ADM card. Thus, the
assignment takes up only one slot. AS in the ADM mode, the aggregate
module and transceiver have default assignment and the client ports are all
assigned as GBE-7. Reassignment to ADM mode is supported.
The AoC Card Internals window is similar for all three modes. The card's
ports are divided into three tabs: the Aggregate port (port #9), Client ports 1-4,
and Client ports 5-8. Each tab displays the port objects, including SPO masters
(but not RS and MS SPO groups).
| Aggregate tab: Displays the port's module, transceiver, and SPO masters.
The module is assigned as OMTX10 by default and may be changed to
OMTX10_EF or OMTX10_S. The transceiver is assigned as OTX10 by
default and may be changed to OTX10_AT or OTX10_110_XX. There can
be up to 64 SPO masters (configured in the XC Browser). The head unit
includes OPS, OCH and ODU2 objects. In the CMBR mode, there are
Fixed XC – GBE/FC to the aggregate line. The objects on the aggregate
line should be SPO but with consecutive AU4s, in order to be connected to
other CMBRs. Each two client ports use 16AU4s, Client1, Client2 SPO-1
to SPO-16, Client-3, Client4 SPO-17 to SPO-32, Client5, Client6 SPO-33
to SPO-48 and Client7, Client8 SPO-49 to SPO-64.
| Client tabs: All ports are assigned as OT_GBE7 by default. You can
change their assignment to OT_STM16, OT_OTU1, OT_GBE7,
OT_GBE8, OT_FC1 or OT_FC2. The GBE7, GBE-8, FC-1, and FC-2
services include one SPO master (TTP). The STM16 and OTU1 services
can include up to 16 SPO masters (CTP), configurable them from the XC
Browser. The 4 ports of the STM16, OTU1 and FC-2 services are
dedicated 1,3,5, and 7. The head unit of each service includes:
GBE/FC service – GFP, OPI and GBE/FC objects.
OTU1 service – ODU1, OCH and OPS objects.
STM16 service – MS, RS, and OPI objects.
Ungrouping is done from the Card Internals window, activated from the
Configuration menu or from the right-click shortcut menu of the SPO master.
The following figure shows the AoC_ADM Card Internals View - Aggregate
tab.
Therefore, the AoC enables the most comprehensive set of E2E wavelength
services for your network requirements.
With AoC, you may choose any combination of protected network traffic,
unprotected traffic, fully protected traffic including client port protection,
and so on. Dual homing from access to ring is also supported.
Optical Amplifiers
Optical amplifiers are used to amplify optical signals at various locations along
an optical line. ECI Telecom offers optical amplifiers in different physical
forms (cards, modules, and plug ins for auxiliary modules, depending on the
shelf where they are installed), and different technologies, as follows:
| Erbium Doped Fiber Amplifier (EDFA) optical amplifiers, capable of
amplifying the entire C band and supporting multichannel applications.
ECI Telecom offers both static gain and dynamic gain EDFA based
amplifiers, as follows:
OFA_2: Card that can be equipped with optical inline, booster, or
preamplifier modules. Uses dynamic gain technology.
MO_BAC: Optical booster for installation in the shelf modules cage.
Uses static gain technology.
MO_PAC: Optical preamplifier for installation in the shelf modules
cage. Uses static gain technology.
OFA_M: Dual stage optical amplifier. Uses variable dynamic gain
technology. Output power of up to 20 dBm.
MO_BAS: Single channel optical booster for installation in shelf
modules cage.
MO_PAS: Single channel optical preamplifier for installation in shelf
modules cage.
MO_OFA_HBC: High output power booster for installation in shelf
modules cage.
MO_OFA_PHBC: Optical module for installation in the shelf modules
cage. Combines high output power booster of MO_OFA_HBC with a
preamplifier.
VMUX/DeMux Cards
The smart 40 channel C band VMUX/DeMux card:
| Incorporates capabilities of a standard Mux and functionality of a VMUX
combined with a DeMux
| Fits into three slots in the modules cage.
| Has individual variable attenuators in series with each Mux adding input.
These attenuators are controlled by the management station.
| Connectors are arranged in two columns (or groups) of four channels each:
DeMux drop output connectors on the left hand side
Mux add input connectors on the right hand side (corresponding to
DeMuxes)
Channel numbers are marked on a label located to the left of each
group. The 40 channel numbers available on this card range from 21 to
60.
Lowest group of connectors has DeMux LINE IN and Mux LINE OUT
connectors, and associated MON IN and MON OUT connectors.
| MO_DW40VMD: provides all the functionality of a Mux, VMUX, and
DeMux in one card designed for the modules cage. This card covers 40
channels of the C band, with 100 GHz grid spacing.
VMUX/DeMux Modules
Attribute Description
Measured Input Actual power level measured at element input.
Power (MIP) (dBm)
Required Correction Difference between MIP and EIP, after traffic passes
(dB) through limits and HOT filter (and tracking is enabled).
The following table describes the additional attributes for OFA power control
objects.
For tracking purposes, the power of the incoming signal (to the NE) must be
measured, as in the OFA and OADM cards. However, unlike the OFA and
OADM, the VMUX does not interface with the incoming line and is unable to
measure the incoming power.
The DeMux card at the opposite side has an additional dedicated output that is
2.5% or 5% of the incoming power (depending on type of card). An optical
fiber connects to the VMUX, where it is connected directly to a photodiode for
power measurement. The Monitor attenuation in the VMUX calibrates this
measurement using the value taken from the DeMux Info window.
The attenuation per channel is always the sum (in dB) of the following:
| Basic attenuation (not necessarily uniform between the channels)
| Required correction (ReqCorr) for added channels
| Base attenuation for pass-through channels
The attenuation of the added channels either tracks the changes in the power of
the incoming signals or stays fixed (tracking on/off).
Attenuation
Attenuation condition Description
Monitor attenuation Offset (in dB) given to measured input power to enable
compensation for 2.5 % and 5% difference in power
Base Attenuation 1 dB to 20 dB
Required Add Power 1 dBm to 40 dBm
Tracking alarms
Alarm condition Description Alarm level
Input Power Change Required correction is greater than Warning
Low Alarm Threshold.
Out-of-Tracking Required correction is greater than Major
Limitation Tracking Limit and has been
suppressed.
Out-of-Set Capability Required correction is beyond card Minor
compensation capability, or set
correction is less than required.
The power control alarms are related to the power control object itself. You can
view them in the Power Control Object Alarm Severity window.
NOTE:
| OADM1AB only drops/adds one channel and therefore
only shows one channel in its Card Internals View
window.
| MO_OADMxx cards must be inserted in the modules cage
before they can be assigned.
The OADM Card Internals View window uses the general EMS-XDM
conventions, with the following exceptions:
| The read-only Frequency (THz) in fields displays the frequency of each of
the four channels that are added/dropped by the OADM.
| The Optical Physical Section (OPS) objects used to add/drop the four
channels are displayed beneath the Optical Multiplex Section (OMS)
objects. Arrows and the words Drop or Add are displayed directly above
the OPS objects to indicate the functionality of the objects.
| The directions of the channels passed through the Optical Transmission
Section (OTS) objects of the OADM card are displayed next to each object.
You can change the display view of the OADM Card Internals View window
to mirror the current view, which is useful when you want the view to reflect
the actual orientation of the incoming/outgoing direction of traffic.
In the Shelf View, select the OADM card, and on the menu bar, select
Configuration > Channel XC.
When configuring the optical channels for Group-type OADM cards (that
have the letter G in the card name), you only configure the first channel (Ch
1). EMS-XDM automatically configures the three remaining channels to
successive frequencies (the next three frequencies at 100 GHz spacing,
starting from the selected frequency for Ch 1). Note that when optical
channels are added/dropped to/from a Group OADM card, the first
frequency before and after the group of four frequencies becomes
unavailable, and cannot be passed through the card.
After entering a new value, the field turns blue to indicate that the change is
not yet registered in the database.
3. To save the changes, on the menu bar, select File > Update. After saving
the changes, the new channel frequency settings are saved to the database,
and the fields return to their normal color.
4. To close the window, on the menu bar, select File > Close. The read-only
fields in the OADM Card Internals View window are updated with the
new values.
The WSS card is installed in the card cage slots of the XDM-500/1000. The
card is configured for East/West operation and provides eight add/drop
ports. Each port can be configured to add/drop any of the 40 channels in the
C band in any combination. Automatic equalization of the channels is
provided through the management system.
3. In the Power per Channel (dBm) area, in the Configured field, choose an
option in the dropdown list.
4. In the Base Power Source area, in the Configured field, choose an option
in the dropdown list (Calculated or Manual). (Relevant only for
MO_ROADM40) To change power settings:
a. In the Power Change area, select the relevant options (Set Selected,
Increment Selected, Decrement Selected).
b. Select the value from the dropdown list.
c. Select the relevant checkboxes in the table on the right (or click Select
All to select all checkboxes).
d. Click Set.
5. In the New Offset Value (dB) column, choose an option in the dropdown
list.
6. To change the NOC assigned to a multichannel port, select the relevant
row, and in the NOC New Add Value column, choose an option in the
dropdown list (range 0-40).
Configuring DGE
EMS-XDM supports Dynamic Gain Equalization (DGE) modules, including
MO_DGE40/E/I with OTRx_E extension optical transceivers to maintain
power equalization on the optical fiber.
C/DWDM Cards
An MO_CW2 occupies one modules cage slot and has two identical positions
for C/DWDM plug ins. The MO_CW2 module provides an interface to the
shelf management, and therefore the module itself and the plug ins installed on
it are automatically identified by the management station.
OFA_R Cards
EMS-XDM features OFA_R cards, similar in functionality to the other OFA
cards but with enhanced optical ranges.
There are two types of OFA_R cards, as shown in the following Shelf View:
| OFA_R FWD (OM_OFA_RF)
| OFA_R BWD (OM_OFA-BF)
4. View the fields, as shown in the following table. For more information
about the general Info window parameters, see Viewing and Modifying NE
Data. When modifying an OFA_R card configuration parameter, a
confirmation window opens, warning that the operation may affect traffic
and eye safety.
5. Click Yes to confirm the changes.
The following tables describe the Info window configuration and status
parameters unique to OFA_R cards. (The fields are read-write only for
administrators.)
You can view base gain source and required gain frequencies and set
configuration options.
Channel Selection
You can configure the channels for which each of the OPS objects collects PM
data.
To select channels:
1. In the OPM Card Internals View, select the object and on the menu bar,
select Configuration > Channel Selection. The Channel Selection
window for the selected object opens, displaying a box for each of the
relevant wavelengths. Boxes that correspond to channels selected for PM
appear pressed in.
2. Click a channel once to select it (or click a selected channel once to clear
it). When the selection status of a channel has been changed (selected or
cleared), its box appears in blue.
3. To confirm the channel selection, on the menu bar, select File > Update.
4. To cancel all channel selection changes and revert to the last saved
configuration, on the menu bar, select File > Clear All.
Splitter/Coupler Modules
The slot assignment procedure for the AUX card modules is the same
procedure as described previously.
(For some of the modules installed in the AUX card, an additional Card
Internals View can be accessed.)
These AUX module internal views are completely static, with no dynamic
information displayed, showing a schematic view of the module for
informational purposes only.
ASON Overview
This section provides an overview of ASON architecture and capabilities.
ASON Layers
ASON layers include:
| Transport Plane: Responsible for transporting services, carrying client
payload between endpoints of a connection (trail) over multiple NEs,
including switching and multiplexing services. Implements Automatic
Discovery and DCN capabilities, both compliant with ASON standards.
| Management Plane: Responsible for the operations, administration,
maintenance, and provisioning (OAM&P) of control plane related
functionalities. Implemented through LightSoft NMS, which provides full
FCAPS network management, with minimal disruption to existing
operational procedures within existing OAM architecture. Includes OSS,
LightSoft NMS, EMS-XDM, and LCT-XDM.
| Control Plane: Enables mesh restoration and intelligent optical
networking. Consists of individual processors (control plane instances)
within each XDM NE. Uses standard protocols to implement the various
ASON architecture roles, including Connection Control Interface (CCI) for
connections to the transport layer, and I NNI over DCN for inter-processor
connections. UNI is used for client equipment connections, and E NNI is
used for connections over other domains (other carriers, other layers, or
third party equipment). A dedicated NMI is used between the control plane
and NMS.
ASON Functionalities
ASON functionalities include:
| Signaling Communication Network (SCN): Data communication channel
that enables communication between ACP cards residing on different NEs.
Can be implemented with existing SDH links between the ASON domain
NEs. DCN both in-band and out-of-bandcan be implemented, as follows:
SDH IP DCC in the XDM
Clear Channel (DCC encapsulated into a VC-12)
External DCN through ACP Ethernet port
| Auto-discovery: Supports resource and link management, including:
XDM self-discovery: Upon NE commissioning, the NE automatically
detects and initializes installed circuit packs and software configuration.
The NE continuously monitors the state and attributes of its local
facilities, reporting these properties to the ACP card, which, in turn,
updates the local XDM topology database.
Adjacency discovery: Individual NEs automatically detect logical and
physical connectivity to their neighboring NEs (link adjacency) on a
per port basis, through the simple exchange of unique interface
identifiers (auto discovery tags), done in fiber, over the J0 (or J1) byte.
Network topology discovery: The control plane itself uses OSPF for
control plane and network architecture discovery, where each ACP
learns the network topology and builds its topology database. Routing
mechanisms use this information in automated route computation.
| Routing: Responsible for network topology and resource discovery, and
for automatic route computation. The XDM uses a distributed link state
routing protocol, OSPF TE, for automatic discovery of network topology
and resources and to maintain a local topology database on each control
plane instance.
| Signaling: Optical signaling provides the underlying mechanism for
dynamic call and connection management and handles connection requests,
such as connection creation or restoration.
| Management and Operation: LightSoft interoperates with EMS-XDM to
act as the monitoring management system of the control plane.
The ACP1000 card connects to the XDM MECP card, and the ACP100
connects to the ECU card. Two Signaling Communication Ports, SCP1 and
SCP2, are used to connect to DCN networks, and two ports are provided for
redundancy protection, enabling connection to two different DCN networks.
ASON Entities
ASON entities include:
| Control Channel: Pair of mutually reachable interfaces that enable
communications between NEs (nodes) for routing, signaling and link
management.
| Data Link: Pair of interfaces that transfer user data. Note that in GMPLS,
control channels between two adjacent nodes are no longer required to use
the same physical medium as data links between those nodes.
| TE Link: Logical construct that represents a way to group or map
information about certain physical resources (and their properties) that
interconnect LSR (NEs) into information used by CSPF for path
computation and by GMPLS signaling.
| Bundled Link: TE link such that, for the purpose of GMPLS signaling, a
combination of <link identifier, label> is not sufficient to unambiguously
identify the appropriate resources used by an LSP. A bundled link may
comprise several data links. (Throughout this guide, the term TE-link is
used for both TE-link and Bundled Link.)
| Trail: Session or tunnel that enables payload to traverse from a specified
ingress point to an egress point and vice versa.
| Path (LSP): Route that the payload may follow to reach trail end-to-end. In
the XDM ASON application, a trail (session) may include several paths
(LSPs): A 1++ protected trail has initially two paths, main and protection.
The actual payload is taken from one of these provisioned paths. Upon path
failure, a third LSP is configured and upon another path failure, additional
one is configured. Therefore, a protected trail with one main route can have
up to four LSPs.
Launching EMS-AURORA
You can launch EMS-AURORA from the Shelf View. Users with configurator
rights can assign AURORA-G cards to the EMS-XDM shelf and configure its
parameters (such as management IP address code).
To launch EMS-AURORA:
1. In the Shelf View, assign the AURORA-G card to the slot.
2. Select the AURORA-G card and click to open its Info window, and in
the Configuration tab assign the IP addresss code.
3. In the Shelf View, double-click the AURORA-G card to open EMS-
AURORA.
EMS-AURORA opens, displaying a row showing the relevant AURORA-
G card information and the its management port IP address.
4. Click the Visible Alarms and Invisible Alarms tabs to view the
visible/invisible alarms. Alarm labels are color coded to reflect the current
alarm state for the internal object.
The following tables list the general attributes displayed for most internal
XDM objects and specific attributes by object type. Additional attributes are
listed later in this section, where relevant. (Attributes are editable in the
Configuration tab and read-only in the Status tab.)
2. Click an object tab to view or modify the attributes of the object displayed
in that tab.
3. Click the Configuration tab to modify internal object attribute values by:
Modifying attribute values for a single object.
OR
Simultaneously modifying attribute values for multiple objects in the
Combined Info window: select objects from the various tabs in this
window, and with a single action, apply these changes at once. Make
the required attribute value changes to the objects in the window, and
on the toolbar, click to apply the changes..
This action changes all the attributes marked for changes at the same time.
In addition, configurable object attributes can automatically be propagated
to other objects of the same object type by selecting the corresponding
checkbox in the Prop. column of this window.
VC-4 Concatenation
EMS-XDM supports concatenated VC-4s for high bitrate data services that
require transport of payloads that are higher than a single VC-4 capacity.
Concatenation is a procedure that associates multiple VCs together, resulting in
a combined capacity that can be used as a single container across which bit
sequence integrity is maintained. VC-4 concatenation is supported in the SDH
standard.
XDM NEs support VC-4-4c (4 x VC-4s) and VC-4-16c (16 x VC-4)
concatenated signals. This function is supported in SIO4, SIO16, SIO16-2, and
SIO64 cards.
The present release of the XDM NE supports the following methods for the
transport and cross connection of concatenated VC-4 signals:
| Virtual: this method is intended to provide support for high bitrate
services, through concatenated VC-4s, on networks that do not support
concatenated signals higher than AU-4.
The signal enters the XDM NE as a VC-4-Xc concatenated signal. The
XDM NE transforms the contiguous VC-4-Xc into 4 or 16 regular VC-4s.
The VC-4s that comprise the virtual VC-4-Xc are transported over the
subnetwork/network (for example, to SYNCOM NEs). When exiting the
subnetwork/network boundary, the VC-4s are assembled together to form
the original contiguous VC-4-Xc.
| In SIO cards, all VC-4s in a group must belong to the same MS and RS.
| Either 4 or 16 AU-4s should be selected.
| An AU-4s cannot be selected if it is part of an XC set.
| Numbering: for any type of virtual concatenation (except through), groups
of 4 must start at AU-4 number 1, 5, 9, 13, 17, and so on, and groups of 16
must start at AU-4 numbers 1, 17, 33, and so on.
To concatenate VC-4s:
1. In the Card Internals View window, select the AU-4 objects to
concatenate, either by using shift-click to select multiple objects, or on the
menu bar, by selecting Configuration > Select All.
2. On the menu bar, select Configuration > Create Concatenation, and then
from the submenu, select the type of concatenation to use.
The type of concatenation you select affects the way the virtual VC-4-Xc
signal can be cross connected. Following is a list of the concatenation
types. The first three are virtual concatenations.
VC-4 objects can only be configured to the GEoS ports that appear at the
immediate left of the VC-4 objects in the DIO Card Internals View window.
For example, in a DIO1_61 card, GEoS port 1 cannot be configured to VC-4
object 17.
4. In the Available VC-4s area, shift-click the VC-4 object(s) you want to
map to the GEoS object. You can select up to seven VC-4s to configure to
a single GEoS.
5. Select the GEoS port (containing GeoS Src/Snk objects).
To increase the data rate of a GEoS link for the VC-4 object:
1. Map VC-4s to the GEoS ports on both sides of the link.
2. Provision concatenated VC-4 trails either at the LightSoft or EMS-XDM
level (as described in the LightSoft User Manual). Make sure the number
and identity of each VC-4 object participating in the concatenated trail
match those associated in the DIO card.
3. For DIO1_40F and DIO1_20 cards, you must edit the XCs.
4. When performing slot assignment on the DIO1_31 (high-order), an XCS is
automatically created, including 16 VC-4s cross connected to 16 AU-4
objects. DIO1_40F and DIO1_20 cards are cross connected manually.
5. For each VC-4 associated to the GEoS port, set the Payload Carrying
Expected Rx attribute in the VC-4 Snk object to Active.
To speed up the process, on the menu bar, select Configuration > Select
All. All VC-4s associated to the port are selected, and the command is
applied to all objects at once.
Before adding the VC-4 member to a working GEoS link, you must ensure
that the VC-4 has no failures before setting the Payload Carrying Expected
Rx attribute to Active.
6. Repeat the operation for the corresponding GEoS port in the far-end DIO
card.
7. For each VC-4 associated to the GEoS port, set the Payload Carrying
Expected Tx attribute at the VC-4 Src object to Active.
You can speed up your work by using the Select All command in the
Configuration menu. All VC-4s associated to the port are selected, and the
command is applied to all objects at once.
Before adding the VC-4 member to a working GEoS link, you must ensure
that the VC-4 has no failures before setting the Payload Carrying
Expected Tx attribute to Active.
When increasing the rate to seven VC-4s, traffic is affected based on the
configuration of the Payload Carrying Expected Tx attribute being set to
Active on one side until its configuration on the far end side.
8. Repeat the operation for the corresponding GEoS port in the far-end DIO
card.
9. If the GEoS ports on both ends of the link are not yet activated (as may be
the case during first-time configuration), configure the GEoS ports on both
sides of the link to Port Enabled.
To decrease the data rate of a GEoS link for the VC-4 object:
1. In the Card Internals View window, select the VC-4s Src mapped to the
GEoS ports, and on the menu bar, select Configuration > Data Active Set
> Non-Active. This operation is required to prevent the operation from
affecting existing traffic.
2. Repeat the operation at the far-end DIO. This operation is applicable only
to a GEoS link that will carry traffic even after the removal of the VC-4s.
When a rate of seven VC-4s is decreased, the traffic is affected based on
setting the configuration of the Payload Carrying Expected Tx attribute to
Non-Active on one side until its configuration on the far-end side.
For DIO cards only, when GFP encapsulation is used, the Payload Carrying
Expected Rx attribute in the VC-4 Snk object and the Payload Carrying
Expected Tx attribute in the VC-4 Src object are always set to Active. In
this case, Steps 1 and 2 in this procedure are not applicable. Removing
VC-4s from the GEoS port automatically removes the VC-4 member from
the group without any further configuration. This means that the action is
traffic-affecting until the far-end card is also configured to remove this
VC-4 member from the group.
3. In the Card Internals View window, select the VC-4s Snk mapped to the
GEoS ports, and on the menu bar, select Configuration > Payload
Carrying Expected Rx > Non-Active. This operation is required to
prevent the operation from affecting existing traffic.
4. Repeat the operation at the far-end DIO card.
5. For DIO1_40F and DIO1_20 cards, before proceeding to the next step, you
must remove the cross connections at both endpoints.
6. Shift-click the associated VC-4 object(s) you want to remove.
7. In the Card Internals View, on the menu bar, select Configuration >
Remove VC-4s from Rate. When the "Port will be configured to support
maximum rate of N x 155M" message appears, click Yes. The port
configuration completed successfully message appears.
8. When the GEoS state is Enabled, removing all the VC-4s causes the port
to become automatically Disabled. The "Port enable state changed
successfully" message appears.
9. Repeat Steps 4 through 7 for the far-end DIO card.
4. In the LCAS Enable field, in the Attribute New Value dropdown list,
select Enabled.
GCC0 Termination
You can terminate GCC0s (General Communications Channels) by connecting
the GCC0 objects on the relevant optical ports to the COM DCC channels.
GCC0 termination is performed in a similar manner as DCC termination.
To terminate GCC0s:
1. In the Shelf View, double-click the relevant optical card (for example,
CMBR10_T or TRP) to open its Card Internals window.
2. Select the OCH Src or Snk object.
3. On the menu bar, select Configuration > Terminate DCC/GCC. The Edit
Termination window opens, where you can view and modify the network
interface general and advanced attributes.
The selected GCC0 object is connected to the selected COM DCC channel.
Overview
This section describes how to use the EMS-XDM functional node (FuN) utility
to set up and manage XDM optical sites and how to use the Enhanced
Automatic Power Control (Enhanced APC) feature, also known as Power
Equalization of Optical Links (PELES).
The FTM allows you to organize optical cards and equipment belonging to
XDM NEs. The FTM centralizes and integrates all setup and management
functions, enabling you to easily set up an optical site, install and assign the
site's cards and modules, and monitor the overall Tx and Rx power
measurements.
The FTM displays the FuNs as functional icons for easy identification and also
shows the links between them. To facilitate configuration and setup, the FTM
uses Batch Slot Assignment (BSA), automatic creation of optical links during
drawing (while sending them to the NMS) and force-set of channel frequency
to OCH cards when connected to Multiplexing Devices (MD). Incorporation of
the OPM card helps to equalize the network during the initial installation
stages.
The FTM supports:
| Direct cut-through to card internals information and setup.
| Automatic discovery of OTS optical links from the FuN map to a managed
optical link list displayed in the Topology Links window.
When there are changes in the FuN map, the link list is updated
accordingly. (The Topology Links window contains not only the optical
links discovered by the FuN, but also the SDH links discovered and created
by the SDH Automatic Links Discovery process. The optical links listed in
this window also serve as the basis for the PELES power control chains
construction, and changes in the FuN map also affect the PELES.)
| Uploading and forwarding of optical links (created at the OMS level) to
LightSoft.
| Creation of (PELES) chains, based on FTM (topology) setup and
discovered links (in the Topology Links window).
The FTM map and views are implemented as a set of three hierarchical views:
| FTM map: displays FuNs as icons and topology links.
| FuN internal: displays OMT cards as icons, OCH icons, and topology
links.
| OCH internal: displays MD (Multiplexing Device) and OCH cards as
icons and topology links.
FuN Workflow
The following table describes the menu commands available in the FTM
window.
FTM Toolbar
The FTM toolbar, located below the menu bar, provides shortcuts to activating
various functions, as described in the following table.
Creating FuNs
You can create FuNs and add NEs to FuNs.
To create a FuN:
2. In the FuN Name field, type a unique name for the FuN (up to 32
characters). Duplicate names are not allowed. (The FuN icon in the FTM
window displays a maximum of 5 characters.)
3. (Optional) In the Comment field, type a comment or other descriptive text
(up to 50 characters) for the FuN. For example, you can type the NE
designation for this node. This field is informational only and enables you
to more easily distinguish between multiple FuNs.
4. To add NEs to the FuN, in the NEs in EMS list (on the left), select one or
more NEs and click Add. The NEs are added to the NEs List (on the right).
The NEs List displays up to 12 NEs belonging to the FuN. (You can add
the same NE to multiple FuNs.)
5. To remove NEs from the FuN, in the NEs List, select the relevant NE(s),
and click Remove. A confirmation message window opens, prompting you
to confirm the deletion. Click Yes to confirm. The NE is deleted from the
FuN list along with all its cards and links that connect them.
7. On the toolbar, click to close the Create FuN window. If changes have
been made but not applied, a message window opens, prompting you to
apply the changes. Click Yes to save the changes.
The FuN icon appears in the map area of the FTM window. You can drag
and drop the FuN icon to move it to another location on the map.
Deleting FuNs
You can delete a FuN regardless of its status (where entire contents including
links between cards and ports are removed).
To delete a FuN:
1. In the FTM window, click the relevant FuN icon.
Right-click and select Delete.
OR
On the toolbar, click .
A confirmation message window opens, prompting whether you want to
unassign cards from the selected FuN.
2. Click Yes to confirm. (The default option is No, where assigned cards
remain in the database.)
The selected FuN and its entire contents are deleted from the FuN database,
including any assigned cards and links between cards and ports.
Exporting/Importing FTMs
NOTE: When using export and import of FTM via XML, the
XDM NE name should not be modified until the import is
performed.
You can export an FTM from a previous version (for example, from EMS-
XDM version 6.2) and import it into the current FTM topology.
To export an FTM:
1. In the relevant FTM window from which you want to export the FTM, on
the menu bar, select File > Export. A window opens, where you can save
the FTM as an XML file.
2. In the File Name field, enter the name of the XML file.
3. Click Export. A confirmation message appears. The FTM is saved to the
XML file.
4. Click Close to close the message window.
To export an FTM:
1. In the relevant FTM window where you want to import the FTM, on the
menu bar, select File > Import. A window opens, where you can choose
the FTM XML file from the relevant directory.
2. Select the file from the list.
3. Click Apply and confirm when prompted. The FTM is imported into the
current EMS-XDM FTM configuration. A message appears, indicating the
results of the operation. A summary message appears after the import is
completed.
The FuN Internals View opens, where you can add, configure, and
connect OMT (OADM) cards, ports, and topology links to the FuN.
OR
The Card Internals View of the selected OMT card opens, where you
perform card setup and view and modify attributes of modules and
transmission objects.
3. Click the alternate Snk or Src port of a second OMT card in the same FuN
Internals View. (For example, if in Step 1 you clicked a Src port, then in
Step 2, click a Snk port.) It is not possible to connect the same port types
(that is, Snk-Snk or Src-Src).
The OTS link is created and saved in the database. In the FuN Internals
View, a connection line appears between the relevant ports.
Deleting Links
To delete links:
1. In the relevant FTM window or FuN Internals View, click the connection
line to select it.
2. On the menu bar, select Configuration > Delete Link. A confirmation
message appears, prompting you to confirm the deletion. Click Yes to
confirm.
The line disappears from view, and the link is also deleted from the EMS
link list and database.
3. In the View Name field, type the view name (for example, OCH1).
To add ports:
1. In the Edit FuN View, select the relevant MD card icon.
2. On the menu bar, select Configuration > Config OPS Port. The Ports
Configuration window for the OCH view opens, displaying the port list
for the selected MD.
3. In the Available Ports area, select the relevant ports and click Add. The
ports appear in the Ports in View area, and are added to the OCH view.
The Edit FuN View window opens, where you can modify settings.
The Setup window of the selected OCH card opens, where you perform
card setup and view and modify attributes of modules and transmission
objects (including Application Code, Channel Frequency, FEC, ALS,
and so on).
2. Repeat as needed to connect the relevant OCH cards to each other and to
the MD. Link operations for OPS and OTS links are similar (including
viewing properties, editing, and deleting). You can build more views with
additional OPS ports and add more tabs. You can add additional OCH
cards. In the Views window you can view the new tabs, as shown in the
following figure.
PELES updates the following PCO Expected Input Power (EIP) attributes:
| EPPCpa: Expected PPC at the output of the previous amplifier. The
process goes back on the chain and copies the EPPCo of the amplifier
preceding the element at the zEP of the span being processed.
| NOCi: Number of channels at the input of this element. The process
derives the NOC from the list of active channels of the span.
| NOA: Number of amplifiers preceding this element. The process goes back
on the chain and counts the number of preceding amplifiers.
| AVGpa: Average gain of the amplifiers preceding this element. While
counting the amplifiers, the process also gets the actual gain of every
amplifier it encounters and calculates the average. All the above values are
set to the PCO at zEP of the span under process.
| Elpa: Expected loss (attenuation) from the previous amplifier. In the end,
after all the above values have been corrected, the remaining task is to copy
the ALpa to Elpa (ADOPT).
The PCO EIP attributes are based on the equation:
10xLog(NOCix10EPPCpa/10) + NOA x10(-27 + AVGpa)/10) -ELpa
Click and wait for the PELES chain creation operation to complete.
OR
After reaching the last span with the EOC at its zEndPoint, the PELES
activates the update process.
The update process performs measurements on the span and updates its
attributes. Then, if the chain is not locked and all the cards are installed and
properly set up, PELES updates the power control objects in the NEs.
The newly created chain appears in the PELES Chain List window.
2. Click the Hide/Show Legend button to toggle the display of the legend that
describes the span channel color codes.
Responses to Triggers
Enhanced APC responses to triggers include:
| Span Loss Change (SLC): change in the attenuation of a span. Detected as
Input Power Change (IPC) in a PCO.
| While in the idle state, the PELES responds to the first detected IPC alarm.
If the event causes more than one IPC alarm along the chain, the rest are
ignored.
| The PELES processes the spans and updates the PCOs along the chain one
by one, starting at SOC.
| During the update of a PCO in response to an SLC, the PELES turns on
PCO tracking, and then turns off again.
| If an IPC alarm is detected along the chain, and a subsequent alarm comes
nearer to the SOC than the one that triggered the response, the second
alarm is not acknowledged.
| Tracking Limit Exceeded (TLE) or LOS always locks the chain regardless
of the sequence of detection in relation to an SLC.
Perform the following update as a second update run after initial creation, or
whenever the EPPCo PELES calculated value is OK for all the PCOs in the
chain.
Locking/Unlocking Chains
It is recommended to lock a PELES chain whenever it is necessary to:
| Perform maintenance
| Insert or replace an element in the middle of the chain
| Change a SOC or EOC type or configuration
| Add or delete channels
Overview
This section describes how to use the EMS-XDM XC subsystem to cross
connect traffic on XDM equipment.
One of the key benefits of SDH and WDM technologies is the ability to direct
the flow of traffic dynamically, using management software rather than
hardware switching.
Using the EMS-XDM XC subsystem, you can cross connect traffic on XDM
equipment. XDM NEs feature an advanced Add/Drop Multiplexer (ADM)
architecture.
Workflow
The EMS-XDM XC subsystem enables you to create the following types of
XCs:
| DCC XCs
| HOVC XCs
| LOVC XCs
| Ethernet Data XCs
| Concatenated XCs
| External DCC XCs
| Orderwire XCs
| Before you begin creating XCs, it is important to first plan the XCs
required for the network.
| The EMS-XDM XC subsystem features the XC Browser, in which you can
create and edit XCs, as required by your system.
| Before you can create LOVC XCs, you must first set up HOVC XCs.
| After you create an XC, you must activate it for it to take effect.
| For a complete workflow procedure, see Workflow for Creating XCs in the
XC Browser.
In the XC Set List window, on the menu bar, select XC > Create.
The menu bar, located at the top of the XC Browser, provides pull-down File
and Mode menus. Click on a menu to display all the items in that menu for
performing operations in the XC Browser Shelf View.
You can also perform operations relating to selected objects in the Edit View
using shortcut menus invoked by right-clicking over the object, or by clicking
one of the command buttons in the Edit/Command area.
XC Browser Toolbar
The XC Browser toolbar, located beneath the XC Browser menu bar, allows
you to perform various operations on XCs, as described in the following table.
In the current product release, the objects displayed in this area are:
| AU-4 objects when an SIO card is selected in the XC Browser Shelf View
| DGBE objects when an EIS or DIO card is selected
| 2M PDH objects when a PIO card is selected
| 34/45M PDH when a PIO345 card is selected
Objects in the XC Browser Card Internals and the AU-4 Internals areas are
color-coded to indicate their functionality in the XCS.
AU-4 Internals
The AU-4 Internals area (located in the middle left zone of the XC Browser)
displays the VC-4 and TU objects of the AU-4 selected in the Card Internals
area.
AU-4 Internals
The AU-4 Internals area (located in the middle left zone of the XC Browser)
displays the VC-4 and TU objects of the AU-4 selected in the Card Internals
area.
Edit View
The Edit View area displays details regarding the transmission objects defined
in the XC and the connections defined in the XCS.
Edit/Command Area
In the Edit/Command area, located in the upper right zone of the Edit View
area, you can view and modify XC parameters and perform operations on XCs.
| Activate the XC (that is, take the XC from the Edit or planning stage into
the Active state and send the action to the NE).
| Export/Save the XC as an XML file (optional).
| Delete connections or transmission objects from the Edit tab.
To view and modify XC parameters, fill in the Edit/Command area fields.
To perform various operations on XCSs, click the Edit/Command area
command buttons.
NOTE: Do not use symbols such as " & > < ' in the Customer
and Label fields, since they render XC XMLs unusable (that
is, they prevent activation of XCs from XML).
The following figure shows a sample XC Details area, displaying the various
colors:
You can click the Active and Edit tabs to toggle between the modes.
| Active Mode: Displays XC details as actually defined in the NE and the
database. (Read-only.)
| Edit Mode: Reflects the design or planning phase of your work.
In the Edit/Command area, you can view and modify XC parameters and
activate XCs (that is, take the XC from the Edit or planning stage into the
Active state). You can also assign protection to XCs and delete XCs.
Changes are put into effect when you activate them or when you click OK in
the Configuration window.
You can toggle between viewing the Edit and Active modes of selected XCs if
the alternate mode is available. A newly created XC exists only in Edit mode
(has no corresponding Active mode) until activated.
The Edit tab features the XC Details area.
XC Details Area
The XC Details area (located at the bottom of the XC Browser) shows the
cards and their related transmission objects in the XC.
As shown in the previous figure, the slots appear in the left column and the
transmission objects in the right column.
Each (horizontal) card row displays the transmission objects related to that
respective card.
The center of the XC Details area displays the connecting lines, showing the
XCs that define the traffic flows through the NE, and the connection endpoints
(Add, Drop, and Add & Drop).
You can use the scroll bar on the right of the XC Details area to scroll to view
any additional endpoints.
The following table describes the information displayed on the endpoints.
The XC Browser XC Details area has a shortcut menu on which you can click
commands to activate various operations.
The following table lists the available XC Browser Details area shortcut menu
options. However, note that not all operations are available for all objects.
2. In the Card Internals area, select a transmission object. Using the SHIFT
key, you can select multiple AU-4 objects.
3. If you select a VC-4 or TU object(s) in the Card Internals area, select the
AU-4(s) associated with the object, and then the object(s) itself in the AU-4
Internals area (valid only after the HOVC XC set is created).
In the AU-4 Internals area, click any one of the available TU tabs where
you can view and select Src and Snk transmission objects to add/drop, and
so on.
4. Select the TUs (transmission objects) that you want to assign as the
endpoints and traffic carriers in the XC.
In HOVC XCs, the transmission objects are AU-4s and VC-4s.
5. Click one of the command buttons (Add, Drop, or Add & Drop), located
below the respective Card Internals or AU-4 Internals area of the XC
Browser. After defining the function, the transmission object appears in the
XC Details area located at the bottom of the XC Browser.
To create an XC:
1. In the Edit View area, create a bidirectional XC between two transmission
objects by clicking the label area of each to designate them as endpoints.
The endpoint display turns blue, and the XC is created and appears with a
double connecting arrow indicating the bidirectional connection.
2. Select the relevant card. The DCC RS and MS objects appear in the XC
Browser Card Internals area.
4. Assign connections.
5. In the Edit/Command area, click Activate. The DCC XCS is activated.
3. To select a different DCC interface for the DCC, in the DCC Interface
dropdown list, select an option in the range 1-32. (For DCC Clear Channel,
the range is 1-33.) The interface you select here corresponds to the entry in
the DCC routing table.
Creating COM XC
Creating SDH XC
5. Proceed to create and activate the XC. The DCC Clear Channel XC is
created and appears in the XC Set List.
Bidirectional HOVC XC (if the VC-4 has Add & Drop functionality)
Unidirectional Src HOVC XC (if the VC-4 has Add functionality)
Unidirectional Snk HOVC XC (if the VC-4 has Drop functionality)
| A through XC between an AU-4 and an AU-4.
(You can repeat the above step to add multiple XCs to the XC Details
area.)
4. In the AU-4 Internals area, select the Snk or/and Src VC-4 object, and click
Add, Drop or Add & Drop.
A terminated XC is a connection between an AU-4 and a VC-4.
3. In the Number of XCS field, enter the number of XCSs you wish to create
by clicking the scroll buttons.
4. Typically, the system creates XCS sets using consecutive transmission
object resources. Sometimes a transmission object in the series may be
busy. To automatically skip busy transmission objects and detect the next
available object/resource, select the Ignore/Skip Busy Transmission
Objects? checkbox.
The process continues without interruption, and creates XCSs using the
next available transmission object in the series.
5. Click OK. A message box appears, displaying the result of the operation
(success or failure).
If the XCS creation is successful, a message similar to the following
appears, displaying a relevant ID number for the XC set:
XCSs in the series are created with the same label, with a number added for
each XCS (for example, LABEL1, LABEL2, and so on). XCSs in the series
are created with the same customer name, and the ID number is
incremented automatically.
XCSs are created until any one of the following scenarios occurs:
Terminating XCs
You can terminate AU-4s to prepare for LO trails in a single right-mouse click
operation. This will result in the creation of an AU-4 to VC-4 XC.
To remove termination:
| In the XC Set List, select the AU-4 VC-4 XC and click Delete.
Termination is removed.
3. In the Number of XCS field, enter the number of XCSs you wish to create
by clicking the scroll buttons.
4. Typically, the system creates XCS sets using consecutive transmission
object resources. Sometimes a transmission object in the series may be
busy. To automatically skip busy transmission objects and detect the next
available object/resource, select the Ignore/Skip Busy Transmission
Objects? checkbox.
The process continues without interruption, and creates XCSs using the
next available transmission object in the series.
5. Click OK. A message box appears, displaying the result of the operation
(success or failure).
If the XCS creation is successful, a message similar to the following
appears, displaying a relevant ID number for the XC set:
XCSs in the series are created with the same label, with a number added for
each XCS (for example, LABEL1, LABEL2, and so on). XCSs in the series
are created with the same customer name, and the ID number is
incremented automatically.
XCSs are created until any one of the following scenarios occurs:
2. You can automatically or manually select the resources for the LOVC XC,
as follows:
To select resources automatically, click one of the following buttons
(EMS-XDM selects the first available resource):
To create a bidirectional LOVC XC, at the bottom of the Card
Internals area, click Add & Drop.
To create a unidirectional LOVC XC, at the bottom of the Card
Internals area, click Add or Drop.
To select a specific resource manually, in the XC Browser Card
Internals area, select the desired resource, and then click one of the
command buttons.
The object you selected appears in the XC Details area of the XC
Browser.
The AU-4 Internals area contains a VC-4 control unit, displaying four tabs, as
shown in the following figure.
4. To select endpoints for the XCS, in the XC Details area, click the Add or
Drop area (red or green symbol) of the first endpoint in the XC. The
endpoint display turns blue.
5. Select the second endpoint. The XCS is created and appears with a
connecting arrow indicating the Add and Drop direction.
6. In the Edit/Command area, click the Activate button to activate the XCS.
Connected endpoints belonging to an XCS appear in the XC Browser Card
Internals area with function icons adjacent to the endpoint IDs.
NOTE: You can select all three LO data rates (tabs) only if
the HOVC XC is terminated at the selected VC-4 (Snk, Src,
or both).
| When VC-4 objects are added to a GEoS port, an XCS containing the VC-4
objects is automatically created.
| When you add VC-4s to a GEoS port, new XCs are created and their
corresponding XCs, which were created upon card assignment, are
automatically deleted from the XCS.
When you delete these VC-4s, the XCS returns to its original set created
upon card assignment.
In the XC List, you can view and modify all XCS definitions made
automatically in association with DIO1_61 cards (for example, ID, label, and
customer name) using the Edit XC operation. However, you cannot assign the
ID number to a value higher than 999989999. Moreover, once you modify the
ID number, you cannot change it back to the number originally assigned by
EMS-XDM.
Limitations
NOTE: To increase the rate, you must first add the VC-4s to
the GEoS port.
Creating Policers
EMS-XDM enables you to create policers to police the traffic carried by each
Ethernet Layer 2 flow in an EIS/EISM card. Policers follow the DiffServ
model to ensure that the correct bandwidth limitations defined in the Service
Level Agreement (SLA) between the provider and its customers are enforced.
Any traffic that exceeds these limits is dropped at the ingress to the flow. Up to
127 policers can be defined per card. Note that before you can create an
Ethernet flow, you must first assign a policer to the selected card.
Policers are based on a combination of a CoS and the following two traffic
parameters:
| Committed Information Rate (CIR): defines the transmission rate (in
Kbps) confirmed by the SLA. The CIR is applied in increments with fine
granularity.
| Committed Burst Size (CBS): defines the maximum number of bytes that
can be carried in a single transmission burst (in KB).
Policers must exist before priorities can be assigned to flows. They can either
be created before flows are defined, or during the create flow procedure.
You can manage policers defined in the network in the Policer List window.
To create a policer:
1. In the Shelf View, select an EIS/EISM card.
2. On the menu bar, select Connections > Create Policer. The Create
Policer window opens.
3. In the S-VLAN dropdown list, select a CoS option: Gold, Silver, Bronze,
or Best Effort.
4. In the CIR field, enter the transmission rate to be enforced by the policer.
5. In the CBS field, enter the maximum burst size to be enforced by the
policer.
6. In the Service dropdown list, select Enable to enable the SLA service.
7. In the Label field, enter a name for the policer.
Managing Policers
You can manage (view, modify, activate, delete) the policers defined in the
network in the Policer List window.
You can open the Policer List from the network, shelf, or card level, or for a
selected port in the EIS/EISM Card Internals View.
To manage policers:
1. In Shelf View, Card Internals View or EMS-XDM main window, select
Connections > Policer List. The Policer List window opens, displaying
parameters described in the following table.
2. To perform operations in the Policer List window, select a policer row and
click the relevant command on the menu bar (or toolbar):
3. To view, modify, and activate an existing policer:
a. Select the relevant row and on the menu bar, select Policer > Edit. The
Edit Policer window opens, displaying the same fields as the Create
Policer window.
b. Edit the fields, as described in Creating Policers.
c. To enable or disable a policer, in the Edit Policer window, in the
Service dropdown list, select the relevant option (enable or disable).
d. On the menu bar, select File > Apply to save the changes.
4. To delete a policer, select the relevant row, and on the menu bar, select
Policer > Delete. The selected policer is deleted.
To delete a policer:
1. In the Policer List window, select a policer row.
2. On the menu bar, select Policer > Delete. The selected policer is deleted.
Filtering Policers
The data displayed in the Policer List window can be filtered using the Policer
List Filter window.
You can filter the Policer List by any column in the Policer List window.
Filtered results are displayed in the Policer List (Filtered) window.
In the Shelf View, on the menu bar, select Connections > Policer Filter.
The Policer List Filter window opens, in which you can specify the flow
criteria for filtering.
2. To filter by label, in the Label field, enter a label describing the policer.
Select the adjacent Exact Match checkbox to display filtered results with
an identical matching name. Select the adjacent Case Sensitive checkbox
to display case-sensitive matching entries.
3. To filter by S-VLAN name, in the S-VLAN field, choose an option from
the dropdown list.
4. To filter by CIR value, in the CIR (KB/S) field, type the CIR value (must
be numeric).
5. To filter by CBS value, in the CBS (KB) field, type the CBS value (must
be numeric).
6. To filter by Service, in the Service field, choose an option from the
dropdown list.
7. To filter by S-VID, in the S-VID field, type the S-VID number (must be
numeric).
8. To filter by CD-VID, in the CD-VID field, type the CD-VID number (must
be numeric).
9. In the panes located in the lower area of the window, select the slot or port
whose policer data is to be filtered.
Note that some of the panes in this part of the window may be grayed-out,
depending on whether you accessed the Policer List Filter window from
the main window or from the Shelf View.
To filter flows on a specific slot, select the required slot in the Slot
pane. The Slot pane displays a list of relevant cards.
To filter flows on a specific port, select the port in the Port pane. The
Port pane displays the port list for the slot selected in the Slot pane.
10. Click OK to perform the filtering operation. The Policer List (Filtered)
window displays the filtered results.
An Ethernet ETY or EoS port can serve more than one flow.
NOTE: After XCs have been created, you should set both the
Payload Carrying Expected Tx attribute for the Src and the
Payload Carrying Expected Rx attribute for the Snk to Active
for all VC-4s assigned to the EoS port. This must be done on
both the Src and Snk sides.
You can select all VC-4ss by clicking one VC-4s and then
choosing Select All from the Configuration menu in the
Card Internals View.
3. Before you can create an EIS flow, you must first assign a policer.
4. In the Shelf View, select an EIS card and on the menu bar, select
Connections > Create Flow. The Create Flow window opens.
5. In the S-VID field, type the S-VID that will identify this flow (range of
values 1-4094).
6. In the Customer field, type the name of the customer for whom the flow is
being created.
7. In the S-VLAN Name field, type a descriptive name for the flow.
8. In the Add Port area, from the dropdown list, select an EIS ETY or EoS
port.
9. If you selected an EoS port, click the arrow to add the port to the
Member Ports tree displayed in the Create Flow window.
OR
If you selected an ETY port, you must select the CD-VIDs that will be
associated with this S-VID. From the CD-VID dropdown list, you can:
12. After adding all necessary ports and CD-VIDs to the selected S-VID tree,
you must map the customer priorities to the CoS levels supported by the
XDM, as follows:
a. Select the priority title of a CD-VID from the tree.
b. In the Map Policer area, in the Customer CoS dropdown lists, select a
range of customer priorities (range 0-7).
c. In the Policer dropdown list, select a policer to define the
corresponding CoS and traffic levels for the selected customer
priorities, and click Add. The priorities appear in the Member Ports
tree as a sub-branch of the mapping for the selected port. (For more
information about policers, see Creating Policers.)
If there are customer priorities that were not assigned to this policer, select
them from the dropdown lists and assign a different policer to them. All
customer priorities must be assigned to a policer.
Modifying Flows
In the Flows List, you can view and modify Ethernet flows defined in the
network.
2. In the Flow List table (located in the upper zone of this window), select a
row to view additional flow details in the PD View area including the
member ports and the defined CoS equivalencies for each customer
priority.
To edit a flow:
1. In the Flow List table, select the relevant row.
2. On the menu bar, select Flow > Create. The Create Flow window opens.
3. Edit the fields, as required. The S-VID cannot be modified.
4. In the Create Flow window, on the toolbar, click to apply the changes.
Filtering Flows
The data displayed in the Flow List window can be filtered using the FlowList
Filter window.
You can filter the flow list by any column in the Flow List window. Filtered
results are displayed in the FlowList (Filtered) window.
For instructions how to use the FDB to identify the specific Ethernet hosts
sending the traffic and to learn which ports are associated with that host, see
Using the Forwarding Database.
2. To filter by VLAN name, in the VLAN Name field, enter a VLAN name.
Select the adjacent Exact Match checkbox to display filtered results with
an identical matching name. Select the adjacent Case Sensitive checkbox
to display case-sensitive matching entries.
3. To filter by customer, in the Customer field, enter a customer name. Select
the adjacent Exact Match checkbox to display filtered results with an
identical matching name. Select the adjacent Case Sensitive checkbox to
display case-sensitive matching entries.
4. To filter by network ID, in the Network Identifier field, enter the network
ID number. This entry must be numeric.
5. To filter by VLAN ID, in the VLAN ID field, enter the VLAN ID number.
This entry must be numeric. (The Dedicated Service option is not currently
supported.)
6. In the panes located in the lower area of the window, select the NE, slot, or
port whose flow data is to be filtered.
Note that some of the panes in this part of the window may be grayed-out,
depending on whether you accessed the FlowList Filter window from the
main window or from the Shelf View.
Before you can begin filtering operations within the FDB, you must first
retrieve entries.
To retrieve entries for a specific S-VID, in the SVID field, enter the ID,
and click OK.
To retrieve entries for a specific port, in the Port field dropdown list,
select the required port, and click OK.
To retrieve entries of a specific status, in the Status field dropdown list,
select the required status, and click OK.
You can choose one of the following status options:
Invalid: Entry is not valid - it was learned but has not yet been
flushed from the table.
Learned: Value of the corresponding instance has been learned and
is being used.
Self: Indicates which of the device ports has this address.
Static: Not supported in version 4.0.
To retrieve all entries in the FDB, click OK.
The results of each retrieval operation are displayed in an FDB Table window.
After FDB entries have been retrieved, they can be filtered based on one or
more filtering criteria.
Each filtering operation produces a separate results list that is displayed in an
FDB Table window. If multiple filtering operations are performed on a set of
entries, each results set is displayed in a separate FDB Table window.
Multiple FDB Table results windows can be open simultaneously. Filtering
results are static and cannot be refiltered.
Registering Flows
S-VLAN registration propagates a previously defined Ethernet flow to other
EIS cards of the EMS-XDM.
Typically, an EIS cards has up to eight EoS ports. If you want to create a
service, you need to create a flow to designate through which EoS port to route
traffic going to the network.
Within the EMS there may be multiple Flow Domain networks and each EIS
card has its own network ID. Each link between EoS ports may be assigned a
subnetwork ID (which is assigned in the EMS as a EoS port attribute).
In the Info window of the Ethernet Src object of the EoS port, you can view
subnetwork IDs as follows: Open the EIS Card Internals View, and select the
Ethernet Src object of the EoS port, and on the File menu, click Info to view
the subnetwork IDs.
In the Info window of the Bridge object, you can view network IDs as follows:
Open the EIS Card Internals View, select the Bridge object, and on the File
menu, click Info to view the network ID.
EMS-XDM enables you to use the network IDs for propagating/copying EoS
port definitions (S-VIDs). You can fine-tune/prune traffic distribution by
propagating S-VLAN flows to assigned network and subnetwork IDs.
To register a flow:
1. Access the S-VLAN Registration window from either the Flow List
window or from the Create/Edit Flow window as follows:
In the Flow List window, select a flow from the list and on the menu
bar, select Flow > S-VLAN Registration.
OR
In the Create/Edit Flow window (after S-VLAN flow settings have
been applied), on the menu bar, select File > S-VLAN Registration.
The S-VLAN Registration window opens, displaying the S-VID (in both
the first field as well as in the title bar), the S-VLAN name, and the
customer name (as read-only attributes), and two trees: Entire Network
and Propagation Target.
The Entire Network tree displays all EoS ports not displayed in the
Propagation Target tree. The Propagation Target tree displays the EoS
ports of the network of the selected (source) flow and all contained
subnetworks, except for ports of any bridges which have a flow of this S-
VLAN ID already assigned to them.
2. In the Entire Network Tree, select the relevant object, which may be an
entire network, subnetwork, or EoS port, and click to add the targets
to the Propagation Target tree.
3. To prune traffic and remove targeted subnetworks, in the Propagation
Target tree, select the objects to be removed and click . The
"pruned" objects appear in the Entire Network tree (and are excluded from
the propagation targets).
5. Click Yes to confirm. A results window opens showing how many new
flows have been created and how many failed. If successful, the selections
in the Propagation Target tree result in the creation of new flows or are
added to an existing flow(s).
Flows are created based on separate EIS cards. If multiple ports are
included for the same EIS card, they will be created in the same flow. EoS
ports that already exist on the same card as the prototype flow will be
added to the prototype flow.
In the case of failure, you can view a list of failed flows and the failure
reasons in the Propagation Log.
Deleting Flows
In the Flow List window, you can delete selected Ethernet flows.
To delete a flow:
1. In the Flow List window, select a flow(s) from the table.
2. On the menu bar, select Flow > Delete. The selected flow(s) is deleted.
Printing Flows
In the Flow List window, you can print Ethernet flows to a designated printer
or text file.
Exporting Flows
Flows can be exported to an XML file.
To export a flow:
1. In the Flow List window, do one of the following:
To export a selected flow(s), in the Flow List table, select a flow(s) and
on the menu bar, select File > Export Selected to File.
OR
To export the entire flow list, on the menu bar, select File > Export to
File.
A window opens for defining a file name and location.
The Rate field in the XC Set List window varies according to the type of
concatenated signal you select.
3. Repeat the previous steps to select another concatenated group you can
cross connect to the first group.
The XCs for the objects connecting the XDM to external vendor equipment
must be defined as endpoint objects rather than regular objects. The bottom
portion of the previous figure shows the appropriate connections between the
Src and Snk of the two endpoint objects.
2. In the XC Browser Shelf View area, select one of the sensitized cards
carrying external DCC objects (SIO cards). The selected RS EXT DCC or
MS EXT DCC objects appear in the XC Browser Card Internals area.
3. In the XC Browser Card Internals area, select an RS and MS object
(manually or automatically), and click Add, Drop, or Add & Drop to add
it to the EXT DCC XC in the XC Details area. This process must be
performed for each object you select.
4. In the XC Browser Edit View area, click the Edit tab. The XC Details
area opens in Edit mode.
5. In the XC Details area, right-click an object, and select an endpoint. This
action defines the object as an endpoint. Perform this step for both objects.
6. Assign connections between these objects by assigning the Src to the Snk
for both objects, respectively. (You cannot edit the DCC XC after
activation within the same operation, so be sure to make all changes before
activating the XCS.)
7. In the Edit/Command area, click Activate.
DCC XCs appear in the XC Set List as SOH type with DCC listed in the rate
column.
By default, the EXT DCC XCS is broadcast to all NEs in the network.
The previous figure depicts three chained XDMs: XDM 1, XDM 2, and
XDM 3. The I1 port connecting XDM 1 to external vendor equipment is
defined as an endpoint. Similarly, the I9 port connecting XDM 3 to external
vendor equipment is an endpoint. All other ports between XDM 1 and XDM 3
are regular (non-endpoint) objects.
The lower portion of the previous figure shows the appropriate XCs between
Src and Snk objects for this sample configuration. For example, the I1 port is
defined as an endpoint and is cross-connected to port I5. The I5 port is a
standard object type.
2. Proceed with Step 2 in the procedure in Creating External DCC XCs for a
Single XDM.
The previous figure depicts several chained XDMs that utilize a protection
path. In this configuration, the I1 port connecting XDM 1 to external vendor
equipment is defined as an endpoint.
The lower portion of this figure shows the XCs that must be defined for both
the main and protection paths for the XDM whose endpoint port is I1.
In the XC Browser, XCs for the XDM on the main path are displayed in pink
and XCs for its protection path are in blue.
2. Proceed with Step 2 in the procedure in Creating External DCC XCs for a
Single XDM.
3. Assign connections between objects for the main path by assigning the Src
to the Snk between both objects, respectively.
4. Assign connections between objects for the protection path by assigning the
Src to the Snk between both objects, respectively.
5. To designate a connection between objects as a protection path object, in
the XC Details area, right-click the object, and select Protection from the
shortcut menu.
6. After all connections have been defined, in the Edit/Command area, click
Activate.
Creating OW XCs
The EMS-XDM XC subsystem enables you to create OW XCs.
OW technology facilitates voice contact using OW (E1 and E2) and F1 bytes. It
is based on a telephone "party line" concept where all connected parties,
typically technicians, can participate in concurrent voice-based service calls. As
such, it enables one or more technicians to make service calls simultaneously,
using dedicated OW channels rather than regular SDH lines.
Dedicated OW lines are normally used between a remote site and a central
office when initially installing the system or when no telephone line is
available. All calls are bidirectional.
EMS-XDM supports the following OW features:
| Up to 12 connections for single-party point-to-point calls and digital
conference calls. Two of these connections are dedicated to WDM via the
Supervisory Channel.
| Global and Selective signaling types.
| DTMF dialing. Every NE has a unique six-digit number used for dialing
purposes, which is assigned during installation. It is possible to change this
number later.
| A buzzer and LED to indicate incoming calls. This buzzer sounds
independent of the Network Selection (NET SEL) switch position.
OW is supported in mixed XDM networks, SDH environments, OADM, or
DWDM sites, and for all topology types.
Both OW channels can be used for conference calling and can accommodate up
to 10 connections per channel. Two distinct conferencing groups can be
defined. For each OW channel, you can determine whether it participates in
conference Group A or Group B.
The E1, E2, or F1 port can be selected on the entry NE to carry the OW
signal. For this type of configuration, an XC is made between two SIO
cards, where an E1 is connected to an E1, an E2 is connected to an E2, or
an F1 is connected to an F1. Only E1, E2, or F1 ports can carry OW
transmissions.
| Group: Network that enables two different groups to be defined for use in
conference calls. Within each group, up to 10 connections are mapped into
one of two groups (Group A or Group B). These two groups indicate in
which group the connection can participate for conference calling. In
effect, incoming OW bytes from SIO cards are mapped to OW bytes on the
Overhead Access (OHA).
The following figure illustrates the conference group mapping concept used in
EMS-XDM.
Dialing Policy
Each NE is assigned a unique OW dialing number (in the range 001000 -
999999).
OW Limitations
The following limitations apply to OW configuration:
| Protection on OW trails such as MS-SPRing, is not supported.
| OW termination equipment, such as OHA and MECP, is not protected.
| When using an HLXC 192 matrix card in the XDM-500, an overhead
through connection cannot be made via streams 3 and 4 in SIO_16 or
SIO4_4 when either of these cards is in slot 5.
| When using an HLXC 192 matrix card in the XDM-1000, an overhead
through connection cannot be made in the following cases:
Via streams 3 and 4 in SIO1_16 or SIO4_4 when either of these cards
is in slot 5.
Via streams 3, 4, 7, and 8 in SIO1_16 when the card is in slot 12.
OW Configuration
You can configure OW setup within the Card Internals of the MECP card.
OW configuration consists of the following primary steps:
1. Configuring the MECP card to provide OW support on the NE.
2. Setting Up OW XCs.
3. Defining OW Conferencing Groups.
Setting Up OW XCs
To enable OW communications, you must define the necessary XCs between
the OW objects inside an NE SIO card and the OW objects on another
participating NE (its SIO card). OW XCs must be used for cross connections
between SIO cards.
In addition, you must create an XC between OW objects on an NE MECP and
SIO cards. It is mandatory to use an OW XC for this purpose.
The process is the same as for creating all required XCs.
To create an OW XC:
1. In the MECP Card Internals (displaying OW objects), on the menu bar,
select Connections > Create XC Set to open the XC Browser.
2. In the XC Browser, on the menu bar, select Mode > OW Mode. After
changing to OW mode, the cards that carry OW objects (SIO and MECP
cards) become sensitive in the XC Browser Shelf View and their
associated OW objects appear in the Card Internals area.
3. Proceed with the steps described in creating XCs. OW XCs appear in the
XC Set List with OW listed in the Rate column.
4. After all conference groups have been defined, on the toolbar, click to
apply the changes. A confirmation message window opens confirming the
successful operation.
5. Click Close to close the message window.
3. In the Edit View area, in the Capacity field, choose an option from the
dropdown list (GBE, GBE-8, FC-1, FC-2, STM16, STM16_C). (This
field is enabled only for SPO objects and only for AOC&4xAny cards. It is
disabled for SPO Master, and only displays the relevant read-only value.)
4. After adding master SPOs to the XC Edit View, click them and proceed to
create the XC. (For Agg/OTUs, all SPO’s will be displayed, enabling you
to select them so that they can participate in a group.)
If you add an SPO which is not concatenated ( in the Aggregate or OTU
module), you have two options :
Add one SPO and define the size in the Capacity field. Once the size is
defined activatation will create a concatenated group with the defined
size and create the XC between the groups.
Add specific SPO’s to the Edit View ( upon the second one, the
Capacity field becomes read only ) and the size will be defined
according to the amout of SPOs in the Edit View.
In both cases , if the concatenation succeeded and the XC fails, then you
should perform “ungroup” from the Card Internals . The rate of all the XCS
will be SPO. In the Info window of the SPO object, you can view details
including the members of the group and its capacity, and you can create or
delete the group (but not edit it). If, for example, you want to create STM16
concatenation, it will use STM16_c capacity. If you want to create 16
STM1 XC ( in same XCS), it will use STM16 capacity.
5. Click Activate to activate the XC. Groups are created, if needed. SPO
slaves become invisible upon group creation. The XC action is only on the
master SPO, and is bidirectional by default. All affected objects are updated
simultaneously (that is, changes are automatically synchronized).
Editing is only on the SPO master, to change the protection state from
unprotected to protected and vice versa, modify TPs, and so on.
Deleting is only on the SPO master, as is reverting to default. After XC
deleting, ungroup is performed.
If the SPO is concatenated but not XC-ed, you can continue to create the XC,
or you can ungroup via Card Internals.
Activating XCs
The EMS-XDM XC subsystem enables you to activate XCs.
All additions and modifications are made in Edit mode and remain in a design
phase only until the new or edited XCS is activated.
The Active mode displays the actual state of the XCS in the NE. This allows
you to check your modifications systematically by toggling between the Edit
and Active modes to compare the changes that you have added with the
existing state within the NE.
To activate an XCS:
| In the XC Browser XC Details area, select an XCS, and in the
Edit/Command area, click Activate.
If the edited XCS is a valid configuration, activation is enabled. If
activation succeeds, the following occurs:
Filtering XCSs
In the XC Set List, you can filter the display of the XCSs according to
specified criteria.
To filter XCSs:
1. In the XC Set List window, on the menu bar, select View > Filter. The XC
Set Filter window opens.
2. Fill in the fields, as described in the following table. For example, if you
select the XCSet Label: "XC Set", "Exact Match", and Fabric type "OCH",
the XC Set List window opens, displaying only those XCSs labeled XC Set
of type OCH.
3. Click OK to save the changes.
Set Usage Set XCS Usage State. Select an option and in adjacent Set Usage
State State dropdown list, choose a usage state. Options:
| New XCSet Usage State: Assigns a new usage state for merged
XCS.
| Usage State from first XCSet: Assigns merged XCS usage
state from first XCS selected.
| Usage State from second XCSet: Assigns merged XCS usage
state from second XCS selected.
In Set Usage State dropdown list, select:
| Active: A lower rate XC passes through XCS.
| Idle: No lower rate XC passes through XCS; you can delete this
type of XC.
| Busy: There is traffic on XCS.
Configuring XCs
The EMS-XDM XC subsystem enables you to view and modify the attributes
of activated XCSs and transmission objects (TUs), including usage state, PM
counters, and severity profile.
In the XC Set List, select an XC and on the menu bar, select XC >
Configure.
2. Fill in the fields, as described in the following table. Modified fields appear
blue until changes are successfully applied.
Field Description
PM Collection Whether PM collection is enabled for selected object.
Options: On or Off.
TTI Expected Trail Trace Identifier text string expected for selected object.
Edit field as needed (minimum of two characters required).
TTI Sent TTI string sent for selected object. Edit field as needed
(minimum of two characters required).
TSL Expected Expected Signal Label and path status information for
transmission object. Options:
| For high-order transmission objects: Unequipped,
Equipped nonspecific, TUG structure, Locked TU,
34M/45M, 140M, ATM, MAN DQDB Mapping,
FDDI Mapping, GFP Mapping, Test Signal O. 181,
VC-AIS
| For low-order transmission objects: Unequipped,
Equipped - nonspecific, Asynchronous, Bit
Synchronous, Byte Synchronous, Test Signal O. 181
TSL Sent Received Signal Label and path status information.
| For high-order transmission objects: Unequipped,
Equipped-nonspecific, TUG structure, Locked TU,
34M/45M, 140M, ATM, MAN DQDB Mapping,
FDDI Mapping, GFP Mapping, Test Signal O. 181,
VCAIS
| For low-order transmission objects: Unequipped,
Equipped - nonspecific, Asynchronous, Bit
Synchronous, Byte Synchronous, Test Signal O. 181
Deleting XCs
The EMS-XDM XC subsystem enables you to delete XCs. You can delete
individual connections or multiple connections and XCS components.
To delete a connection:
| In the XC Browser XC Details area, select the connection line and in the
Edit/Command area, click Del Sel. The connecting line disappears,
indicating the selected connection is deleted.
In the XC Browser, on the menu bar, select File > XC Set List.
The XC Set List window opens. You can select a row to view the XC in
the Active View area at the bottom of the window.
XC Set List
In the XC Set List table, you can view information about each of the XCs
defined in the NE.
If desired, you can sort the XCSs according to any column in the XC Set List
by clicking the appropriate column header. Click twice to toggle between
ascending and descending orders. You can also change the order of the
columns by dragging a column heading to a new location.
The following table describes the read-only fields of the XC Set List.
Merging XCSs
In the XC Set List, you can merge two XCs into a single XC. The following
conditions must be met:
| The XCs must be of the same rate.
| Protected XCs cannot be merged.
| Only two XCs can be merged.
To merge XCs:
1. In the XC Set List, select two XCSs using multi-select.
2. On the menu bar, select XC > Merge XC. The XC Merge window opens.
Deleting XCSs
In the XC Set List, you can delete selected XCSs.
To delete XCSs:
1. In the XC Set List window, select an XCS row(s), and on the menu bar,
select XC > Delete. A confirmation message appears, prompting you to
confirm the deletion.
2. Click Yes to confirm. The selected XCS(s) is deleted. A message appears,
indicating the result of the operation.
Printing XCSs
In the XC Set List, you can print the entire XC Set list, displaying all the XCSs
within a specific NE, or you can select multiple XCSs in the list and print the
selection.
Exporting XCSs
Using the EMS-XDM Export/Import feature, you can export XCSs to an XML
file format. Once you have exported data to an XML file, it can be imported
into the system to restore traffic on an NE.
Exported XML files are placed in the ~ems/eMSXCFiles connections directory
unless the default directory was changed. Before starting EMS-XDM, change
the directory to be used for exporting by entering
setenv ENM_READ_FILES_PATH ~ems/<NEWDIRNAME>
You can use the Copy Trail ASCII File and Store Trail ASCII File (UNIX)
commands from the EMS-XDM main (CDE) menu to copy files from external
storage devices to this directory and vice versa.
2. In the File Name field, enter the name of the XML file.
3. Click Export. A confirmation message appears. If successful, the (selected)
XCSs are saved to the XML file.
4. Click Close to close the message window.
In the Shelf View window, on the menu bar, select System > Import XC.
The File Chooser window opens displaying the XML files that can be
imported. If you have created an XML file and it does not appear in this
window, make sure that the file has been placed in the correct directory.
If this list is long, you can scroll to view all the XML files listed, or
alternatively, find a specific file quickly by entering the first letter of the
file until the list focus moves to the nearest match of the search string.
The end tag indicates that the information of the element is concluded, for
example:
</XCS>
An element can contain other sub elements (which are also elements), for
example:
<XCS>
<XCO>
...........
<XCO>
</XCS>
Attributes
The attribute provides further information on the element. Attributes appear in
a name-value pair and can only appear once in the element to which they
belong, for example:
customer = "ECI Telecom"
Do not forget to insert the > character to indicate the tag is ended.
The first two lines in the XML file are the prolog of the document. The prolog
contains data about the XML version and the character encoding used in the
document. The second line in the prolog includes the DTD file.
DTD File
The xcs.dtd file determines the rules for the XML XC documents.
The operations supported in this file are listed here (all operations are
performed in the element and the database):
affecting.
operation fail.
-->
protectionLevel (PROTECTED |
PREEMPTIBLE |
UNPROTECTED )
#IMPLIED
#IMPLIED >
#IMPLIED
#IMPLIED >
ELEMENT
A line starting with ELEMENT declares the sub elements of the element. If the
element has sub elements, the syntax is:
<! ELEMENT element_name (sub1, sub2)>
The following are special characters that can be used when specifying
elements:
| | - selection
| + - appears one or more times
| * - appears zero or more times
| ? - optional
ATTLIST
A line starting with ATTLIST declares the attributes of the element:
<! ATTLIST element_name attribute_name1
attribute_value1 is_attribute-optional>
For example:
<! ATTLIST XCSAttribute neTitle CDATA
#REQUIRED
CDATA
If CDATA is written after the attribute name in the DTD file, you can write a
string of characters. If the CDATA string is not written, you can choose one of
the attribute values listed.
REQUIRED
If REQUIRED is written after the attribute name in the DTD file, it must be
included in the XML file.
IMPLIED
If IMPLIED is written after the attribute name in the DTD file, it is optional for
inclusion in the XML file.
PCDATA
If PCDATA is written after the element name in the DTD file, no further
elements can be specified after it (that is, it is the end of the tree).
References
XML is a universal format for structured documents and data. For information
on writing XML code, refer to the Internet.
<XCSs>
<CREATE_XCS
xcsId = "1">
<XCSAttributes
usageState = "IDLE"
protectionLevel = "UNPROTECTED"
vpnId = ""
neTitle = "XDM"
concat = "FALSE">
</XCSAttributes>
<XCO
defaultProtUnit = "0"
pathType1 = "MAIN">
<ManagedObject
bidNumber = "2">
<SIOHO
slotName = "I3"
AU-3 = "FALSE"
TransObj = "1">
</SIOHO>
</ManagedObject>
<ProtUnit1
bidNumber = "1">
<OTHER
slotName = "I4"
TransObj = "3">
</OTHER>
</ProtUnit1>
</XCO>
<XCO
defaultProtUnit = "0"
pathType1 = "MAIN">
<ManagedObject
bidNumber = "1">
<OTHER
slotName = "I4"
TransObj = "3">
</OTHER>
</ManagedObject>
<ProtUnit1
bidNumber = "2">
<SIOHO
slotName = "I3"
AU-3 = "FALSE"
TransObj = "1">
</SIOHO>
</ProtUnit1>
</XCO>
</CREATE_XCS>
</XCSs>
<XCSs>
<CREATE_XCS
xcsId = "12">
<XCSAttributes
customer = "myCustomer"
label = "myLabel"
usageState = "IDLE"
protectionLevel =
"PROTECTED"
neTitle =
"XDM">
</XCSAttributes>
<XCO
defaultProtUnit =
"0"
pathType1 = "MAIN">
<PIO
slotName =
"I4"
TONumber =
"15">
</PIO>
</ManagedObject>
<ProtUnit1>
<PIO
slotName = "I4"
TONumber = "16">
</PIO>
</ProtUnit1>
</XCO>
<XCO
defaultProtUnit =
"0"
pathType1 = "MAIN">
<ManagedObject>
<PIO
slotName =
"I4"
TONumber =
"16">
</PIO>
</ManagedObject>
<PIO
slotName = "I4"
TONumber = "15">
</PIO>
</ProtUnit1>
</XCO>
</CREATE_XCS>
<CREATE_XCS
xcsId = "9">
<XCSAttributes
customer = "myCustomer"
label = "myLabel"
usageState = "IDLE"
protectionLevel = "PROTECTED"
vpnId = "myVPNID"
neTitle = "XDM"
concat = "FALSE">
</XCSAttributes>
<XCO
defaultProtUnit = "0"
pathType1 = "PROTECTION">
<ManagedObject
bidNumber = "2">
<SIOLO
slotName = "I5"
VC-4 = "9"
TransObj = "2-6-3">
</SIOLO>
</ManagedObject>
<ProtUnit1
bidNumber = "3">
<SIOLO
slotName = "I7"
VC-4 = "1"
TransObj = "2-6-2">
</SIOLO>
</ProtUnit1>
</XCO>
<XCO
defaultProtUnit = "0"
pathType1 = "MAIN"
pathType2 = "PROTECTION">
<ManagedObject
bidNumber = "3">
<SIOLO
slotName = "I7"
VC-4 = "1"
TransObj = "2-6-2">
</SIOLO>
</ManagedObject>
<ProtUnit1
bidNumber = "1">
<SIOLO
slotName = "I5"
VC-4 = "9"
TransObj = "2-4-1">
</SIOLO>
</ProtUnit1>
<ProtUnit2
bidNumber = "2">
<SIOLO
slotName = "I5"
VC-4 = "9"
TransObj = "2-6-3">
</SIOLO>
</ProtUnit2>
</XCO>
<XCO
defaultProtUnit = "0"
pathType1 = "MAIN">
<ManagedObject
bidNumber = "1">
<SIOLO
slotName = "I5"
VC-4 = "9"
TransObj = "2-4-1">
</SIOLO>
</ManagedObject>
<ProtUnit1
bidNumber = "3">
<SIOLO
slotName = "I7"
VC-4 = "1"
TransObj = "2-6-2">
</SIOLO>
</ProtUnit1>
</XCO>
</CREATE_XCS>
</XCSs>
<XCSs>
<DEL_XCSz
xcsId = "36">
<XCSAttributes
customer = "myCustomer"
label = "myLabel"
usageState = "IDLE"
protectionLevel = "PROTECTED"
neTitle = "XDM">
</XCSAttributes>
<XCO
defaultProtUnit = "0"
pathType1 = "MAIN">
<ManagedObject>
<PIO
slotName = "I4"
TransObj = "5">
</PIO>
</ManagedObject>
<ProtUnit1>
<SIOLO
slotName = "I3"
VC-4 = "1"
TransObj = "6">
</SIOLO>
</ProtUnit1>
</XCO>
</DEL_XCS>
</XCSs>
protectionLevel (PROTECTED )
#REQUIRED
customer (myCustomer )
#REQUIRED
neTitle (XDM )
#REQUIRED
usageState (IDLE )
#REQUIRED
label (myLabel )
#REQUIRED
VC-4 (9 | 1 ) #REQUIRED
<XCSs>
<CREATE_XCS
xcsId="1000000000">
<XCSAttributes
usageState="IDLE"
protectionLevel="UNPROTECTED"
vpnId=""
neTitle="XDM"
concat="FALSE" >
</XCSAttributes>
<XCO
defaultProtUnit="0"
pathType1="MAIN">
<ManagedObject
endpoint="TRUE">
<DCC
slotName="I1"
dccType="RS-EXT"
TransObj="1">
</DCC>
</ManagedObject>
<ProtUnit1
endpoint="TRUE">
<DCC
slotName="I1"
dccType="RS-EXT"
TransObj="1">
</DCC>
</ProtUnit1>
</XCO>
</CREATE_XCS>
</XCSs>
2. In the File Name field, enter a name for the file containing the flow
information.
3. Navigate to the destination folder, select it, and click OK. The selected
file(s) is exported to the destination folder.
NOTE: Do not use the characters ' " & < > in
attributes values !!!
-->
<!ATTLIST PDVLAN_ATTR
ne CDATA #REQUIRED
<!ATTLIST POLICER_DATA
<!ATTLI
The example here shows a sample XML file for creating, editing, and deleting
Ethernet flows. In this example, the following requirements apply:
The PDVLAN_ATTR is mandatory.
At least one PORT_EoS and/or PORT_ETY must be provided.
PORT_ETY must contain the port number as it appears in the application
window and a list of mappings between CDVIDs and policers.
Policer data must include the policer number as it appears in the Policers List
window and the Class of Service range.
CDVIDs must contain a list of CD VLAN IDs. This item is mandatory for
PORT_ETY.
<PDVLANs>
<CREATE_PDVLAN>
<PDVLAN_ATTR
customer="pdvlan-customer"
label="pdvlan-label"
pdVid="1"
ne="XDM"
slot="I3" >
</PDVLAN_ATTR>
<PORT_EoS
portNum="1" >
</PORT_EoS>
<PORT_ETY
portNum="1">
<MAP>
<POLICER_DATA
policerNum="1"
cos="0-2" >
</POLICER_DATA>
<POLICER_DATA
policerNum="2"
cos="3-7" >
</POLICER_DATA>
<CDVIDs>UNTAGGED,OTHER,1,2,3,4
</CDVIDs>
</MAP>
<MAP>
<POLICER_DATA
policerNum="3"
cos="0-7" >
</POLICER_DATA>
<CDVIDs>5</CDVIDs>
</MAP>
</PORT_ETY>
</CREATE_PDVLAN>
</PDVLANs>
The following is a sample DTD file that can be used for importing V. 4.2 or
higher flow XML files:
<!-- file name: flow.dtd
NOTE: Dont use the characters ' " & < > in
attributes values !!!
-->
<!ATTLIST PDVLAN_ATTR
ne CDATA #REQUIRED
<!ATTLIST POLICER_DATA
pd_cos ( Best_Effort |
Bronze | Silver | Gold) #REQUIRED
2. In the File Name field, enter a name for the file containing the policer
information.
3. Navigate to the destination folder, and click OK.
NOTE: Dont use the characters ' " & < > in
attributes values !!!
-->
<!ATTLIST PDVLAN_ATTR
ne CDATA #REQUIRED
<!ATTLIST POLICER_DATA
pd_cos ( Best_Effort |
Bronze | Silver | Gold) #REQUIRED
The example here shows a sample XML file for creating, editing, and deleting
policers.
<?xml version="1.0" encoding="iso-8859-1"?>
<PDVLANs>
<CREATE_PDVLAN>
<PDVLAN_ATTR
customer = "pdvlan-customer"
label = "pdvlan-label"
pdVid = "1"
ne = "XDM"
slot = "I3">
</PDVLAN_ATTR>
<MAP>
<POLICER_DATA
cd_cos = "0-7"
pd_cos = "Best_Effort"
cir = "110000"
cbs = "112640"
location = "Tel-Aviv"
</POLICER_DATA>
<CDVIDs>1</CDVIDs>
</MAP>
</PORT_ETY>
</CREATE_PDVLAN>
</PDVLANs>
Backing Up XC Files
EMS-XDM enables you to back up XC files.
To back up XC files:
| To copy all XC files from the ~ems/EMSXCFiles directory to a storage
device, on the EMS-XDM main (CDE) menu, click either:
Store XC ASCII File (UNIX)
OR
Store XCs ASCII Files (DOS)
Overview
The section discusses how to use EMS-XDM to configure protection schemes
for XDM NEs.
| IO Protection
| MSP Linear Protection
| TRP/CMBR Protection
| RSTP Protection
| LCAS Protection
| MS Shared Protection Ring
| ALS Mode Setting for TRP10_2O, TRP25, and OFA Cards
| ASON Protection and Restoration
| MPLS Protection
| Dual-Homed Protection
| Link Aggregation
IO Protection
The IO Protection (IOP) feature allows the protection of I/O traffic (including
XCs) from one or more SDH I/O electrical cards (SIO and PIO cards with
electrical modules), data cards (DIOB/M, EISMB, MCS5/10/M), and optical
cards (all TRPs) to an I/O protection card.
When IOP is implemented in the XDM-500, XDM-1000, and XDM-2000
shelves, a switching card installed in the modules cage of the NE shelf
automatically switches the traffic connections between the protecting and
protected I/O cards when necessary. (The wait-to-restore time is calculated in
minutes.)
Fast IOP is automatically implemented by the system whenever IOP is
configured for any cards.
IOP in XDM-500, XDM-1000, and XDM-2000 shelves uses two distinct
virtual protection buses, enabling you to define two separate PGs. You can
protect each of these PGs independently or the entire cage as a single PG. The
following requirements apply:
| PG 1 (slots I1 through I6). A single standby card can be assigned to protect
one or more cards.
| PG 2 (slots I7 through I11). A single standby card can be assigned to
protect one or more cards.
| Two separate standby cards can be assigned to protect PG 1 and PG 2,
respectively.
| One standby card can be assigned to protect cards in PG 1 and PG 2. This
means that only one bus is used for the entire NE, and the NE's cards
cannot be protected using a two-group protection scheme. The standby card
must be assigned to slot I6 to protect cards in slots I1 through I5 and I7
through I11.
You can also manually switch to the protecting I/O card in response to an alarm
or when preparing to do maintenance operations.
Configuring IOP
This section describes the workflow and procedures necessary for configuring
IOP for all XDM types.
Implement the following workflow:
1. Configure a suitable I/O card as standby (the protecting card, to which trail
traffic is switched).
2. Configure the working card in the NE shelf's modules cage.
3. Associate the protected I/O card with a protecting card.
You can configure an I/O card as standby when you initially assign it to a slot
in the XDM shelf.
When an I/O card is defined as standby, the icon appears at the bottom of
the card in the Shelf View.
Removing IOP
You can remove IOP from a selected card that is part of a PG by disassociating
it from the group.
3. Click Yes to continue. A message appears, and the Usage state icon moves
to the protected card. All endpoints on the selected card are switched to the
protection card.
If the standby card defined for the switch to protection is busy, a warning
message appears and the switch to protection does not take place.
If you issued a force switch command, you can revert to the protected card.
Both PIM and electrical SIM module types can be protected in the XDM-100
IOP configuration.
The following figure shows an example of a 1:3 protection scheme with TPM
connections in the XDM-100.
Requirements for these protection schemes are described later in this section. In
all cases, the assigned TPM must be appropriate for the specific IOP scheme in
use. For example, for 2 Mbps (PIM2_21 card) 1:3 protection, the TPM2_3 is
required. An underscore 3 (_3) indicates a 1:3 protection scheme. XDM-100 IO
Protection Schemes lists the required TPM for specific protection schemes.
The TPM2_3 module occupies two slots and can be assigned to slots M1-1 or
M1-3.
The TPM performs the switch to protection for cards located beneath the
module. In all XDM-100 IO protection schemes, the standby card must be the
upper leftmost card for the PG. The TPM2_3 occupies two adjacent slots, M1-1
and M1-2. The standby card for the PG is located in the slot on the left, in this
case, I1 and I5. Protected cards in the PG occupy slots I2 and I6 or I5 for 1:3
protection scheme.
XDM-100 1:1 IO Protection shows the slot association possibilities for the 1:1
protection scheme.
XDM-100 1:2 IO Protection shows the slot association possibilities for the 1:2
protection scheme.
XDM-100 1:3 IO Protection shows the slot association possibilities for the 1:3
protection scheme.
The following IOP definitions apply to the EISM card in the XDM-100. Only
the optical interfaces of the EISM card can be protected. In this case a splitter
and coupler must be used. The slots are defined as follows:
| Slot I1 can be the standby for slot I5 only
| Slot I3 can be the standby for slot I7 only
In MSP, any MS on any card can be used to protect any other MS of the same
rate. MSP can be applied to traffic at the following levels: STM-1, STM-4,
STM-16, and STM-64. Protection switching can be applied either to traffic in
both directions or only to one direction. The switch to MSP is nonrevertive.
When a switch to protection is made, the switch is not made back even when
the original problem is solved.
To configure MSP:
1. Open the Shelf View of the NE to be configured in MSP mode.
2. On the menu bar, select Configuration > Protection > MSP Linear. The
MSP Linear Configuration window opens.
NOTE: The port rate must be the same for both the protected
and protecting ports.
6. In the Protection area, select the MS port to be used as the switch: MS Src
or MS Snk. The ports displayed in the list have the same rate as the port
selected in step 5 (the protected port).
7. Click Apply to save the configuration. The icon appears both at the
bottom of the primary (or protected) card and at the bottom of the
protecting card in the Shelf View. Since the same card can serve as both a
protecting and protected card, all working and standby protected cards
display the same icon.
Field Description
Mismatch Status Whether a mismatch exists between two associated links:
| Group Type: one link is configured to provide 1:1
protection and the other is configured to provide 1:n
protection.
| Revertive: one link is set to revertive and the other is set
to nonrevertive.
Pending States Pending maintenance operations, if any:
| Manual Switch: a section protection switch is applied.
| DEG (Signal Degraded).
| EXC (Signal Fail).
| Forced Switch.
Last Attempt Result of the MS Protection exercise:
Result | Success
| Fail
Removing MSP
EMS-XDM enables you to remove an individual port from a PG or delete all
MSP ports for an entire card at one time.
To remove MSP:
1. Access the MSP Linear Configuration window.
2. Select the Delete PG option button an do one of the following:
To remove a specific port from a PG, select the MS port to be removed
in the Working area of the window.
OR
To remove all MSP ports on a card, select the MS slot in the Working
area of the window, and on the menu bar, select Configuration >
Select All.
3. Click Apply to delete the port(s).
TRP/CMBR Protection
EMS-XDM enables you to apply protection to switch traffic on a TRP/CMBR
(transponder/combiner) card to a protection card in the event of failure.
The switch is done automatically when an (LOS, TIM, EXG, or DEG) alarm is
detected on the protected card. You can also manually switch to the protecting
card in response to an alarm or in preparation for maintenance.
Configuring TRP/CMBR protection is subject to certain limitations:
| Associated cards must be in consecutive slots, starting with an odd number
(that is, you can associate two cards installed in slots I3 and I4, but not in
slots I4 and I5). The standby card must be to the left of the protected card.
| Both cards must be set to the same ALS mode. You cannot change the ALS
mode setting after associating cards.
| In the XDM-500, XDM-1000 and XDM-2000, the card on the left side is
always designated as the standby (protecting) card and is indicated with the
icon in the Shelf View. The card on the right side is always designated
as the protected card and is indicated with a in the Shelf View.
| In the XDM-100, the standby card must be located directly above the
protected card in the Shelf View.
3. On the toolbar, click to apply the changes. The DCC/GCC group type
for the selected card is changed.
RSTP Protection
RSTP, as defined by IEEE 802.1w, provides Ethernet path backup in case of
link failure in the network and prevents Ethernet loops in the network.
RSTP can be used to avoid the types of bridge loops in bridged Ethernet
networks such as the kind produced by EIS/EISM/EISMB cards in the XDM.
RSTP uses an algorithm that enables bridges to understand the topography of
the network and know which bridge is acting as the primary, root bridge. When
multiple paths to the root bridge exist, each switch uses the protocol to
determine the shortest path based on bandwidth considerations, the number of
hops required, as well as the "cost" of each hop. If the path fails, the protocol
automatically reconfigures the network to activate another path, allowing the
network to recover from the failure.
The lowest-cost port used by each switch to communicate with the root bridge
is known as a forwarding port or root port. The port rejected by the switch as a
possible root port becomes the blocking port, which staying inactive until
needed to replace a failed primary path. By preventing traffic from being
carried on this port except when necessary, the blocking port prevents traffic
cycling, where frames travel endlessly in a loop without a destination, wasting
network resources.
The root bridge is defined as the bridge with the lowest priority value. If all
EIS/EISM/EISMB cards in the network are configured with the same priority,
the bridge with the lowest MAC address is selected.
3. In the RSTP Enabled column, clear the checkbox of any port for which
you want to disable RSTP. (By default, RSTP is enabled for all EIS EoS
ports.)
4. In the Path Cost column, modify the contribution of the selected port to the
overall cost of the path to the root bridge, if required.
5. In the Port Priority column, select a new priority for the port from the
dropdown list. This value helps determine which port will be selected as the
root port (and conversely, which port will become the blocking port).
6. In the Holdoff Time column, enter a value in msec (in steps of 100 msec)
to define an interval during which RSTP is prevented from making a
topology change upon link failure.
This parameter can be defined per EIS/EISM/EISMB link to allow SDH
protection schemes (used by the XDM to carry Ethernet traffic from shelf
to shelf) to recover from the link failure instead of RSTP protection. If no
interval is required, enter 0.
7. In the Change Detection column, select whether the port ability to detect
topology changes is Enabled or Disabled. By default, all ports have
change detection enabled; however, disabling change detection is useful
when making section changes to the topology that should not trigger RSTP
protection. For example, when adding VC-4s to a port, it is recommended
to disable change protection to prevent RSTP from being triggered.
8. When all the ports have been configured, on the toolbar, click to apply
the changes.
9. Data in the RSTP Configuration window is automatically refreshed every
15 sec. To refresh data manually, on the toolbar, click .
LCAS Protection
The LCAS protection mechanism enables a GbE trail to remain available even
when some of the VC-4s allocated to it have failed. LCAS provides a
slowdown and recovery process that allows the GbE interface to maintain
service, even when one or more of the VC-4s on the interface are faulty. When
a faulty VC-4 is detected, it can be removed from the group until the problem is
solved, and later returned to the group after it recovers. LCAS support on
EMS-XDM is available for both ring and mesh topologies, and may co-exist
with other protection mechanisms.
When LCAS is enabled and the VC-4 failure is detected in the group, the faulty
VC-4 is removed from the group and no longer carries traffic. The group
continues to function using the remaining VC-4s. During this slowdown period,
the faulty VC-4 can be recovered and then returned to the group for normal
functioning. This slowdown process is initiated when any of the following
alarms are detected on the VC-4 container:
| VC-4 | LOM
| LOP | VC-4-AIS
| UNEQ | EXC
| PLM | DEG
| TIM
Both sides determine whether the faulty VC-4 is to be used to carry traffic. At
the end of the slowdown process, neither end is passing traffic over the faulty
VC-4 and a decreased rate GbE link is in use.
During the recovery process, the previously removed VC-4 is returned to the
group. This action is usually non-traffic-affecting.
MS-SPRing Limitations:
| For HLXC768 matrix cards: Links within the same NE and session must
run between the same card types and the same port numbers on those cards.
For example:
An MS-SPRing connection could run from Port1 on an SIO16_2 card in the
East side to Port1 on an SIO16_2 card on the West side, since card types
and port numbers are the same.
Configuring MS-SPRing
You can configure MS-SPRing.
To configure MS-SPRing:
1. In the Shelf View, on the menu bar, select Configuration > Protection >
MS-SPRing.
The MS-SPRing Configuration Create Ring window opens in Create
mode. Edit and Delete modes are described in the following sections.
2. In the New Ring Label field, type a user-defined name for the ring. This
name appears in the MS-SPRing Info window and is used when you open
or edit the ring.
A listing is added to the PG area. Perform steps 3-6 for each PG you want
to define. Each listing in this area includes the information described in the
following table.
7. After you have defined the PGs, click Apply to save the PG listing to the
EMS-XDM database (at least two PG listings must be selected).
After a few seconds a window opens, informing you that the Create MS-
SPRing operation was successful and displaying the Ring ID number
(number automatically generated by EMS-XDM that identifies the MS-
SPRing). If an error message appears, the ring may have been partially
created. It is recommended to delete the ring.
After the ring is added to the database, the Activate button is enabled.
8. Click Activate to make the ring active. After a few seconds, a window
opens informing that the action was completed successfully. The
Deactivate button is enabled.
9. Click Deactivate if you want to deactivate MS-SPRing. The ring remains
stored in the EMS-XDM database for future use after deactivation.
Editing MS-SPRing
EMS-XDM enables you to edit the details of the MS-SPRing.
Adding an NE to MS-SPRing
You can add an NE to the MS-SPRing.
To delete a PG listing:
| In the PG List area of the MS-SPRing Configuration Edit Ring window,
select the relevant PG listing and click Delete.
Field Description
Severity Profile Alarm severity profile assigned to PG.
MS-SPRing ID ID number identifying MS-SPRing generated automatically
by EMS-XDM.
MS-SPRing Label User-defined ring label.
MS-SPRing Node ID number identifying node automatically assigned by EMS-
ID XDM.
Enable Mode If node active.
Fiber Mode Current version supports only two-fiber mode operation.
Read-only field displays 2-wire.
Reversion Mode Revertive (traffic is switched back to main channel when
problem solved) or Non-Revertive (switch back to main
channel is not reactivated even when original problem
solved).
Wait to Restore Number of minutes (0 to 12) to wait, before switching back
to protected channel from Standby channel after problem
resolved. To change time, select a value from Attribute
New Value column and select Attributes > Apply.
Protection Maintenance commands activated on PG.
Commands
Node State Status of node: Idle, Pass through, Switch East/West.
Last Attempt Result of attempted MS-SPRing exercise.
Result
Deleting MS-SPRing
You can delete MS-SPRing.
To delete MS-SPRing:
1. In the Shelf View, on the menu bar, select Configuration > Protection >
MS-SPRing. The MS-SPRing Configuration Create Ring window opens.
2. In the Ring dropdown list, select a ring and on the menu bar, select File >
Delete Ring MS-SPRing. The MS-SPRing Configuration Delete Ring
window opens. The read-only Ring Mode field displays the state of the
ring, Activated, Not Activated, or Partly Activated. (Activate operation
works applies only to some nodes).
MS-SPRing Squelch
In MS-SPRing topologies, erroneous traffic may be received on a node in the
ring due to a switch to protection caused either by node failure or a double fiber
cut (resulting in node isolation). In these instances, services from the same time
slot but on different spans may contend for access to the same protection
channel time slot, causing a potential for misconnected traffic.
When these scenarios occur, a squelching of the misconnected traffic is
required. The squelching is done at the AU-4 level by sending an AIS in the
squelched AU, preventing traffic misconnection.
The following example illustrates the type of traffic misconnection that can
occur in MS-SPRing protected rings.
The first figure above describes the MS-SPRing protected ring with six STM-
16 NEs. Trail 1 uses AU#1 in the link between NE-A and NE-F, and Trail 2
uses AU#1 in the link between NE-A and NE-C. In the event of a failure on
NE-A (shown in the second figure), NE-B bridges the traffic of AU#1 (Trail 2)
to protecting AU#9. NE-F is expecting to receive Trail 1 from NE-A on AU#9
from NE-E. This represents a misconnection situation.
The switching nodes determine the traffic affected by the protection switch
from information contained in their ring maps and from the identifications of
the requesting nodes.
The switching nodes squelch the AU-4 when the isolated node (chain) involves
VC-4 termination.
A potential misconnection is determined by identifying the node ID that should
answer the bridge request and by examining the traffic that will be affected by
the switch. The switching nodes can be determined from the node addresses in
the K1 and K2 bytes.
The squelch table provides information for each AU-4 in the ring regarding its
path, termination points, and pass-through NEs. The squelch table includes all
entries in the AU tables, including information regarding the path of specific
AUs.
2. Select either the Ring ID or the Ring Label. The Node dropdown list
displays the nodes that were defined on the ring.
3. In the Node field, select the first node in the ring. The AU dropdown list
displays the AU-4 objects that can pass traffic on the ring for the selected
node.
4. From the AU dropdown list, select the first AU-4 on the ring node. The
window displays the various alternate routes that can be used to deliver
traffic over the ring, as expressed by the MS objects that serve as the
termination points at the end of the trail (East and West).
5. Specify the route of the trail traffic by selecting the actual traffic route
relevant to the selected AU-4. Select up to 2 Add and 16 Drop in each of
the areas to indicate the procession of trail traffic.
6. When you have completed your selection, on the toolbar, click to apply
the changes. A message appears, indicating that the action was successful.
EMS-XDM now squelches all other traffic (other than the actual trail you
are considering) in the event of a switch to MS-SPRing protection.
7. Instruct EMS-XDM regarding which trail traffic to consider and which to
squelch, by selecting AU-4s.
8. In the dropdown list, you can select AUs one by one, or scroll through the
AUs by selecting on the menu bar Edit > Prev. AU or Edit > Next AU.
9. Select between 2 to 16 listings in the East and West TP areas, and on the
toolbar, click to apply the changes. A confirmation message appears,
indicating that the action was completed. When you select an AU, the
system displays the selection.
2. Select either the Ring ID or the Ring Label. The Drop Node dropdown
list displays the nodes that were defined on the ring.
3. Select the first node in the ring. The VC and TU dropdown lists display the
VC and TU objects that can pass traffic on the ring for the selected node.
4. From the VC dropdown list, select the first VC on the ring node.
5. From the TU dropdown list, select the first TU on the ring node. The
window displays the various alternate routes that can be used to deliver
traffic over the ring, as expressed by the MS objects that serve as the
termination points at the end of the trail (East and West).
6. Specify the route of the trail traffic by selecting the actual traffic route
relevant to the selected VC and TU. Select up to two Add and 16 Drop in
each of the areas to indicate the procession of trail traffic.
7. When you have completed your selection, on the toolbar, click to apply
the changes. A message appears, indicating that the action was successful.
The result is that EMS-XDM now squelches all other traffic (other than the
actual trail you are considering) in the event of a switch to MS-SPRing
protection.
8. Proceed to select VCs and TUs and instruct EMS-XDM regarding which
trail traffic to consider and which to squelch.
9. Select between 2 to 16 listings in the East and West TP areas, and on the
toolbar, click to apply the changes. A confirmation message appears,
indicating that the action was completed successfully. When you select a
VC and TU, the system remembers the selection and displays it.
The NUT Channels area is divided into two parts. The upper portion
shows the working channel(s) to be configured as NUT channels. The
lower part shows the corresponding protecting channel for each NUT pair.
Channels are color coded for ease of reference as shown in the legend:
working channels are pink and protecting channels are blue. Channels in a
concatenation group are preceded by a icon. Channels carrying traffic
are displayed with the traffic icon.
LO MS-SPRing XCs
LO MS-SPRing is a cost-saving feature. LO tributaries like E1 and E3 can be
dropped directly from an MS-SPRing without having to implement an
intermediary STM1 card.
You can create LO MS-SPRing XCs in the same manner as LOVC XCs.
Every VC-4 contains a certain number of TU objects. When you create XCs
that pass through the same LO MS-SPRing, you need to verify that the XCs do
not contain TSI. (If they pass through different rings, TSI is permitted.)
Creating an AU-4 to VC-4 connection activates termination and enables access
to LO objects. This means that if you click the same SIO-16M card and the
same AU-4 that you terminated (connected to VC-4), the AU-4 Internals area
displays TU-12, TU-2, and TU-3 with Src/Snk enabled, as well as an adjacent
icon indicating termination. In the AU-4 Internals area, you can select or
multiselect the relevant TU Src or TU Snk objects, and click Add /Drop to
display them in the Edit View of the XC Browser.
Extra Traffic
Extra traffic (also called preemptive traffic) for LO and HO MS-SPRing
doubles the amount of allowed traffic on the ring. It enables the protection
allocated bandwidth on the ring to carry unprotected traffic, which will be
dropped (preempted) once a protection event occurs. Extra traffic is especially
effective for EoS networks when Link Capacity Adjustment Scheme (LCAS) is
used to dynamically allow the EoS bandwidth to vary.
For example, whenever a traffic switchover occurs, traffic is transferred to the
lowest channels of the ring (that is, the protected channels). This is known as
Best Effort traffic and it is preempted to make room for traffic on the working
channels.
All lower streams of traffic are extra traffic, except for those previously
configured to be NUT, which are therefore outside the protection of the ring.
In the Card Internals area of the XC Browser, "ET" appears on the AU-4s to
indicate extra traffic.
NOTE: TSI does not apply for objects with extra traffic and
may not be used.
Limitation
You cannot change the ALS mode of a TRP10 or TRP25 card that is
associated.
To set the ALS mode for TRP10, TRP25, and OFA cards:
1. In the Shelf View, select the card.
2. On the menu bar, select Configuration > Setup > ALS, and on the
submenu, select one of the ALS modes. The available selections depend on
the mode currently set (the second mode appears when the currently active
mode is disabled).
The protection and restoration capabilities of links and the Shared Risk Link
Groups (SRLG) associated with links can also be advertised by the routing
protocols. Based on the LightSoft physical layer, SRLG constrains the
information and capabilities provided by the GMPLS routing and signaling
protocols. The routing constraints defined for hops, fiber distance, link cost,
and SRLG may lead to different service path calculations, depending on the
constraints. The path computation algorithm Constrained Shortest Path First
(CSPF) can select disjoint paths based on link, node, or SRLG diversity.
For further information regarding ASON, refer to the ASON User Manual.
MPLS Protection
MPLS protection schemes include Facility Backup Fast ReRoute (FRR) that
provides less than 50°msec FRR link and node protection.
An XDM MPLS network can incorporate an E2E combination of protection
schemes to provide optimal protection at every point, including for example,
FRR link and node protection, Dual-Homed, LAG, and Fast IOP 1:1 card
protection.
Dual-Homed Protection
Networks based on XDM platforms use Dual-Homed protection for access
devices to resolve single points of failure (weak links) in network connections.
Dual-Homed protection provides a fast recovery time, thereby effective for
both link and node failures. Dedicated pseudo wires are configured, able to
tunnel the client RSTP/MSTP Bridge Protocol Data Unit (BPDU) traffic.
An example of a simple Dual-Homed protection scheme is connecting the
customer equipment (CE) to the Dual-Homed device through either one or two
CE devices.
For instructions for configuring dual-homing VSI protection in MCS cards, see
Dual Homing VSI.
Link Aggregation
Ethernet Link Aggregation (LAG) protection is based on standard Ethernet link
aggregation schemes (IEEE 802.3ad) In LAG protection schemes, a single
logical link is composed of up to eight physical links (Ethernet or EoS ports).
When one or more physical link fails, the failed link is simply removed until
that link recovers. The network continues to function correctly without the
failed link. LAG is available for both Ethernet and EoS WAN ports.
Link members are added and removed through the network management
system.
Overview
This section discusses how to use EMS-XDM for configuring, managing,
filtering, and troubleshooting XDM NE alarms.
XDM equipment provides local alarm display and configuration access
facilities in the event of equipment failure, and for maintenance purposes.
These displays include LEDs on the front panel of the XDM, which correspond
to visual LED indicators on the EMS-XDM screen.
EMS-XDM provides exceptionally powerful tools for viewing and analyzing
alarms, enabling you to optimize alarm-processing operations.
Workflow
1. For proper alarm processing, first set up your alarm management
configuration to specify how alarms are to be treated in the system. This
stage includes defining severity profiles to assign to objects and
configuring audible alarm conditions.
2. After you have completed alarm management configuration, perform the
following operations, in any order, whenever required:
Managing Alarms
Using the Alarm Log
Troubleshooting Alarms
Each ABO type (per NE) has eight severity profiles, including the Factory
Default profile, which cannot be modified.
EMS-XDM enables assigning customer default and nondefault profiles.
When you designate a Customer Default profile, all newly created objects
(such as a new card assigned to a slot) are automatically assigned to it.
You can also assign nondefault profiles to selected objects, as required.
6. On the toolbar, click to apply the changes. After you assign a profile to
the object, the read-only Objects Using this Profile field is updated,
displaying the number of objects to which the selected profile has been
assigned.
This ABO Profile: Copies all profiles for the selected ABO to the NEs
selected from the NE Names list at the bottom of the window. (The
NEs Selected field displays the number of NEs chosen.) If the profiles
in the destination NE are in use, they are not changed.
All ABOs Profiles: Copies profiles for all ABOs in this NE to the NEs
selected from the NE Names list at the bottom of the window. If the
profiles in the destination NE are in use, they are not changed.
Current Profile: Propagates the currently selected profile to all objects
in the same class (for example, if Profile-12 is selected for the currently
selected VC-4 object, then all VC-4s are assigned Profile-12). After
selecting this option, click This NE in the Target area.
Non Reported: Propagates entries made in the nonreporting
checkboxes of the object to all objects in the same class (for example,
VC-4). After selecting this option, in the Target area, click This NE or
Selected NEs. If Selected NEs is chosen, select the required NEs from
the NE Names list.
The options for transmission objects include:
Alarm Severity
BBEFE Warning
ESFE Warning
SESFE Warning
In EMS-AURORA, you can change alarm severity per each port separately by
right-clicking the relevant port and choosing the severity (Major, Minor, or
Critical) from the shortcut menu.
External Alarms
The EMS-XDM enables you to define external alarm conditions for the
following cases:
| Alarms generated internally by the XDM that should trigger an external
device, such as a light or buzzer. This application of the external alarms
feature enables operators to be aware of selected alarms even when not
sitting at the EMS-XDM management station.
| Conditions external to the XDM that should trigger an alarm in the EMS-
XDM, such as the opening of a door to a cabinet containing an XDM shelf
or a significant change in the ambient temperature surrounding the shelf.
The signal from an external alarm represents a circuit between the source of the
signal (an external device) and the XDM shelf. The interpretation of this signal
is user-defined, enabling you to define whether the alarm is triggered when this
circuit is opened or closed.
2. Start in the row for Input 1 to define the first alarm input. Double-click in
the Name field, and type in a name for the input.
3. In the Contacts Config field, select one of the following options from the
dropdown list:
Close Means On: Input signal is generated by closing the circuit (that
is, during normal conditions the circuit is open).
Close Means Off: Input signal is generated by opening the circuit.
2. In the Shelf View, select the card (or in the Card Internals View, select
the internal object) whose alarm will trigger an external alarm output. The
name of the selected card or object appears in the Associated Object field.
3. In the Alarm ID dropdown list, select the alarm type that applies to this
external alarm. The alarm type may vary, depending on the type of card or
object selected in Step 2.
Managing Alarms
EMS-XDM enables you to access most alarm management functions through
the Current Alarms window.
The EMS-XDM alarm log contains a list of all significant events that occurred
in the network, including events other than alarms, and provides additional
fault management capabilities. It is also possible to perform alarm management
from an upper-level management system like LightSoft.
You can perform the alarm management operations in any order, whenever
required.
In the EMS-XDM main window, select the NE icon, and then on the menu
bar, select Alarms > Current Alarms.
NOTE: You can only view alarms associated with NEs for
which you have configurator rights.
The Current Alarms window for the selected NE opens, displaying a list
of current alarms per NE object and summary information as follows:
Filter type
Sort order
Total: total number of current alarms displayed in the window
Filter: number of filtered alarms (number of alarms shown after
filtering)
When Refresh Off is selected, you must click Update to refresh the
window manually.
On the menu bar, select File > Info to open an Info window for the object
with the alarm. (Note that the Info option does not display a window if
there is no further information to display.)
An asterisk (*) can appear alongside the time stamp. This indicates that the
time displayed in the Info window is not when the alarm occurred, but
when it was registered at the EMS-XDM station. This can happen, for
example, when initially uploading data from an NE (in which case the
alarm data is not uploaded with the time stamp), or following
disconnection.
2. In the Network Elements list, select the NEs to include in the Current
Alarms window (click, is highlighted).
To deselect an NE, click it again (highlight is removed). To deselect all
NEs at one, click Unselect NEs.
The Current Alarms window displays alarms for the selected NEs only.
You can also select NEs/NE groups to include in the Current Alarms
window from the main window, and then open the window.
3. In the Objects list, select the types of objects to include in the alarms list.
By default, all objects are selected. If you deselect an object, all alarms for
that type of object are filtered from the alarms list. For example, if you
deselect MS, all alarms relating to MS objects in the network (or the
selected NE) are not displayed.
4. Determine additional filtering criteria by selecting or deselecting the
required options, as described in the following table.
5. When ready, click OK. The filtering operation starts, and its progress is
displayed in a separate window. At the end of the filtering operation, the
current alarms list reflects the new filter settings.
VC-4-SSF N N N N N N N N N N
VC-4-AIS Y N N N N N N N N N
VC-4-UNEQ Y N N N N N N N N N
VC-4-TIM Y Y Y N N N N N N N
VC-4-EXC Y Y Y Y N N N N N N
VC-4-DEG Y Y Y Y Y N N N N N
VC-4-RDI Y Y Y Y N N N N N N
VC-4-PLM Y Y Y Y N N N N N N
Service Alarms Y Y Y Y Y Y N N N N
(HO)
VC-4-LOM Y Y Y Y N N N N N N
TU3-AIS Y Y Y Y N N N N N N
TU3-LOP Y Y Y Y N N N N Y N
TU2/12-AIS Y Y Y Y N N N Y N N
TU2/12-LOP Y Y Y Y N N N Y Y N
VC-3 Alarms Y Y Y Y N N N N Y Y
Supp.
VC-2/12 Alarms Y Y Y Y N N N Y Y Y
Supp.
Service Alarms Y Y Y Y Y N N Y Y Y
(LO)
Rx Buffer N N N NA N N N N N
Overflow
Legend:
| Y: performed at the EMS level; all other Y values in this table are
performed at the NE level
| NA: not applicable
Acknowledging Alarms
Acknowledging an alarm means you are aware of the alarm and will eventually
take the necessary steps to deal with it. You can acknowledge alarms singly or
grouped.
To acknowledge alarms:
1. In the Current Alarms window, in the current alarms list, select either a
single alarm or multiple alarms by clicking the relevant alarm row(s). The
alarm(s) is highlighted.
2. On the menu bar, select File > Acknowledge. The ACK column displays
"ACK", indicating that the selected alarm(s) is acknowledged.
Each alarm listing appears in the color coding of its severity if the relevant
start-up parameter was selected.
Audible Alarms
EMS-XDM enables you define audible alarm conditions as part of your alarm
configuration.
The EMS-XDM provides two types of audible alarms:
| Audible alarm (discussed here)
| Reminder Function
You can activate and deactivate the audible alarm feature from the Alarms
menu (in either of the system modes). When activated, an audible alarm is
emitted whenever an alarm or event enters the EMS-XDM alarms log. No
sound is emitted, however, for alarms set as Non-Report type.
The default mode is according to the preference setting.
Reminder Function
The second audible alarm type is the Reminder function. It differs from the
audio alarm in that it sounds at a preset time interval when there are
unacknowledged alarms present in the system.
To set a reminder:
| In the Shelf View or EMS-XDM main window, on the menu bar, select
Alarms > Reminder, and on the submenu, select ON or OFF.
The alarm log menu bar at the top of the Alarm Log window provides pull-
down menus. Click a menu to display its items. Some menu items are general
and some allow you to perform operations related to selected alarms in the
alarms list, as described in the following table.
The alarm log toolbar, located beneath the alarm log menu bar, allows you to
perform various operations related to the alarms and Alarm Log, as described
in the following table.
Recurrent Opens Alarm Record History window, where you can view
Alarm recurrent alarms for an object.
Alarms List
In the alarms list, you can view information about each alarm in the NE.
You can sort the alarms according to any column in the alarms list by clicking
the appropriate column header. Click twice to toggle between ascending and
descending orders. You can also change the order of the columns by dragging a
column heading to a new location.
The alarms list is the main area of the Alarm Log window and displays the
current alarms. Each new alarm is added to the top of this list. Each list entry
provides the following information, from left to right:
| chk: alarm was checked off
NOTE: You can only view alarms associated with NEs for
which you have configurator rights.
2. In the Network Element area, select the NEs you want to include in the
Alarm Log window. Click Unselect NEs to deselect selected NEs. Select
multiple NEs by clicking each one. When an NE is not selected, all alarms
concerning it are filtered (that is, not shown) in the alarms log.
3. In the Objects area, select the objects you want to include in the Alarm
Log window. By default, all objects are selected. Deselect an object by
clicking it. When an object is not selected, all alarms concerning it are
filtered (that is, not shown) in the alarms log.
4. Determine additional filtering criteria by selecting checkbox options as
described in the following table.
5. When ready, click OK. The filtering operation starts and its progress is
displayed in a scale graph in a separate window. If you changed the
filtering criteria, click Undo to deletes the changes and revert to the
original settings.
The following table describes the functions of the filtering criteria available
in the Log Filter window.
This function copies alarm log files to an external storage device (CD, and so
on). EMS-XDM keeps track of events by storing them in log files. These files
are automatically saved to the EMS-XDM hard disk either periodically or
whenever they reach a certain size (whichever occurs first). The file name has
the format AlarmLogHistory-yyyy.mm.dd-n, where n is the number of the log
file saved on date YYYYMMDD.
Log files must be exported from time to time to prevent the EMS-XDM disk
becoming full. When the free disk capacity is down to 2%, the log files are
automatically deleted.
The system displays a warning message and prompt for log files to be exported
when 95% of the disk capacity is used, as follows:
"ATTENTION: DISK ALMOST FULL
Change alarm log parameters
Delete unnecessary export, configuration and NE s/w files"
Click Close to close the message window and perform the file export operation.
When 98% of the disk capacity is used, the system automatically deletes
unnecessary export, configuration, and NE software files.
3. Select the file to export. If you want to check the file contents first, click
Browser. You can filter the log file in the Browser window by selecting
Filter > User Filter on the menu bar.
A window opens, allowing you to filter the alarms in the file. When a filter
is applied, only the alarms displayed in the Browser window are exported.
To delete a filter, on the menu bar, select Filter > No Filter from the menu.
You can export the current alarms list from EMS-XDM to an external system
or application. This enables reporting the current status of the network to
central alarm centers that collect alarms from a variety of sources.
To use this feature, a dedicated Ethernet port must be installed at the EMS-
XDM Sun workstation. This is in addition to the Ethernet segment used
between EMS-XDM and the GNE and is in order to prevent congestion on that
segment.
The main features of this function are:
| Information is transferred every two minutes.
| FTP (file transfer protocol) is used to transfer the information over TCP/IP.
The Export Alarms function only transfers additions to the current alarms list
(new records) since the last successful information transfer.
Alarm information includes a header record with current time and reported
fields. Each alarm is reported with the event time, the identity of the failed
object, and an alarm description.
Every two minutes, all new alarms recorded in the current alarms list are
appended to a file. The file is assigned a name of up to eight characters based
on the EMS-XDM station name, and is placed in the FTP user directory on the
remote machine. The file receives a .DAT extension.
In addition to the method described here, alarm logs can be exported in real
time mode in which alarms are written continuously to an ASCII file as they
occur. This file is then written to the hard disk at midnight. A new file
containing the alarm log events for that day is created each day. The format for
the information in this file is the same as for the method described here. A
special start-up configuration option, Current Alarm Export in Real-Time,
must be activated in order to use this option. If not, the alarm logs are
periodically exported to an external storage device, as described previously.
Troubleshooting Alarms
This section provides a comprehensive list of EMS-XDM alarms and
maintenance operations relevant to each object in EMS-XDM.
Alarms are listed alphabetically within each alarm type category.
Details for each alarm are provided, including the alarm name, description,
severity, and corrective action(s).
Some alarms, such as the Trace Identifier Mismatch (TIM) alarm, can occur at
multiple levels, like the Regenerator Section (RS), Multiplexer Section (MS),
High-order (HO) Path, and Low-order (LO) Path levels. In most cases, alarms
are cleared in the same fashion at all levels.
Alarm Interactions
When troubleshooting alarms, it is critical to have a full understanding of the
interrelationships between alarms and their effect on the network. This
facilitates solving the problem more quickly by enabling you to identify its root
cause. The following figure depicts the relationships between many of the
alarms described in this section. This diagram is a useful reference when
troubleshooting system alarms.
The column on the far left of the diagram identifies the bytes associated with
the alarms that can occur in the system. A horizontal line is shown for each
alarm, and depicts its interactions with other alarms in the system across the
various layers. For example, when a LOS (Loss of Signal) defect occurs on the
RS layer, it automatically sends an AIS - MS alarm downstream to the MS
layer, which in turn generates an RDI-MS (Remote Defect Indication - MS)
alarm upstream.
Transmission Alarms
Transmission alarms can affect the following multiple layers in the SDH
overhead frame hierarchy:
| Physical
| RS
| MS
| HO Path
| LO Path
EMS-XDM transmission alarms include:
| General transmission alarms reported by the XDM indicating
transmission path problems
| Transmission TCAs (threshold-crossing alarms) reported when the value
of a PM counter is higher than the defined high threshold
| Data transmission alarms reported by the XDM indicating transmission
path problems related to Ethernet and Layer 2
| Data transmission TCAs
| Optical Power Control-related Transmission Alarms
Severity: Major
An AIS indicates that a failure has occurred upstream of the equipment sending
the AIS. It indicates that another alarm exists on equipment before the
equipment sending the AIS.
MSPL Failure
Severity: Minor
In bidirectional operation mode, the MSPL Failure alarm indicates that one of
the following conditions exists:
| Faulty K1/K2 bytes received
| No answer from the far-end node
| Failure of the Exercise command
3. Check that the fiber is connected between the connecting ports, and that
there are no LOS or LOF alarms at the RS level and no AIS alarms at the
MS level.
4. Check the MS PM counters in the protection link.
5. Reboot the protecting card in both sides.
6. Replace the protecting card.
Degraded (DEG)
Severity: Minor
The DEG alarm indicates that the Bit Error Rate (BER) on the incoming frame
is higher than the configured threshold. This threshold is lower than the one
specified for the EXC alarm.
Severity: Major
The LOA alarm indicates a loss of alignment on the incoming concatenation
signal (that is, the VC-4 has exceeded its allocated RAM for delay
compensation).
Severity: Major
The LOD alarm indicates that the optical LOS is not detected and no signal
transitions exist.
This alarm applies only to OPS objects on TRP and SIO64F cards.
LOD alarms may result when:
| The received frequency does not match the expected frequency.
| The received protocol does not match the expected protocol.
| The received signal does not include FEC in the optical layer, but FEC was
expected.
Severity: Major
The LOF alarm indicates that no frame alignment was detected in the incoming
signal. The far end of the link can cause this alarm. This is a major alarm
condition, as the receiver cannot recognize any data from the fibers. This alarm
is detected at the RS level.
Both failures at the source (transmitter) and extremely high BER conditions can
generate LOF alarms. High BER conditions can be caused by problems such
as:
| Extremely high received optical power levels
| Very low received optical power levels
| A receiver malfunction or a problem with the other-side transmitter
In addition, an LOF alarm can be caused by an incorrect rate, which typically
only occurs during installation.
The LOF alarm is triggered when severely errored framing (SEF) persists for
three or more milliseconds.
Severity: Major
The LOM alarm indicates a loss of multiframe alignment on the incoming
signal.
This alarm is triggered when a loss of synchronization is detected on byte H4
(bit 7, 8) in a superframe sequence.
This alarm can result from:
| A faulty card
| Connected test equipment that does not support multiframe
Severity: Major
The LOMC alarm indicates a loss of multiframe alignment related to
concatenated trails.
Severity: Major
The LOP alarm indicates that invalid pointers were received due to an
equipment failure, mismatch in signal mapping, or timing problem.
Severity: Major
The LOS alarm indicates a significant drop in the received signal level. This
error may be caused by a broken or disconnected fiber or by a faulty optical
transmitter.
MSPL Failure
Severity: Minor
In bidirectional operation mode, the MSPL Failure alarm indicates that one of
the following conditions exists:
| Faulty K1/K2 bytes received
| No answer from the far-end node
| Failure of the Exercise command
3. Check that the fiber is connected between the connecting ports, and that
there are no LOS or LOF alarms at the RS level and no AIS alarms at the
MS level.
4. Check the MS PM counters in the protection link.
5. Reboot the protecting card in both sides.
6. Replace the protecting card.
Severity: Major
The PLM alarm indicates a mismatch in the payload signal label. As with the
UNEQ or TIM alarms, the cause for this alarm may be a wrong connection (a
missing XC or a crossed fiber).
PJ_15M
Severity: Warning
The PJ_15M alarm indicates that the pointer justification count exceeds a
predetermined value.
Severity: Warning
An RAI alarm indicates a far-end signal failure condition. When this alarm is
detected, a code is sent upstream in a digital signal network as a notification
that a failure has occurred downstream. This alarm applies to Async physical
objects.
Severity: Warning
An RDI alarm indicates a far end signal failure condition.
Severity: Major
The SQM alarm indicates a loss of sequence on the virtual concatenation
signal. This error may be caused by a mismatch in connections. For example, in
the XC Browser, check the XC set for each NE along the path to ensure that
the concatenation group objects are connected in the same order along the
entire path. Access the XC Set List window to perform this check.
Severity: Major
The SSF alarm indicates a failure in the adaptation function due to an AU-AIS
or AU-LOP.
Severity: Minor
The SD alarm indicates that the Bit Error Rate (BER) on the incoming signal
frame is higher than the configured threshold. The threshold attribute can be set
from 10-6 to 10-9 and can be viewed/set in the object's Info window. This
threshold is lower than the one specified for the Signal Fail (SF) alarm.
This alarm applies at the Section, Line, and STS Path levels. It also applies to
Async signals.
To clear an SD alarm:
If the alarm is reported at the low-order level, check the other ports on the same
card to rule out the possibility of a hardware failure.
If it is reported at the high order level as well, check the optical parameters,
clean the fiber optic connectors, and then monitor performance at the high
order level.
Severity: Major
The SF alarm indicates that the BER on the incoming signal frame is higher
than the configured threshold. This threshold is higher than the one specified
for the SD alarm. This alarm applies at the Section, Line, and STS Path levels.
It also applies to Async signals.
To clear an SF alarm:
Check the higher level to determine if the same phenomenon is occurring. After
you have identified the highest level with the problem, resolve the alarm at that
level.
Check the optical parameter levels to ensure they are within the correct ranges.
Clean the fiber connectors.
Severity: Major
The TIM alarm indicates a trace identifier mismatch caused by the incorrect
provisioning of the expected trace or a misconnection. This alarm results from
comparing the expected J0/J1/J2 byte to the received one.
Severity: Warning
The UAT alarm indicates 10 consecutive SESs (severely errored seconds).
Unequipped (UNEQ)
Severity: Major
The UNEQ alarm indicates that an unequipped signal has been detected. This
error may be caused by a disconnected trail.
3. Click the icon in the window toolbar to reconnect the required trail.
TCAs
Severity: Warning
The BBEFE alarm is a threshold-crossing alarm that indicates that the system
crossed the one day or 15 minute background block errors threshold at the far
end.
Since the BBEFE alarm is often reported at multiple levels, you should begin
the alarm resolution process by checking for the alarm at multiple levels and
then looking for a common denominator for the problem. Frequently, one card
can cause several paths to report errors.
Severity: Warning
The BBEFE alarm is a threshold-crossing alarm that indicates that the system
crossed the one day or 15 minute background block errors threshold at the far
end.
Since the BBEFE alarm is often reported at multiple levels, you should begin
the alarm resolution process by checking for the alarm at multiple levels and
then looking for a common denominator for the problem. Frequently, one card
can cause several paths to report errors.
Severity: Warning
The BBENE alarm is a threshold-crossing alarm that indicates that the system
has exceeded the one day or 15-minute background block errors threshold at
the near end.
Since the BBENE alarm is often reported at multiple levels, you should begin
the alarm resolution process by checking for the alarm at multiple levels and
then looking for a common denominator for the problem. Frequently, one card
can cause several paths to report errors.
Severity: Warning
The BBENE alarm is a threshold-crossing alarm that indicates that the system
has exceeded the one day or 15-minute background block errors threshold at
the near end.
Since the BBENE alarm is often reported at multiple levels, you should begin
the alarm resolution process by checking for the alarm at multiple levels and
then looking for a common denominator for the problem. Frequently, one card
can cause several paths to report errors.
Severity: Warning
The ESFE alarm is a threshold-crossing alarm that indicates that the system has
exceeded the 1-day or 15-minute errored seconds threshold at the far end node.
As the ESFE alarm is often reported at multiple levels, you should begin the
alarm resolution process by checking for the alarm at multiple levels and then
looking for a common denominator for the problem. Frequently, one card can
cause several paths to report errors.
Severity: Warning
The ESNE alarm is a threshold-crossing alarm that indicates that the system
has exceeded the 1-day or 15-minute errored seconds threshold at the near end
node.
Since the ESNE alarm is often reported at multiple levels, you should begin the
alarm resolution process by checking for the alarm at multiple levels and then
looking for a common denominator for the problem. Frequently, one card can
cause several paths to report errors.
Severity: Major
The EXC alarm is a threshold-crossing alarm that indicates that the Bit Error
Rate (BER) on the incoming signal frame is higher than the configured
threshold.
As the EXC alarm is often reported at multiple levels, you should begin the
alarm resolution process by checking for the alarm at multiple levels and then
looking for a common denominator for the problem. Frequently, one card can
cause several paths to report errors.
Severity: Warning
The SESFE alarm is a threshold-crossing alarm that indicates that the system
has exceeded the respective 1-day/15-minute severely errored seconds (SES)
threshold at the far end node. The PM counter for this alarm is incremented
whenever 30% or more of the frames in a given second are errored. This alarm
may indicate possible hardware failure.
Severity: Warning
The SESNE alarm is a threshold-crossing alarm that indicates that the system
has exceeded the respective 1-day/15-minute SES threshold at the near end
node. The PM counter for this alarm is incremented whenever 30% or more of
the frames in a given second are errored. This alarm may indicate possible
hardware failure.
Severity: Warning
The AN Ability Mismatch alarm indicates that the total capacity of the link is
not being utilized, for example, a Fast Ethernet link is operating at 10 Mbps.
Severity: Major
The AN Failure alarm indicates a synchronization and communication failure
in the auto-negotiation process between the EIS/EISM card and a customer
device. When the AN process is enabled, it is automatically activated whenever
cables are connected between the EIS/EISM or DIO and a customer device.
Typically, a Link Down alarm is also generated in tandem with the AN Failure
alarm. Therefore, the AN Failure alarm is set by default as a nonreported alarm
in the EMS-XDM. The AN Failure alarm is reported on the customer device,
such as a switch or router.
Severity: Warning
The CSF alarm indicates a fault that exists on the far-end (upstream) client
side. The alarm is generated upon detection of loss on the link from the client
(OPI Snk object).
By default, this alarm is not reported. Upon detection, the OPI laser is shut
down.
This alarm is useful in cases where the client supports some Ethernet protection
scheme that may be operated in case of a far-end client failure, assuming that
the underlying layer is okay. In cases where GbE connections are implemented
over a transport network (such as by the DIO), the client may not sense a
failure that occurred in the transport network or in the far-end GbE link. The
CSF alarm provides the necessary client notification mechanism should such
conditions occur.
Encapsulation Mismatch
Severity: Major
The Encapsulation Mismatch alarm indicates that the GFP/HDLC
encapsulation hardware revision does not support the configured Encapsulation
Type.
Severity: Major
The Extension Header Mismatch (EXM) alarm indicates a mismatch between
the expected and received extension headers in the GFP layer. This alarm
typically indicates an interoperability problem with other vendor equipment.
Header Mismatch
Severity: Major
The Header Mismatch alarm indicates a mismatch between the expected and
received extension headers in the GFP layer. This alarm typically indicates an
interoperability problem with other vendor equipment.
Link Down
Severity: Major
The Link Down alarm indicates an Ethernet link that is down or loss of carrier
(as defined in IEEE 802.3). This alarm may result from:
| A failure in the auto-negotiation process between the EIS/EISM/DIO and
the customer device
| A loss of signal on the link resulting from disconnected fibers or cables, or
a hardware failure
Severity: Major
The LFD alarm indicates a loss of frame delineation on the Generic Framing
Procedure (GFP) layer.
Partner AN Failure
Severity: Minor
The Partner AN Failure alarm indicates a failure of the remote partner during
the auto-negotiation process.
Severity: Minor
The Partner Link Down alarm indicates that the remote partner link is down or
unavailable.
Partner Offline
Severity: Minor
The Partner Offline alarm indicates that the remote partner is offline or out of
service.
Severity: Minor
The PLCR alarm indicates a partial loss of capacity on the GEoS link in the
receive direction. The PLCT alarm indicates a partial loss of capacity on the
GEoS link in the transmit direction. This may occur when some of the VC
members in the group experience a failure and are not used for carrying traffic.
When LCAS is supported, this alarm indicates that one or more of the
provisioned path terminations is not currently carrying traffic due to a failure.
This alarm applies on DIO and EIS/EISM cards. Failure in one direction affects
service in both directions. Thus, these alarms will be reported on both sides of
the connection.
Severity: Minor
The PTIM alarm indicates a mismatch between the payload type identifiers.
This alarm typically indicates an interoperability problem with other vendor
equipment.
Severity: Major
The Port Over Quota alarm indicates that there is a port with a quota exceeding
an event on at least one of the S-VIDs.
Rx Buffer Overflow
Severity: Minor
The Rx Buffer Overflow alarm indicates a First In First Out (FIFO) buffer
overflow for the ingress traffic.
Severity: Major
The TLCR and TLCT alarms indicate that none of the path terminations are
currently carrying traffic due to a failure. This alarm is associated with GEoS
source objects on the DIO card and is generated only when the LCAS attribute
is enabled.
Severity: Minor
The TSD alarm indicates degradation in at least one of the path terminations
comprising a virtually concatenated Ethernet over SDH (EoS) trail. This alarm
is inhibited by default. When this alarm is not inhibited, the OPI laser is shut
down upon detection of the TSD alarm.
Severity: Major
The TSF alarm indicates a failure in one of the path terminations comprising a
virtually concatenated EoS trail. This alarm is detected on the SDH server layer
and may affect both GEoS source and sink objects. The TSF alarm is triggered
when the VC-4 that is mapped to a GbE port is faulty. Upon detection, the OPI
laser is shut down towards the client.
If LCAS is enabled, this alarm means that all VC-4 members are not available.
If LCAS is not enabled, then a fault has been detected on one or more of the
VC members to which the GbE is mapped, thereby causing the GbE trail to
fail.
Tx Buffer Overflow
Severity: Minor
The Tx Buffer Overflow alarm indicates a FIFO buffer overflow condition for
egress traffic.
Severity: Warning
The Tx CRC Error Frames alarm indicates the number of transmitted packets
with errors.
Severity: Minor
The UPM alarm indicates a mismatch between the user payload identifiers.
This alarm typically indicates an interoperability problem with other vendor
equipment.
Severity: Major
The VCG FOPR alarm is caused by CRC or SQNC defects. This alarm is
generated only when the LCAS attribute is enabled.
Severity: Major
The VCG FOPT alarm is caused by CRC or SQNC defects. This alarm is
generated only when the LCAS attribute is enabled.
Severity: Major
The VCG GIDM alarm is caused by CRC or SQNC defects. This alarm is
generated only when the LCAS attribute is enabled.
Severity: Warning
The VCG PCS 15-Min alarm indicates loss of partial capacity. This alarm is
generated only when the LCAS attribute is enabled. This alarm is only reported
for 15-minute intervals.
Severity: Warning
The VCG PCS 1-Day alarm indicates loss of partial capacity. This alarm is
generated only when the LCAS attribute is enabled. This alarm is reported for
24-hour intervals.
Severity: Warning
The VCG Tx UTIL 15-Min alarm indicates the transmitted utilization
(transmitted average octets rate per percentage of the dedicated network BW).
This alarm is only reported for 15-minute intervals.
Severity: Warning
The VCG UAS 15 Min alarm indicates 10 consecutive SESs (severely errored
seconds). This alarm is generated only when the LCAS attribute is enabled.
This alarm is reported for only 15-minute intervals.
Severity: Warning
The VCG UAS 1-Day alarm indicates 10 consecutive SESs (severely errored
seconds). This alarm is generated only when the LCAS attribute is enabled.
This alarm is reported for only 24-hour intervals.
Data TCAs
The following topics describe the data-related TCAs for Ethernet and Layer 2.
Severity: Warning
The BBENE alarm is a threshold-crossing alarm that indicates that at least one
of the VC members has exceeded the 15-minute background block errors near
end threshold.
Severity: Warning
The Broadcast Pkts alarm is a threshold-crossing alarm that indicates that the
number of broadcast packets received on a port exceeds the configured
threshold. This alarm is only reported for 15-minute intervals.
Severity: Warning
The BSC Discard Seconds alarm is a threshold-crossing alarm that indicates
that the number of seconds in which the BSC dropped frames exceeds the
configured threshold. This alarm is only reported for 15-minute intervals.
The BSC attribute must be enabled on an EIS/EISM bridge object for this
alarm to be generated. This attribute is disabled by default. EIS/EISM bridge
objects use BSC to limit the broadcast rate from a source. When BSC is
enabled, the maximum rate at which a source can broadcast is 500 k per
second. If this limit is exceeded, the alarm is triggered. BSC is typically used
for closed loops in case of RSTP failure.
Severity: Warning
The CIR Utilization alarm indicates that the average rate of a service is near the
permitted CIR rate in an SLA. As such, the alarm serves as a notification
mechanism to alert you when you are near the CIR limit. This alarm is only
reported for 15-minute intervals.
This alarm applies to Policer objects and is typically used as a planning tool to
enable you to determine whether your current SLA is adequate.
Severity: Warning
The Dropped Pkts alarm is a threshold-crossing alarm that indicates that the
number of dropped packets received on a port exceeds the configured
threshold. This alarm is only reported for 15-minute intervals.
Severity: Major
The Duplicate MAC Alert alarm indicates that a duplicate MAC address has
been used illegally. This alarm provides a security mechanism to guard against
unauthorized port access and hacking. The default high threshold for this alarm
is 1 and the default low threshold is 0. This alarm is only reported for 15-
minute intervals.
EoS Tx Utilization
Severity: Warning
The EoS Tx Utilization alarm indicates that EoS link utilization exceeds the
configured percentage threshold of the active bandwidth. This alarm is
typically used as a planning tool to aid in detecting when there is insufficient
bandwidth on the link. This alarm is only reported for 15-minute intervals.
In Discard
Severity: Warning
The In Discard alarm is a threshold-crossing alarm that indicates the total
number of events in which the probe dropped frames, due to lack of resources.
Note that this number is not necessarily the number of frames dropped, but the
number of times this condition has been detected. This alarm is only reported
for 15-minute intervals.
Severity: Warning
The Multicast Pkts alarm is a threshold-crossing alarm that indicates that the
number of multicast packets received on a port exceeds the configured
threshold. This alarm is only reported for 15-minute intervals.
Severity: Warning
The Nonconforming Octets Ratio alarm indicates the percentage of
nonconforming octets in a 15-minute interval. This alarm is triggered when the
rate you are trying to pass exceeds the permitted CIR in your SLA.
For example, if your SLA authorizes a CIR of 5 Mbps, and you are trying to
transmit 10 Mbps, 5 Mbps are considered as conforming to the SLA and 5
Mbps are not. In this case, the nonconforming packets are dropped.
This alarm is typically used as a planning tool to alert you that the current SLA
is insufficient.
Severity: Warning
The RED Drop Octets CoS is a threshold-crossing alarm indicating that the
number of packets dropped per port or egress queue exceeds the configured
threshold. Packets are dropped based on their CoS in the following order:
| RED Drop Octets: CoS Best Effort (BE)
| RED Drop Octets: CoS Bronze
| RED Drop Octets: CoS Silver
| RED Drop Octets: CoS Gold
Rx Error Octets
Severity: Major
The Rx Error Octets alarm is a threshold-crossing alarm that indicates that the
number of received errored octets per port exceeds the configured threshold.
This alarm is only reported for 15-minute intervals.
This alarm results when incorrect information is transmitted from the remote
partner.
Rx Error Pkts
Severity: Warning
The Rx Error Pkts alarm is a threshold-crossing alarm that indicates that the
number of received errored frames per port exceeds the configured threshold.
This alarm is only reported for 15-minute intervals.
This alarm results when incorrect information is transmitted from the remote
partner.
Severity: Warning
This alarm is the same as that described in the Standard Transmission
Threshold-Crossing Alarms (TCAs).
Severity: Warning
The Tx Pkts alarm indicates the number of transmitted packets with errors.
Tx Utilization
Severity: Warning
The Tx Util alarm indicates the transmitted utilization (transmitted average
octets rate per percentage of the dedicated network BW). This alarm is only
reported for 15-minute intervals.
DCC TCAs
Severity: Warning
The DCC Link Failure alarm is a threshold-crossing alarm indicating that at
least one of the DCC links has failed.
Severity: Warning
The Crossing the 15-Min Threshold for Received Errored DCC Packets alarm
is a threshold-crossing alarm indicating that the number of DCC packets
received on a port exceeds the configured threshold. This alarm is only reported
for 15-minute intervals.
Severity: Warning
The Crossing the 15-Min Threshold for Discarded Received DCC Packets
alarm is a threshold-crossing alarm indicating that the number of discarded
DCC packets received on a port exceeds the configured threshold. This alarm is
only reported for 15-minute intervals.
Severity: Warning
The Crossing the 15-Min Threshold for Transmitted Errored DCC Packets
alarm is a threshold-crossing alarm indicating that the number of transmitted
DCC packets received on a port exceeds the configured threshold. This alarm is
only reported for 15-minute intervals.
Severity: Warning
The Crossing the 15-Min Threshold for Discarded Transmitted DCC Packets
alarm is a threshold-crossing alarm indicating that the number of discarded
DCC packets transmitted to a port exceeds the configured threshold. This alarm
is only reported for 15-minute intervals.
Severity: Warning
The Crossing the 1-Day Threshold for Received Errored DCC Packets alarm is
a threshold-crossing alarm indicating that the number of errored DCC packets
received on a port exceeds the configured threshold. This alarm is reported for
24-hour intervals.
Severity: Warning
The Crossing the 1-Day Threshold for Discarded Received DCC Packets alarm
is a threshold-crossing alarm indicating that the number of discarded DCC
packets received on a port exceeds the configured threshold. This alarm is
reported for 24-hour intervals.
Severity: Warning
The Crossing the 1-Day Threshold for Transmitted Errored DCC Packets alarm
is a threshold-crossing alarm indicating that the number of errored DCC
packets transmitted to a port exceeds the configured threshold. This alarm is
reported for 24-hour intervals.
Severity: Warning
The Crossing the 1-Day Threshold for Discarded Transmitted DCC Packets
alarm is a threshold-crossing alarm indicating that the number of discarded
DCC packets transmitted to a port exceeds the configured threshold. This alarm
is reported for 24-hour intervals.
Severity: Warning
The Crossing the 15-Min Threshold for Packets Discarded at the Router alarm
is a threshold-crossing alarm indicating that the number of DCC packets
discarded at the router exceeds the configured threshold. This alarm is only
reported for 15-minute intervals.
Severity: Warning
The Crossing the 1-Day Threshold for Packets Discarded at the Router alarm is
a threshold-crossing alarm indicating that the number of DCC packets
discarded at the router exceeds the configured threshold. This alarm is reported
for 24-hour intervals.
Severity: Major
The Gain Input Overloaded alarm indicates a gain input overload condition in
an OFA-2 card. This alarm occurs when the power budget in the link is poorly
planned, resulting in elevated input power levels to the optical amplifier and
amplifier gain that is too high. These factors cause low attenuation between the
input of the card and the input of the gain block, meaning that the optical power
at the input of the gain block is higher than the permitted level, causing
overload.
Illegal Alarm
Severity: Major
The Illegal alarm indicates that the required correction is beyond the gain
capability of the card, and that the set correction is less than the required
correction.
Severity: Major
The Input Power Change alarm indicates that the required correction is greater
than the Low Alarm Threshold that was added.
This alarm can result from conditions that are temporary and reversible or
conditions that are permanent. For example:
| A fiber cut that has been spliced to repair the cut: In this case, the fiber
splice produces attenuation at the site of the splice. This is usually a
permanent condition that must be corrected to prevent the generation of an
Input Power Change alarm.
| Bending of fibers while performing fiber maintenance: This is typically a
temporary condition. The Input Power Change alarm usually disappears
when the fibers are straightened out.
OCU Alarms
OCU Alarms
The following topics describe the Orderwire Control Unit (OCU) alarms.
OCU-LCK
Severity: Warning
The OCU-LCK alarm indicates a problem on the Orderwire Control Unit
optical channel interface.
OCU-OCI
Severity: Warning
The OCU-OCI alarm indicates a problem on the Orderwire Control Unit optical
channel interface.
PCS Alarms
Severity: Warning
The PCS Block 15-Min alarm indicates block error. This alarm is reported only
for 15-Minute intervals.
PCS HI BER
Severity: Warning
The PCS HI BER alarm indicates HI BER conditions, possibly caused by:
| Extremely high received optical power levels
| Very low received optical power levels
| A receiver malfunction or a problem with the other-side transmitter
PCS LF
Severity: Warning
The PCS LF alarm indicates a low frequency.
PCS LOS
Severity: Major
The PCS LOS alarm indicates a significant drop in the received signal level.
This error may be caused by a broken or disconnected fiber or by a faulty
optical transmitter.
PCS RF
Severity: Warning
The PCS RF alarm indicates a resistance to frequency.
Severity: Major
The Set Capability Exceeded alarm indicates that the required correction is
beyond the gain capability of the card, and that the set correction is less than
the required correction.
Severity: Major
The Tracking Limit Exceeded alarm indicates that the span attenuation changes
more than the power control can correct. This alarm usually occurs as a result
of some type of catastrophic event, such as an NE shutting down unexpectedly
or a fiber cut, and is typically accompanied by other alarms such as LOS.
Service Alarms
Service alarms apply to problems with the actual service being provided, as
opposed to the equipment or the trail over which the service is carried. Two
types of alarms can be generated in this category, depending on whether the
service traffic is being transmitted over a protected or nonprotected path.
If a problem occurs on the protection path in a protected ring, then either a
Protection Path Degraded or Protection Path Failed alarm is generated. The
service still flows properly, but with a problem on the protection path in the
ring. In contrast, Service Degraded and Service Failed alarms are generated
when there is a degradation or failure, respectively, in the traffic signal on an
unprotected trail.
By default, all service alarms are masked, meaning they only appear in the
invisible alarms list and are not reported in the Current Alarms window. To
automatically report these alarms in the current alarms list, change the Monitor
Mask option setting for them to Monitored in the Alarm Severity window.
Service alarms apply to all SDH levels, unless otherwise noted.
The following topics describe the XDM service alarms.
Service Degraded
Severity: Major
The Service Degraded alarm indicates degradation in the traffic signal. This
alarm may also indicate that a XC that is part of a trail is transmitting traffic,
but the traffic is recognized as degraded.
If the service is on an unprotected path, this alarm indicates a degraded traffic
signal somewhere along the path. If the service is on a protected path, then it
indicates one of two possible problems: either the nonactive path has failed, or
the service on the active path is degraded.
Service Failed
Severity: Major
The Service Failed alarm indicates that both the main and protection paths are
not transmitting traffic.
Timing Alarms
Timing alarms apply to all SDH levels, unless otherwise noted.
The following topics describe the XDM timing alarms.
T3-1/T3-2 AIS
Severity: Major
The T3-1/T3-2 AIS alarm indicates that T3-1/T3-2 has an alarm indication
signal.
T3-1/T3-2 AIS
Severity: Major
The T3-1/T3-2 AIS alarm indicates that T3-1/T3-2 has an alarm indication
signal.
TG T4 Squelch
Severity: Warning
The TG T4 Squelch alarm indicates that the quality of the timing source for T4
output is below the quality threshold set for this output, and is therefore
considered unsuitable as a T4 timing output. The timing source is squelched so
it is not used as a synchronization source for other systems.
TG T4 Squelch
Severity: Warning
The TG T4 Squelch alarm indicates that the quality of the timing source for T4
output is below the quality threshold set for this output, and is therefore
considered unsuitable as a T4 timing output. The timing source is squelched so
it is not used as a synchronization source for other systems.
TS-1/TS-2/T3-1 LOF
Severity: Major
The TS-1/TS-2/T3-1 LOF alarm indicates that TS-1/TS-2/T3-1 has a loss of
frame.
TS-1/TS-2/T3-1 LOF
Severity: Major
The TS-1/TS-2/T3-1 LOF alarm indicates that TS-1/TS-2/T3-1 has a loss of
frame.
Equipment Alarms
Equipment alarms apply to actual equipment and can affect all SDH levels,
unless otherwise noted.
The following subsections describe the Equipment alarms.
Severity: Minor
The MSP Channel Proc Fail alarm indicates that the MS-SPRing protection
architecture cannot write, detect, or process the contents of the MSP channel
properly. The MSP protocol is used in MS-SPRing protection schemes.
Severity: Minor
The Improper MSP Codes alarm indicates the occurrence of three consecutive
and identical frames containing unused codes in bits 6 through 8 of byte K2
and codes irrelevant to the specific protection switching operation requested.
This alarm may result from:
| An incorrectly created ring. For example, if a ring was created using a 4-
fiber code, which the XDM does not support, instead of 2-fiber code, this
alarm is generated.
| A ring containing non-XDM nodes.
Severity: Minor
The Inconsistent MSP Code alarm indicates the occurrence of 12 successive
frames, starting with the last frame containing previously consistent MSP code,
in which no 3 consecutive frames contain identical MSP bytes.
This alarm may result from:
| Network problems
| Improper configuration of matrices and I/O cards
Severity: Minor
The MSP Channel Proc Fail alarm indicates that the MS-SPRing protection
architecture cannot write, detect, or process the contents of the MSP channel
properly. The MSP protocol is used in MS-SPRing protection schemes.
Severity: Minor
The Improper MSP Codes alarm indicates the occurrence of three consecutive
and identical frames containing unused codes in bits 6 through 8 of byte K2
and codes irrelevant to the specific protection switching operation requested.
This alarm may result from:
| An incorrectly created ring. For example, if a ring was created using a 4-
fiber code, which the XDM does not support, instead of 2-fiber code, this
alarm is generated.
| A ring containing non-XDM nodes.
Severity: Minor
The Inconsistent MSP Code alarm indicates the occurrence of 12 successive
frames, starting with the last frame containing previously consistent MSP code,
in which no 3 consecutive frames contain identical MSP bytes.
This alarm may result from:
| Network problems
| Improper configuration of matrices and I/O cards
Severity: Minor
The Default MS-SPRing K Bytes alarm indicates that the node cannot properly
signal MSP bytes, and therefore cannot properly execute the switch to
protection. Until the node has knowledge of the ring map, squelch table, and
node ID, it will transmit the default K bytes.
MS-SPRing is not properly defined in the NE connected to the port that emits
this alarm.
Severity: Minor
A node that preempts Extra Traffic will send an alarm of Extra Traffic
Preempted. This alarm appears as a result of a protection switch in the MS-
SPRing.
When there is a ring switch, all nodes should drop their extra traffic
connections and pass the protection channels.
This alarm is cleared when the failure in the MS-SPRing recovers (for example,
fiber cut, node failure, and so on).
MS-SPRing Squelching
Severity: Minor
If a switching NE detects segmentation in a ring or additional segmentation in a
ring, it squelches traffic destined for the unreachable NEs.
In the case of a switching node, this alarm identifies the line being squelched
(MS TTP).
Node ID Mismatch
Severity: Minor
The Node ID Mismatch alarm indicates the occurrence of three consecutive and
identical frames that contain a source node (byte K2, bits 1-4) that does not
match the node ID of a neighbor (based on the resident ring map of the
destination node), or that does not match an entry in the ring map.
Severity: Minor
The Default MS-SPRing K Bytes alarm indicates that the node cannot properly
signal MSP bytes, and therefore cannot properly execute the switch to
protection. Until the node has knowledge of the ring map, squelch table, and
node ID, it will transmit the default K bytes.
MS-SPRing is not properly defined in the NE connected to the port that emits
this alarm.
Severity: Minor
A node that preempts Extra Traffic will send an alarm of Extra Traffic
Preempted. This alarm appears as a result of a protection switch in the MS-
SPRing.
When there is a ring switch, all nodes should drop their extra traffic
connections and pass the protection channels.
This alarm is cleared when the failure in the MS-SPRing recovers (for example,
fiber cut, node failure, and so on).
MS-SPRing Squelching
Severity: Minor
If a switching NE detects segmentation in a ring or additional segmentation in a
ring, it squelches traffic destined for the unreachable NEs.
In the case of a switching node, this alarm identifies the line being squelched
(MS TTP).
Node ID Mismatch
Severity: Minor
The Node ID Mismatch alarm indicates the occurrence of three consecutive and
identical frames that contain a source node (byte K2, bits 1-4) that does not
match the node ID of a neighbor (based on the resident ring map of the
destination node), or that does not match an entry in the ring map.
BIT Degraded
Severity: Major
The BIT Degraded alarm indicates an equipment fault that may affect
functionality. BIT code information identifies the module within a card
reporting a problem.
In addition to the alarm, if the equipment is protected, it performs a switch to
protected mode.
This alarm can result from:
| A problem in the card or the HLXC/XIO connector to the card
| A misplaced or faulty HLXC/XIO matrix
BIT Failed
Severity: Critical
The BIT Failed alarm indicates an equipment fault that is more severe than the
one indicated by the BIT Degraded alarm. This alarm results from:
| A problem in the card or the HLXC/XIO connector to the card
| A misplaced or faulty HLXC/XIO matrix
Severity: Minor
The BIT Slightly Degraded alarm indicates an equipment fault that does not
affect functionality. This alarm results from:
| A problem in the card or the HLXC/XIO connector to the card
| A misplaced or faulty HLXC/XIO matrix
Air Flow
Severity: Warning
The Air Flow alarm indicates there is an intake airflow shortage into the system
(originating from the fan unit on the XDM-40 or XDM-50).
Card Failure
Severity: Major
The Card Failure alarm indicates that the card has a general hardware failure.
This alarm indicates a more serious condition than the BIT Failed alarm, as it
signifies a total failure of the card. In contrast, the BIT Failed alarm suggests
that some of the functioning of the card or module is missing or not working
properly.
Card Out
Severity: Major
The Card Out alarm indicates that an assigned card is no longer in its slot. This
alarm results when:
| The card is assigned, but not physically present in the slot
| The card is not in the slot
Door Open
Severity: Warning
The Door Open alarm indicates that the shelf door (on the MECP/MXC) is
open.
Eqpt Ctrl
Severity: Warning
The Eqpt Ctrl alarm indicates a problem with the control object on the
equipment.
Severity: Major
The High Line Out alarm indicates that the card output power is high (over 27
dBm).
High Temperature
Severity: Major
The High Temperature alarm indicates that the equipment temperature is high
(65°C or higher).
Severity: Major
The Low Line Out alarm indicates that the card output power is low (less than
400 mW).
Low Temperature
Severity: Major
The Low Temperature alarm indicates that the temperature is below 0°C.
Power Failure
Severity: Major
The Power Failure alarm indicates that a power failure has been detected in the
card.
Program Fail
Severity: Major
The Program Fail alarm indicates either that the software is not functioning
properly in the card, or that the system has failed to update the card database to
the nonvolatile memory (NVM).
Turbo Mode On
Severity: Warning
The Turbo Mode alarm indicates that there is a card in the system with a high
temperature.
Type Mismatch
Severity: Major
The Type Mismatch alarm indicates that the wrong card or module was
inserted in the slot. This alarm results when the Equipment Actual Type and the
Equipment Expected Type are not the same. These two values must be
identical.
USF
Severity: Warning
The USF alarm indicates a problem with the air dust filter.
Severity: Major
The External Input Alarm Unit 1/2/3/4/5/6/7/8 alarm indicates that an
environmental alarm was detected at external alarm unit 1 through 8. External
inputs can be used by the XDM to trigger an external device, or to trigger an
alarm in the EMS-XDM whenever a certain condition external to the XDM
occurs. Up to eight external inputs can be defined.
Severity: Major
The Application Code Mismatch alarm indicates that the expected configured
application code differs from the actual value supported by the optical module.
Severity: Major
The High Current Pump alarm indicates that the optical amplifier pump has
heated above the allowed current. This alarm may result from a defective
module.
High Rx Power
Severity: Major
The High Rx Power alarm indicates that the received power is higher than the
maximum allowed value.
Severity: Major
The High Temperature Pump alarm indicates that the optical amplifier pump
has heated above the allowed temperature. This alarm may result from a
defective module.
High Tx Power
Severity: Critical
The High Tx Power alarm indicates that the transmitted power is higher than
the maximum allowed value.
Invalid Carrier
Severity: Major
The Invalid Carrier alarm indicates an out-of-grid carrier (that is, above the
noise threshold) or a double carrier (within a grid window). The alarm is
generated for one or more invalid carriers. This alarm applies only to OPM
cards and is detected when the OPM scans the spectrum and identifies a
wavelength(s) that is not defined. The alarm usually occurs during installation
or when adding another lambda with the wrong setups.
This alarm can result from:
| A non-WDM transmitter connected to a WDM system
| A misplaced transmitter
Laser Bias
Severity: Major
The Laser Bias alarm indicates that the laser bias current is becoming low,
signaling the end of life of the device.
Severity: Major
The Low OSNR alarm indicates that the OSNR, as measured by the OPM card,
is lower than the minimum threshold value. This alarm applies only on OPM
cards.
Low Rx Power
Severity: Major
The Low Rx Power alarm indicates that the received power is lower than the
minimum allowed value.
Low Tx Power
Severity: Critical
The Low Tx Power alarm indicates that the transmitted power is lower than the
minimum allowed value.
Severity: Major
The Midstage Out of Range alarm indicates that OFA_M is in passive mode
and its midstage attenuation is either below 5 dB or above 9 dB. When OFA_M
is in passive mode, it automatically measures its midstage attenuation. This
alarm applies only to the OFA_M card.
Missing Carrier
Severity: Major
The Missing Carrier alarm indicates a mismatch between the expected carriers
list and the present carriers, as measured. The alarm is generated for one or
more mismatches. This alarm applies only to OPM cards.
OAM Alarms
The following topics describe OAM (Optical Amplifier Module) alarms that
occur in MCS and DIO cards (on ETY ports only).
| OAM Discovery Failure
| OAM Link Lost
| OAM Remote Link Failure
| OAM Remote Link Event
| OAM Local Link Event
Severity: Major
The OAM Discovery Failure alarm indicates the incompletion of the discovery
process and that settings of the local and remote port are incompatible.
Severity: Major
The OAM Link Lost alarm indicates there has been no OAM PDUs from the
remote port for 5 seconds.
Severity: Major
The OAM Remote Link Failure alarm indicates that the remote port reports a
link fault (Link Fault bit set within the Flags field of OAMPDU received from
remote port).
Severity: Warning
The OAM Remote Link Event alarm indicates the link event the OAM PDU
received.
Severity: Warning
The OAM Local Link Event alarm indicates one of link events occurred:
Errored Symbol
Period, Errored Frame, Errored Frame Period, or Errored Frame Seconds
Summary.
Power In LOS
Severity: Major
The Power In LOS alarm indicates a loss of signal in Modules Cage modules
(amplifiers). This alarm condition is conveyed as an equipment alarm instead
of as a transmission alarm, as the affected modules do not have transmission
objects.
Severity: Major
The Optical Power High Back Reflection alarm indicates that at the output of
an optical amplifier, the fiber is disconnected and the transmitted power is
reflected back.
Switch Fail
Severity: Major
The Switch Fail alarm is specific to OPM cards where the 1:4 switch may fail.
The alarm usually indicates a card hardware failure.
Severity: Major
The Temp Out of Range alarm is specific to AWG-based WDM modules
(Muxes/DeMuxes, OADMs, and so on) in which temperature stability is
crucial. The alarm usually indicates a hardware failure.
Unexpected Carrier
Severity: Major
The Unexpected Carrier alarm indicates a mismatch between the expected
carrier list and the present carriers, as measured. The alarm is generated for one
or more mismatches and is detected when assigning a channel. This alarm
applies only to OPM cards.
Wavelength Mismatch
Severity: Major
The Wavelength Mismatch alarm indicates that the expected configured
wavelength differs from the actual value supported by the optical module. This
alarm usually occurs during installation or maintenance (if replacing a module
with the wrong type).
Lock Open
Severity: Major
The Lock Open alarm indicates that in the XDM-100 or XDM-300, the MXC
card is not properly inserted or the lock on this card is open.
ATS Alarms
The following topics describe the XDM alarms specific to ATS cards.
EMS-XDM-specific Alarms
EMS-XDM-specific alarms identify alarms that are internal to the EMS-XDM
application and are provided primarily for notification purposes. These alarms
cannot be handled and no corrective action can be performed for them. Like
other XDM alarms, these alarms appear in the Current Alarms list.
Contact ECI Telecom customer support if you receive one of the EMS-XDM
specific alarms described in the following table.
The Optical Parameters window for all optical card types, such as TRP
and OFA cards, contains all the parameters shown above or a subset of
them. The parameters that can be viewed include:
Rx Power: actual power level currently received (at the edge of the
card)
Input Power: gain block power level inside the card
Laser Bias: current level of the laser bias
Laser Temp: laser temperature level
Tx Power: actual power level currently transmitted (at the edge of the
card)
Line Output Power: actual power level currently transmitted
Service Power: current service power
SIO_64
Objects in card:
OM64, OT164, PSTG64, SPI Src, SPI Snk, MS Src, MS Snk, RS Src, RS Snk,
AU-4 Src, AU-4 Snk, VC-4 Src, VC-4 Snk
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
Objects in card:
OM16, OT16, SPI Src, SPI Snk, MS Src, MS Snk, RS Src, RS Snk, AU-4 Src,
AU-4 Snk, VC-4 Src, VC-4 Snk
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail Alarm
Objects in card:
OM, OT, SPI Src, SPI Snk, RS Src, RS Snk, MS Src, MS Snk, AU-4 Snk, AU-
4 Src, VC-4 Src, VC-4 Snk
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
PIO2_84
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
TRP10_2
Objects in card:
OM10_1xx, OM10_1, OT10, OPS Src, OPS Snk, OCH Src, OCH Snk, RS Src,
RS Snk, OPG
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
TRP25_2
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
TRP25_2C
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
TRP25_2G
Objects in card:
OMT25xx, OMT25, OTx, OMR25C, ORx, OPS Src, OPS Snk, OCH Src,
OCH Snk, GbE Src, GbE Snk, OPG
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
TRP25_2V
Objects in card:
T6XX, OTx, MBR6, ORx, OPS Src, OCH Src, OPI Snk, OPS Snk, OCH Snk,
OPG
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
OFA
Objects in card:
OM_BAC, OM_PAC, OM_ILC, OTRx, OTS Src, OTS Snk, OMS Src, OMS
Snk, Power Ctrl
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
OFA_M
Objects in card:
OM, OTRx, OTS Src, OTS Snk, OMS Src, OMS Snk, Power Ctrl
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
OFA_R
Objects in card:
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
OPM
Objects in card:
OM_PM, OPS_M
Card Out, Type Mismatch, Power Failure, Card Failure, Switch Failure
Objects in card:
OM-1, OM-2
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Slightly Degraded, Program Fail
Objects in card:
OM, OT, OPI Src, OPI Snk, GEoS Src, GEoS Snk, VC-4 Src, VC-4 Snk
DIO1_61
Objects in card:
OM, OT, OPI, Src, OPI Snk, GEoS Src, GEoS Snk, SPI Src, SPI Snk, MS Src,
MS Snk, RS Src, RS Snk, VC-4 Src, VC-4 Snk, AU-4 Src, AU-4 Snk
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
Objects in card:
Card Out, Type Mismatch, Power Failure, Card Failure, BIT Failed, BIT
Degraded, BIT Not OK, Program Fail
BIT Codes
This section presents the Built In Test (BIT) codes and their significance for
XDM cards and modules.
BIT codes are classified for:
| Large XDM shelves (XDM-40, XDM-400, XDM-500, XDM-1000, XDM-
2000)
| Small XDM shelves (XDM-50, XDM-100, XDM-200, XDM-300)
NOTE: The BIT codes for XDM-40 are the same as for
XDM-1000.
When at least one of the BITs fails, the system indicates the status of the board
as one of the following:
BIT state Corrective action
BIT_FAIL Replace part immediately.
BIT_DEGRADED Replace part ASAP.
BIT_NOT_OK Report only. No need to replace if all is still operating as per
company protocol.
BIT_OK Ignore.
The tables in the following topics summarize the BIT codes as indicated for the
XDM shelves.
0x01000800
0x01000C00
0x01003408
0x04003402
0x04004700
BIT_NOT_OK 0x01000402
0x01003000
BIT_OK 0x01001000
Overview
This section discusses how to use EMS-XDM to analyze the current and
historical performance of XDM NEs and XCs for evaluating quality of service.
EMS-XDM enables you to view PM data for the following objects:
| PDH/SDH: 2M, 34/45M, AU-3, AU-4, E1, FC, FICON, GbE, MS, MS-
DCC, OCH, OW, RS, RS-DCC, TU-2, TU-3,
TU-12, VC-3, VC-4, VC-12
| Data: Bridge, Ethernet, GEoS, GFP, LAG, Policer, VSI, Routing
| Optics: Equipment OPT, OPS-M
The performance management process collects the event counts associated with
the following performance parameters:
| Trail: Errored Seconds (ES), Severely Errored Seconds (SES), Consecutive
Severely Errored Seconds (CSES), Background Block Errors (BBE),
Unavailable Seconds (UAS)
| Link: Out of Frame Second (OFS), Pointer Justification Event (PJE)
| Protection: Protection Switch Count (PSC), Protection Switch Duration
(PSD)
PM processes event counts to derive the performance parameters, and stores
these parameters in registers.
Such information can be used to sectionalize faults and to locate sources of
intermittent errors, and/or determine the quality of the service.
Historical PM processes store the number of ESs, SESs and BBEs during
available time, per 15-minute and 24-hour periods. In addition, it may store the
number of Unavailable Seconds (UAS) in the same periods, and it may perform
a threshold crossing check on the parameter counts and generate threshold
crossing alarms (TCA) if the threshold has been reached or exceeded.
Refer to the following sections:
| Workflow
| Viewing and Modifying PM Collection Groups
| Viewing and Modifying PM Profiles
| Viewing Current Performance
| Viewing Performance History
| Resetting PM Counters
| Collecting PM Data Manually
| Viewing Optical Levels and Parameters of Optical Objects
| Viewing PM, MS, and Optics Logs
| Viewing PM History Reports for OPS-M Objects
Workflow
Perform PM setup activities during initial setup of EMS-XDM, including:
| Defining PM collection groups to simplify the collection definition for
similar objects
| Defining PM profiles in which you specify the thresholds for various PM
counters and assign PM profiles to objects
After defining and assigning PM profiles, access and use PM data as necessary
to ensure optimal system performance.
Perform the following PM operations in any order, whenever required:
| Viewing Current Performance
| Viewing Performance History (view and print PM history charts and
reports)
| Resetting PM Counters
| Collecting PM Data Manually
| Viewing Optical Levels and Parameters of Optical Objects
| Viewing PM, MS, and Optics Logs
| Viewing PM History Reports for OPS-M Objects
PM Management
Performance monitoring tasks are executed from the Performance menu, and
include:
| Current Interval: Monitors 15-minute/24-hour interval PM counters. The
Current PM window displays regular counters and monitored seconds.
The Current PM window is automatically refreshed every minute. In
addition, it is possible to manually refresh the window.
| Performance History: Obtains historical performance data. PM history is
supported only for endpoint objects. You can select the object, the PM
History menu, and specify the duration of the performance history, and
counter type (15-min or 24-hour). Duration for the start and end times are
in the format: day/month/year hour:minute. PM history is supported as in
SYNCO/micro, that is all last XXX intervals (and not only non-zeros).
EMS-XDM supports a PM log to store 15-minute counters (based on the
non zero method. That means that also zero lines are displayed and
therefore are part of the 15 minute log). For 15-minute counters, it is
possible to request history of the previous four hours (16 counters x 15
minutes, including non zero). EMS-XDM also supports a PM log to store
the daily 24-hour counters. Changing a different PM history report (such as
date range) automatically refreshes the Performance History window.
| Resetting PM Counters: Resets the 15 minute or 24-hour intervals to zero.
Note this affects all counters associated with the selected object.
| Setting PM Thresholds: Sets thresholds using PM profiles. Selecting this
option opens the profile associated with the selected object.
Creating PM Groups
You can create PM collection groups. The maximum number of PM collection
groups is 200. The maximum number of members per PM group is 470.
This window is divided into two primary areas. The upper Collection
Groups area at the top of the window displays a list of defined PM
collection groups, with the PM collection characteristics of each. The lower
area of the window is used to define groups, including their characteristics
and object members. After a group is defined, it appears in the list in the
Collection Groups area of the window.
3. Click (Create Group) to clear all fields in the lower area of the
window. This action automatically deletes any information displayed in
these fields, enabling you to define a new PM collection group.
4. In the Group Name field, type a name for the collection group. (Spaces
and “&” character are not supported for the group name.)
In the Object Type dropdown list, select the object type for the group. The
following object types are available:
2M, 34/45M, MS, RS, MS-DCC, VC-3, VC-4, VC-12, AU-3, AU-4,
TU-2, TU-3, TU-12
RS-DCC, GEoS, OCH, GbE, OPS_M, Eth, LAG, Bridge, Policer,
EquipmentOPT, FC
FC, FICON, GFP, Routing, OW, E1
5. In the Counter Duration dropdown list, select the PM counter interval for
the group. Options are:
15M for a 15 minute PM counter
Daily for a 24 hour PM counter.
6. In the Schedule Time dropdown list, select the interval for collecting PM
data for the group:
Every 15 min
Every hour
Every 4 hours
Once a day
7. In the Start Time dropdown list, select the hour for PM collection to begin.
You can only choose 24H when collecting PM data once a day.
8. In the tree in the lower right zone of the window, select one or more objects
that you want to add as members of the group, and click to move
them to the Group Members area. Multiple objects can be selected at one
time. When selecting objects individually, repeat this process to select all
members of the group.
You can also select an NE or a card in the tree. In this case, all the TPs of
the selected class are added to the group.
All objects must be the same object type. If you select objects of an
incorrect type, an error message appears.
A confirmation window opens, prompting you to save the new group without
saving changes.
After a group has been defined, you can edit its membership or collection
characteristics, as required. You can also delete groups when necessary.
Editing PM Groups
You can edit PM collection groups.
Deleting PM Groups
You can delete PM collection groups.
A PM profile refers to all PM thresholds (Far End ,Near End, 15-minute and
24-hour).
| A PMBOType represents a group of 16 PM profiles.
| Each PMBO is associated by its Class to a unique PMBOType.
| Each PMBO points to one specific profile within the corresponding
PMBOType.
Propagating PM Profiles
You can propagate PM profile threshold values automatically to the current NE
or to other designated NEs.
PM Counters
The following topics describe the PM counters reported in EMS-XDM.
PM Counters Overview
The following PM counters are supported:
| Monitored Seconds
| BBE (Near End)
| ESNE (Near End)
| SESNE (Near End)
| UASNE (Near End)
| BBE (Far End)
| ESFE (Far End)
| SESFE (Far End)
| UASFE (Far End)
SES and ES Threshold Crossing Alarms (TCAs) are correlated (separate 15Min
and 1Day):
| If SES alarm is up then crossing of ES threshold will be ignored.
| If ES is up then crossing of SES threshold will clear ES and raise up SES.
BBE thresholds are supported based on G784:
| Threshold values for events evaluated over 15-minute period are
programmable with a range between 0 and a maximum value specified
hereafter:
| Maximum values for number of events are:
900 for ES and SES events
216–1 for the BBE event in the case of VC-11 up to VC-4 paths
224–1 for BBE event in case of contiguous concatenated VC-4-Xc and
STM-N (X < = 16 and N > = 16)
216–1 for each positive and negative count of AU PJE.
| Maximum values for number of events evaluated over 24-hour period are
216–1. Threshold values are programmable between 0 and 216–1.
| Maximum values for BBE events for VCs and STM-Ns is smaller than
maximum number of BBEs detected in a 15-minute period.
PDH/SDH PM Counters
PDH/SDH PM counters include:
| B_UAS: bidirectional unavailable seconds
| BBEFE: background block error far-end
| ESFE: number of errored seconds far-end accumulated
| OFS: number of out-of-frame seconds accumulated (the system enters this
state when several consecutive SDH frames are received with errored
framing patterns)
| PJ: number of pointer justifications accumulated
| PJ_NEG/ PJ-POS: pointer justification, negative and positive thresholds
| SESFE: number of severely errored seconds far-end accumulated
| UASNE: number of unavailable seconds near-end accumulated
| UASFE: number of unavailable seconds far-end accumulated
PDH/SDH PM Counters
PDH/SDH PM counters include:
| B_UAS: bidirectional unavailable seconds
| BBEFE: background block error far-end
| ESFE: number of errored seconds far-end accumulated
| OFS: number of out-of-frame seconds accumulated (the system enters this
state when several consecutive SDH frames are received with errored
framing patterns)
| PJ: number of pointer justifications accumulated
| PJ_NEG/ PJ-POS: pointer justification, negative and positive thresholds
| SESFE: number of severely errored seconds far-end accumulated
| UASNE: number of unavailable seconds near-end accumulated
| UASFE: number of unavailable seconds far-end accumulated
GEoS PM Counters
GEoS PM counters include:
| Tx Pkts: total number of packets successfully transmitted by the port
| Tx Octets: total number of data bytes successfully transmitted by the port
| Rx Good Octets: total number of data bytes received by the port, including
those in bad packets (excluding framing bits, including Frame Check
Sequence (FCS) bytes)
| Rx Good Pkts: total number of good packets received by the port
| Rx Pause Frames: total number of pause frames received by the port
| Tx Pause Frames: total number of pause frames transmitted by the port
| Rx CRC Align Error Pkts: total number of packets received with a length
between 64 and 1518 bytes (excluding framing bits, including FCS bytes),
and a bad FCS with an integral number of bytes
| Rx Pkts: total number of packets received with a length between 64 and
1519 bytes (excluding framing bits, including FCS bytes), but with a bad
FCS with a nonintegral number of bytes
| Rx Undersize Pkts: total number of packets received less than 64 bytes
long (excluding framing bits, including FCS bytes), but were otherwise
well-formed
| Rx Oversize Pkts: total number of packets received longer than 1518 bytes
(excluding framing bits, including FCS bytes), but were otherwise well-
formed
| Rx Fragments: total number of frames received less than 64 octets in
length (excluding framing bits, including FCS octets), and with either a bad
FCS with an integral number of octets (FCS error) or a bad FCS with a
nonintegral number of octets (alignment error)
| Rx Jabber Pkts: total number of packets received longer than 9600 bytes
(excluding framing bits, including FCS bytes), and with a bad FCS or an
alignment error
| Tx Error Packets: total number of packets not completely transmitted due
to network errors
| Tx Utilization: utilization of the SDH available capacity
| Tx Peak Octet Rate: average egress octet rate during the 15-minute
interval containing the highest octet rate
| Rx Octets: total number of octets of data (including those in bad frames)
received on the network (excluding framing bits, including FCS octets)
| Rx Broadcast Pkts: total number of conforming frames received that were
directed to the broadcast address (excluding multicast frames)
| Rx Multicast Pkts: total number of conforming frames received that were
directed to a multicast address (excluding frames directed to the broadcast
address)
| Rx Pkts 64: total number of frames received (including bad frames) that
were 64 octets in length (excluding framing bits, including FCS octets)
| Rx Pkts 65-127: total number of frames received (including bad frames)
that were between 65 and 127 octets in length, inclusive (excluding
framing bits, including FCS octets)
| Rx Pkts 128-255: total number of frames received (including bad frames)
that were between 128 and 255 octets in length, inclusive (excluding
framing bits, including FCS octets)
| Rx Pkts 256-511: total number of frames received (including bad frames)
that were between 256 and 511 octets in length, inclusive (excluding
framing bits, including FCS octets)
| Rx Pkts 512-1023: total number of frames received (including bad frames)
that were between 512 and 1023 octets in length, inclusive (excluding
framing bits, including FCS octets)
| Rx Pkts 1024-1518: total number of frames received (including bad
frames) that were between 1024 and 1518 octets in length, inclusive
(excluding framing bits, including FCS octets)
| Rx Pkts 1519-MTU: total number of frames received (including bad
frames) that were between 1519 and Max octets in length, inclusive
(excluding framing bits, including FCS octets)
| HDLC CRC Error Pkts: number of packets with HDLC CRC errors
received from the GEoS link
| Dropped Pkts: number of dropped frames due to ingress buffer overflow
Counter 24 hr GEoS
BBENE +
ESNE +
SESNE +
UASNE +
UAS nVC-3 N_A
UAS - 1xVC-4 N_A
UAS - 2xVC-4 N_A
UAS - 3xVC-4 N_A
UAS - 4xVC-4 N_A
UAS - 5xVC-4 N_A
UAS - 6xVC-4 N_A
UAS - 7xVC-4 N_A
Tx Peak timestamp +
Tx Average octet rate +
Ethernet PM Counters
Ethernet PM counters for Ethernet ETY and EoS objects include:
| Rx Octets: total number of octets of data (including those in bad frames)
received on the network (excluding framing bits, including FCS octets)
| Rx Pkts: total number of frames received, including bad frames, broadcast
frames, and multicast frames
| Rx Broadcast Pkts: total number of conforming frames received that were
directed to the broadcast address (excluding multicast frames)
| Rx Multicast Pkts: total number of conforming frames received that were
directed to a multicast address (excluding frames directed to the broadcast
address)
| Rx CRC Align Error Pkts: total number of frames received (excluding
framing bits, including FCS octets) with a length between 64 and MAX
octets, inclusive, but that had a bad FCS with an integral number of octets
(FCS error), or a bad FCS with a nonintegral number of octets (alignment
error)
| Rx Undersize Pkts: total number of frames received that were less than
64 octets in length (excluding framing bits, including FCS octets) but were
otherwise well formed
| Rx Oversize Pkts: total number of frames received that were longer than
MAX octets (excluding framing bits, including FCS octets) but were
otherwise well formed
| Rx Fragments: total number of frames received that were less than 64
octets in length (excluding framing bits, including FCS octets), and had
either a bad FCS with an integral number of octets (FCS error) or a bad
FCS with a nonintegral number of octets (alignment error)
| Rx Jabber Pkts: total number of frames received that were longer than
MAX octets (excluding framing bits, including FCS octets) and that had
either a bad FCS with an integral number of octets (FCS error) or a bad
FCS with a nonintegral number of octets (alignment error)
| Rx Error Pkts: total number of bad packets received
| Rx Error Octets: total number of bad octets received
| Rx VLAN Pkt Discards: total number of good frames dropped due to
VLAN filtering
| Rx Header Error Packets: total number of packets dropped due to header
errors
| Rx Pause Frames: total number of pause frames received by the port
| Rx Buffer Overflow: total number of dropped packets due to Rx FIFO
buffer overflow on the port
| Duplicate MAC Alert Seconds: total number of seconds in which
duplicate MAC alerts arose
| Timeout Discard Packets: I/F Out packets discarded due to buffering
timeout
| Timeout Discard Octets: I/F Out octets discarded due to buffering timeout
| Tx CRC Error Frames: total number of bad frames transmitted
(alignment error)
| Tx Pkts: total number of packets successfully transmitted by the port
| Tx Octets: total number of octets successfully transmitted by the port
| Tx Average Octet Rate: average egress octet rate
| Unicast Pkts - BE: total number of unicast packets counted on this priority
level
| Unicast Pkts - Bronze: total number of unicast packets counted on this
priority level
Policer PM Counters
Policer PM counters per policer include:
| Drop Octets: total number of received good bytes with a rate greater than
CIR
| Act Octets: total number of received good bytes handled by the policer
| Nonconforming Octets Ratio: percentage of octets dropped by this policer
| Drop Pkts: total number of received good frames with a rate greater than
CIR
| Act Pkts: total number of received good frames handled by the policer
| Conforming Octet Rate: average octet rate of conforming octets (an octet
accepted by the policer)
| CIR Utilization: utilization of the permitted capacity (CIR)
| Egress Tx Pass Packets: total number of transmitted pass packets
| Egress Tx Pass Octets: total number of transmitted pass octets
| Egress Tx WRED Drop Packets: total number of transmitted WRED
frames
| Egress Tx WRED Drop Octets: total number of transmitted WRED octets
| Egress Tx Average Octets Rate: average octet rate of octets transmitted
by the policer
| Egress Tx Flow Util: utilization of transmitted flow
| Egress Tx Drop Percent: percentage of transmitted frames
Counter 24 hr Policer
Drop Octets +
Act Octets +
Nonconforming Octets +
Ratio
Drop Pkts +
Act Pkts +
Conforming Octet Rate +
CIR Utilization +
Conforming Peak Rate +
time
Bridge PM Counters
Bridge PM counters per bridge include:
| Broadcast Pkts - BE: total number of broadcast packets counted on this
priority level
| Broadcast Pkts - Bronze: total number of broadcast packets counted on
this priority level
| Broadcast Pkts - Silver: total number of broadcast packets counted on this
priority level
| Broadcast Pkts - Gold: total number of broadcast packets counted on this
priority level
| RSTP Topology Changes: total number of topology changes detected by
this bridge
| Rx CPU Pkts: total number of packets towards the CPU (RSTP
background protocol data units (BPDU))
| BSC Discard Seconds: total number of seconds in which packets were
discarded by the broadcast storming control
OCH PM Counters
OCH-specific PM counters that support FEC implementation include:
| CE: total number of corrected errors
GFP PM Counters
GFP PM counters include:
| Rx tHEC UCE: total number of uncorrected errors in Type HEC within a
received GFP frame
| Rx tHEC CE: total number of corrected errors in Type HEC within a
received GFP frame
| Rx cHEC CE: total number of corrected errors in the Core HEC within a
received GFP frame
| Rx Valid CDF: total number of client data frames
| Rx Bytes: total number of client data frames (CDFs) received without any
errors
| Tx CDF: total number of transmitted frames and client management frame
| Tx Bytes: total number of bytes sent in frames without errors and client
management frames
| Discarded Frames: total discarded frames
| FCS ERR: total number of frames received with FCS errors
AURORA-G PM Counters
AURORA-G PM counters (accessed from a Port View window per specified
EMS name) include:
| Rx Octets: total number of octets of data (including those in bad frames)
received on network (excluding framing bits but including FCS octets)
| Rx Pkts: total number of frames (including bad frames, broadcast frames,
and multicast frames) received
| Rx CRC Align Error Pkts: total number of frames received with length
(excluding framing bits, but including FCS octets) between 64 and MAX
octets, inclusive, but with either a bad Frame Check Sequence (FCS) with
an integral number of octets (FCS Error) or a bad FCS with a nonintegral
number of octets (Alignment Error)
| Rx Undersize Pkts: total number of frames received less than 64 octets
long (excluding framing bits, but including FCS octets) and otherwise well
formed
| Rx Oversize Pkts: total number of frames received longer than MAX
octets (excluding framing bits, but including FCS octets) and otherwise
well formed
| Rx Fragments: total number of frames received less than 64 octets in
length (excluding framing bits but including FCS octets) and with either a
bad Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets (Alignment Error)
| Rx Jabber Pkts: total number of frames received longer than MAX octets
(excluding framing bits, but including FCS octets), and with either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets (Alignment Error)
| Rx Error Pkts: total number of received bad frames
| Rx Error Octets: total number of received bad octets
| Rx Average Octet Rate: rate of received average octet
| Rx Utilization (%): utilization of available capacity
| Rx Header Error Pkts: number of packets dropped due to header errors
| Tx Average Octet Rate: rate of transmitted average octets
| Tx Pkts: number of transmitted packets
| Tx Octets: number of transmitted octets
| Tx Utilization (%): percentage of transmitted utilization
MPLS PM Counters
VSI PM counters include:
| Mc VPN Octets: total number of MCS VPN octets
| Mc VPN Octets Dropped: total number of MCS VPN octets dropped
| Mc VPN Packets Dropped: total number of packets dropped due to
overflow
| Mc VPN Average Rate: average VPN rate
| Mc VPN Utilization: utilization of available capacity
| Quota Dropped Pkts: total number of frames dropped to quota
SEG-IN counters (for Transit and Tail MPLS XCs) include:
| Rx Pkts: number of packets received for this in-segment
| Topology Tree: number of octets received for this in-segment
| Rx Average Octets: average octet rate of octets received
| Rx Utilization: utilization of traffic received in current monitored interval
for this in-segment
| Tunnel Down Sec: number of seconds during which operational state of
this XC was down (relevant only when OAM state is enabled)
| Tunnel Down Time Ratio (ppm)
SEG-OUT counters (for Head MPLS P2P XCs) include:
| Tx Pkts: number of packets transmitted for this out-segment
| Tx Octets: number of octets transmitted for this out-segment
| Tx Red Pkts: number of packets discarded by WRED for this out-segment
| Tx Red Octets: number of octets discarded by WRED for this out-segment
Default PM Thresholds
The following tables list the PM counters for various XDM object types.
UAS and OFS do not have TCAs. However this counter can reach maximum
values of 900 in 15 minutes and 86,400 in 24 hours.
The previous table refers only to TCA. BBE indicates the number of BBEs
which set/reset BBE alarms. This is different than the number of BBEs which
trigger SESs.
BBE Calculation to Trigger SES: In MS there are 3 x B2 = 24 Bits. There are
8000 frames per second, that is 24x8000=192000 B2 bits per second. 192000 is
the maximum number of errors per seconds for the basic rate of STM1.
According to standards, BBE counting stops when declaring SES. SES is
declared when 30%(path) or 15%(ms) of the blocks are errored. 30% x 192000
= 57600 is the number of BBEs per second which trigger one SES. For STM64,
57600 X 64 triggers SESs.
PJE thresholds crossing is application-dependent since it is derived from the
network synchronization scheme. Thus the thresholds crossing default value is
0 (and the setting is determined by the user).
Pointer justification event is possible once every 4 frames; that is up to 2000
per second (AU4).
PDH TCAs
Parameter 15-minute 15-minute 24-hour range 24-hour
range default default
2 Mb/s BBENE/FE 0-269,100 4500, 25 0-25,833,600 6000
Framed ESNE/FE 0-900 120, 5 0-86,400 350
SESNE/FE 0-810 15, 0 0-77,760 20
2 Mb/s CVNE/FE 0-2159100 4500, 25 0-207,273,600 6000
Unframed ESNE/FE 0-900 120, 5 0-86,400 350
SESNE/FE 0-810 15, 0 0-77,760 20
34/45 Mb/s CVNE/FE 0-2159100 4500, 25 0-207,273,600 6000
Unframed ESNE/FE 0-900 150, 10 0-86,400 600
SESNE/FE 0-810 15, 0 0-77,760 20
34/45 Mb/s BBENE/FE 0-2159100 4500, 25 0-207,273,600 6000
Framed ESNE/FE 0-900 15, 10 0-86,400 600
SESNE/FE 0-810 15, 0 0-77,760 20
VC-4 PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BBENE 36000 200 48000 NA
ESNE 180 20 1500 NA
SESNE 15 0 20 NA
UASNE NA NA NA NA
BBEFE 36000 200 48000 NA
ESFE 180 20 1500 NA
SESFE 15 0 20 NA
UASFE NA NA NA NA
B_UAS 1 0 NA NA
PJ-POS/PJ_NEG 1 0 NA NA
VC-4 PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BBENE 36000 200 48000 NA
ESNE 180 20 1500 NA
SESNE 15 0 20 NA
UASNE NA NA NA NA
BBEFE 36000 200 48000 NA
ESFE 180 20 1500 NA
SESFE 15 0 20 NA
UASFE NA NA NA NA
B_UAS 1 0 NA NA
PJ-POS/PJ_NEG 1 0 NA NA
Ethernet PM counters
Type 15-min high 15-min low 24-hour high 24-hour
low
Rx Broadcast Pkts 40 M 26 M NA NA
(for ETY FE ports)
Rx Broadcast Pkts 400 M 260 M NA NA
(for ETY GBE
ports)
Rx Broadcast Pkts 60 M x 40 M x NA NA
(for EoS ports) (number of (number of
VC-4s) VC-4s)
Rx Multicast Pkts 40 M 26 M NA NA
(for ETY FE ports)
Rx Multicast Pkts 400 M 260 M NA NA
(for ETY GBE
ports)
Rx Multicast Pkts 60 M x 40 M x NA NA
(for EoS ports) (number of (number of
VC-4s) VC-4s)
Rx Errors Pkts (for 135 13 NA NA
ETY FE ports)
Rx Errors Pkts (for 1350 135 NA NA
ETY GBE ports)
Rx Errors Pkts (for 20 K x 2Kx NA NA
EoS ports) (number of (number of
VC-4s) VC-4s)
Policer PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
Nonconforming 5 1 NA NA
Octets Ratio
CIR Utilization 90 60 NA NA
Bridge PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BSC Discard 1 0 NA NA
Seconds
RS PM Counters
Type 15-min High 15-min Low 24-hour High 24-hour
Low
BBENE 9000 200 48000 NA
ESNE 180 20 1500 NA
SESNE 15 0 20 NA
UASNE N/A N/A NA NA
OFS N/A N/A NA NA
VC-3 PM Counters
Type 15-min High 15-min Low 24-hour High 24-hour
Low
BBENE 36000 200 48000 NA
ESNE 150 10 600 NA
SESNE 15 0 20 NA
BBEFE 36000 200 48000 NA
ESFE 150 10 600 NA
SESFE 15 0 20 NA
2M PM Counters
Type 15-min High 15-min Low 24-hour High 24-hour
Low
BBENE 4500 25 6000 NA
ESNE 120 5 350 NA
SESNE 15 0 20 NA
UASNE NA NA NA NA
34M PM Counters
Type 15-min High 15-min Low 24-hour High 24-hour
Low
BBENE 4500 25 6000 NA
ESNE 150 10 600 NA
SESNE 15 0 20 NA
45M PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BBENE 4500 25 6000 NA
ESNE 150 10 600 NA
SESNE 15 0 20 NA
45M PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BBENE 4500 25 6000 NA
ESNE 150 10 600 NA
SESNE 15 0 20 NA
VC-12 PM Counters
Type 15-min high 15-min low 24-hour high 24-hour
low
BBENE 9000 50 12000 NA
ESNE 120 5 350 NA
SESNE 15 0 20 NA
BBEFE 9000 50 12000 NA
ESFE 120 5 350 NA
SESFE 15 0 20 NA
Counted Errors
The following table lists all measured/counted errors per specified object (
indicated counted for this object).
PM OFS BBE CV ES SES UAS PJ BBE CV ES SES UAS UAS
Parameter (NE (NE (NE (NE (NE (NE (NE (FE (FE (FE (FE (FE (bi-
(location) Rx) Rx) Rx) Rx) Rx) Rx) Rx) Rx) Rx) Rx) Rx) Rx) direc-
Layer tional)
RS
MS
VC4_64C
VC4_16C
VC4_4C
VC4
AU4
VC3/TU3/
AU3
TU2
VC12/TU12
45M framed
45M
unframed
34M framed
34M
unframed
2M framed
2M unframed
| Bidirectional PM parameters are supported for PDH only when the PDH
signal is fully framed supporting backward indications. Unframed PDH
supports only NE.
PJ refers to three counters:
PJ+ (positive)
PJ- (negative)
PJ Total
Alarms are the same for PJ+ and PJ- (however, note that only one alarm
is applicable, the 15-minute alarm).
PJ alarm is based only on the alarm counter threshold and not on UAT.
There is no TCA for OFS , just 15-minute and 24-hour counters.
Note that alarm hierarchy affects this process, that is SPI-LOS causes RS-SES,
however it also causes MS-SES, VC4-SES, and so on.
Persistency/Backup on NVM
There is an automatic EMS request for PM registers every 24 hours.
If the NE fails (due to power down, reset, and so on), errors are not counted and
as a result PM registers do not reflect the real quality of service for the last 24
hours.
Following are some solutions:
| Mechanism to save PM registers in the NVM. The NVM is designed to
store PM registers, so space is not a problem. (From the software
perspective this is a heavy utility (how often to update the NVM, how
heavy is that process, and so on.)
| Backup the RAM memory (non-NVM), or change part of it into flash
requires changes in hardware.
| Incremental uploading of PM registers. Retrieves only the changes in PM
registers (may reduce time required to get PM registers (in 1 hour instead
of 24). This is complicated for the embedded and the EMS.
| Use a control summary: EMS-XDM gets PM registers per card (not per
object). Enables getting PM registers each hour and by the time limit of
"unavailable PM". (Typically, PM is desired at termination points.)
EMS-XDM cannot identify termination points, therefore in order to get PM
you must request PM for all related NEs. This process takes a lot of time.
EMS-XDM implements the following:
Automatic PM upload every xx hours , or attribute to specify xx limits
(for example 1-24 hours)
Each PM upload is recorded and does not overwrite the previous PM
uploading
(Duration is limited according to free space on the hard-disk)
Bidirectional PM
Most services are bidirectional, therefore a path must be available in both
directions to provide a meaningful service. (According to Recommendations
G.826 and G.828, it is recommended to specify end-to-end error performance
objectives for a path).
These requirements are covered by Recommendation G.774.1.
Register sets needed:
| 2 (1+1) 24-hour near-end registers for BBE, ES, and SES but bidirectional
(G.826) behavior
| 2 (1+1) 24-hour far-end registers for BBE, ES, and SES but bidirectional
(G.826) behavior
| 2 (1+1) 24-hour bidirectional registers for UAS
| Regenerator monitoring: Note that REI and RDI indications are not
available at this level. Therefore, bidirectional monitoring of availability on
a single signal is not possible, and each direction has to be monitored
separately.
| Monitoring in syncom: There are two monitoring points at VC12 (East
and West). The two points complicate identifying the far-end source and
therefore also complicate generating bidirectional PM.
| Monitoring in XDM: In XDM, there is one monitoring point at LPT (close
to the two TU12s). Therefore, the syncom problem does not exist in XDM.
| Criterion for a bidirectional path: According to standards, a bidirectional
path is in the unavailable state if either one or both directions are in the
unavailable state. UAS registers are required for representing PM for
bidirectional paths. The far-end indications are received at the place of
monitoring via REI (REI -> Result of MS-BIP(m2) ,HP-BIP(b3), or LP-
BIT(v5)). The system generates a path UAS-based on the criteria above
using the near-end and far-end indications. The near–end UAS registers are
stored in the system separately from the bidirectional UAS registers. For
monitoring a bidirectional path, an unavailable period starts if either the
near-end or the far-end is in an unavailable state. For monitoring a
unidirectional path, only the near-end is considered.
| Management: On a PM request for a bidirectional path, management
displays the bidirectional UAS and also the UAS of the near-end part.
The following table (based on G.783 ) shows the maximum detection time
allowed per threshold.
NE Connection Monitor
A single managed object of XCO class represents only a one-way connection.
Therefore, to define a connection that is a part of a bidirectional trail, two XCO
managed objects should be used.
The Connection Protection conditional package is supported when SNCP or
Matrix protection is supported for this managed object.
The Connection Monitor conditional package should be enabled if the
termination point object listed in TO_TP attribute is a service end-point and the
service alarm should be managed. If the Connection Monitor conditional
package is enabled than the Generic Alarm Information conditional package
(inherited from XDM TOP) is also enabled for this managed object.
Note TO_TP refers to one of the TTP Sink or CTP Source objects which
receives traffic in accordance with the connectivity relationship defined by the
XC managed object instance.
Nonzero PM Interval
The nonzero PM interval enables increasing the coverage time of PM registers
to more than 4 hours, where: 16 regs x 15 min = 4 hours.
This is implemented by not using registers for zero counting.
TCA Correlation
SES and ES Threshold Crossing Alarms are correlated (separate 15Min and
1Day).
If SES alarm is up, then crossing of ES threshold will be ignored.
If ES is up, then crossing of SES threshold will clear ES and raise up SES.
PM Object Support
PM is supported for objects including TTP (RS, MS, VC-4, VC-12).
There are 17 registers per object for the 15-min PM.
There are two registers per object for the 24 hour PM (one for current and one
for history).
BBE Thresholds
BBE thresholds are supported based on G784.
The threshold values for events evaluated over the 15-minute period are
programmable with a range between 0 and a maximum value specified
hereafter:
The maximum values for the number of events are:
| 900 for ES and SES events
| 216 – 1 for BBE event in the case of VC-11 up to VC-4 paths
| 224 – 1 for BBE event in the case of contiguous concatenated VC-4-Xc and
STM-N (X < = 16 and N < = 16)
| 216 – 1 for each positive and negative counts of AU PJE.
The maximum values for the number of events evaluated over the 24-hour
period is 216 – 1. The threshold value is programmable between 0 and 216 – 1.
The maximum values for BBE events for VCs and STM-Ns is smaller than the
maximum number of BBEs that could theoretically be detected in a 15 minute
period.
The Start Time field shows the date and time when the EMS-XDM
started collecting PM data.
The Duration field shows the PM time interval (one day or
15 minutes).
The Monitored Seconds field shows the monitored seconds.
3. To refresh the contents of the Current PM window, on the menu bar select
File > Refresh.
To filter a specific counter, clear the respective option button to disable it.
You can select/clear multiple option buttons to display multiple charts on
the same scale drawing.
In the Current PM window, on the menu bar select File > History, and on
the submenu, select the required interval.
5. When you finish setting the relevant period and the window duration, on
the toolbar, click the relevant 24 Hours or 15 Min button to retrieve the
data. Results vary depending on object counters.
Use the vertical or horizontal scroll bars to view the different sections of a
chart.
Use the command buttons on the left side of the Performance Charts
window to perform operations described in the following table.
3. Click Refresh. The individual charts for the selected counters appear in the
window.
The buttons used to display different parts of an individual chart are the same
as in the standard Performance Charts window described in the previous
table.
Resetting PM Counters
You can reset the performance counters of any transmission object whose
performance is measured. This action can be performed independently for each
object, or you can simultaneously reset the performance counters for multiple
transmission objects, as follows:
| Reset all performance counters for a selected card from the Shelf View.
| Reset the performance counters of specific objects only from the Card
Internals View.
The ability to reset multiple counters concurrently provides a fast and
convenient method for re-initializing counters all at once, instead of having to
reset them separately for each object.
To reset all 24-hour PM counters, on the menu bar, select Performance >
Reset Counters > Daily.
Each log file shows all XC performance data collected for different time
intervals, based on the PM groups defined for the NE. The title of each file
identifies the time interval and the day concerned, in the format
FileType.GroupName.Date, where Date is in the form
PM<yyyy><mm><dd>.
File names indicate the object, title, and date. Files are located in the
~/PMLogs directory.
2. To save an XC log file to an external storage device, insert the device and
select the file you want to save, and click Export.
3. To view the contents of a XC or MS log file (that is, the XC PM for a
single day), select the required file, and in the Trail Log window, click
Browser. The Browse File window opens.
5. Type one or multiple filter criteria, as required. You can refine the filter
criteria by clicking one of the buttons next to the text field. The following
table describes the functions of the filtering criteria available in the PM
Filter window.
Field Description
Unexpected Alarm generated if an actual carrier is measured but had not
Carrier been set as expected.
Missing Carrier Alarm generated for a carrier that had been set as expected
but is not being measured on line.
OSNR Low Alarm generated if the carrier measured OSNR is below set
OSNR threshold.
Overview
This section discusses how to use EMS-XDM to perform routine maintenance
operations on XDM cards and internal objects. Most of these operations are
performed by the administrator in the Card Internals View window.
| Workflow
| Preventive Maintenance Operations
| Performing Card Maintenance
| xMCP/MXC Synchronization
| MSP Maintenance Operations
| MS-SPRing Maintenance Operations
| Performing Transmission Object Maintenance
| Performing Maintenance on Timing/TMU Objects
Workflow
You can perform the following maintenance operations in any order, whenever
required:
| Performing Card Maintenance
| Saving Current Network and Security Configurations
| Performing Transmission Object Maintenance
| Performing Maintenance and Backup Operations Using a Script
Preventive Maintenance
Operations
This section describes how to use EMS-XDM to perform preventive
maintenance operations.
| Saving Current Network and Security Configurations
| Performing Maintenance and Backup Operations Using a Script
| Preventive Maintenance Procedures
You can save the current configuration whenever required. By saving the
current configuration, you create a backup copy of the configuration manually.
In the EMS-XDM Main window, select the NE and on the menu bar,
select System > Configuration File > Save to File.
2. Accept the default name (which includes the date and time) suggested by
the system, or enter a name for the backup file.
3. Click OK. A confirmation message appears.
4. Click Yes to confirm.
ScheduleTask options
Script Description
ScheduleTask -GetDB <ipaddress> Performs GetDB operation on NE with
<neType> specified IP address.
Examples:
For XDM-1000 and XDM-2000 shelves, NE
type is XMCP (01 in the script).
For XDM-100 and XDM-200 shelves, NE
type is MXC (03 in script).
ScheduleTask -GetAllDB Performs GetDB operation on all NEs in
EMS.
ScheduleTask -XmlFile Activates XCs from designated XML file.
<filenameToActivate>
ScheduleTask -XmlExport Exports XCs for designated NE to an XML
<filenameToExportTo> file.
ScheduleTask -XmlExport ALL Exports XCs of all NEs in EMS to an
XML file.
ScheduleTask -SaveDB <filename> Saves EMS database configuration to a
file.
ScheduleTask -PutAllVer <neType> Performs PutVersion operation on all NEs
<VersionNumber> in EMS of a given type.
Where:
| neType is 01 in XDM-1000 platform or
03 in XDM-100/300 platform.
| VersionNumber is a number, such as
3047.
To abort, select /tmp/PDLstop and wait
forcurrent NE to finish.
Script Description
ScheduleTask -PutVer <ipaddress> <neType> Performs PutVer operation on selected NE.
<VersionNumber>
Where:
| ipaddress is address of NE, for example
192.9.90.100.
| neType is 01 in XDM-1000 platform or
03 in XDM-100/300 platform.
| VersionNumber is a number, such as
3047.
ScheduleTask -ActVer <ipaddress> Performs Activate Version operation on
<VersionNumber> <day/month/year selected NE.
hour:minute:00>
Where:
| ipaddress is address of NE, for example
192.9.90.100.
| VersionNumber is a number, such as
3047.
| Time is in format
12/4/2001 10:54:00.
ScheduleTask -ActAllVer <neType> Performs Activate Version operation on all
<VersionNumber> <day/month/year NEs in EMS of a given type.
hour:minute:00>
Where:
| neType is 01 in XDM-1000 platform or
03 in XDM-100/300 platform.
| VersionNumber is a number, such as
3047.
| Time is in format
12/4/2001 10:54:00.
To abort, select /tmp/PDLstop and wait for
current NE to finish.
ScheduleTask -CnclActVer <ipaddress> Performs CancelActivateVersion operation
Where ipaddress is address of NE, for on selected NE.
example 192.9.90.100.
ScheduleTask -CnclAllActVer <neType> Performs CancelActivateVersion operation
Where neType is 01 in XDM-1000 platform on all NEs in EMS of a given type.
or 03 in XDM-100/300 platform.
To abort, select /tmp/PDLstop and wait for
current NE to finish.
ScheduleTask -help Displays list of options that can be
performed using this script.
To view the log generated when running the script, open the .scheduleLog file.
Resetting a Card
You can reset a card that is not functioning properly when you suspect that the
problem is not caused by the card hardware.
4. If you performed protection lockout in Step 2, release the lockout (to allow
a switch to protection when the situation requires it).
xMCP/MXC Synchronization
The xMCP (in the XDM-500, XDM-1000, and XDM-2000 shelves) or MXC
(in the XDM-100, XDM-200, and XDM-300 shelves) performs the XDM
communications, control, alarm, and maintenance functions, and contains the
NVM and COM modules. An optional redundant xMCP/MXC card may
provide full 1:1 protection capability at the equipment level. Upon failure of the
active xMCP/MXC, the standby xMCP/MXC becomes the active control unit.
xMCP cards are installed in the two center slots of the cards cage, C1 and C2.
The primary xMCP is installed in slot C1, and the backup is installed in slot
C2.
MXC cards are installed in slots A and B, with the primary MXC card installed
in slot A and the standby in slot B.
When installed in the 1+1 redundancy configuration, the two xMCPs/MXCs
can either be automatically synchronized every predefined time period, or
synchronized manually. You can view the status of the xMCP/MXC
synchronization by reading the SB DB State field in the NE Info window.
MS-SPRing Maintenance
Operations
You can perform maintenance operations on objects configured in MS-SPRing.
These maintenance operations can only be performed when the ring is active.
MS-SPRing Maintenance
Operations
You can perform maintenance operations on objects configured in MS-SPRing.
These maintenance operations can only be performed when the ring is active.
In the EMS-XDM main window, select an NE and on the menu bar, select
Maintenance > Maintenance Info.
The Maintenance Info window opens, displaying the objects and the
respective maintenance operations that have been applied to them.
2. To view maintenance operation data, select an operation from the list, and
on the menu bar, select File > Open. The relevant window (or Shelf View)
opens displaying data for the selected operation.
3. On the Maintenance menu, select an option to view the operations
performed on the NE, including:
Loopback
Force AIS
Force AU/TU-AIS
Force RDI
Force REI
Force RAI
Force BDI
Force NDC
Force CSF
4. On the Protection menu, select an option to view the protection operations
performed on the NE, including:
Path Protection: Lockout, Force Switch, Manual Switch
TMU Protection: Lockout, Manual Switch
TG Protection: Lockout, Force Switch
Equipment Protection: Lockout, Force Switch, Manual Switch
MSP: Lockout, Force Switch, Manual Switch
OPG Protection: Lockout, Force Switch, Manual Switch
MS-SPRing: Lockout, Force Switch, Manual Switch
5. On the Alarms menu, select an option to view masked and nonreported
objects in the NE, as follows:
Select Alarms > Masked/Not Monitored to display a list of all
masked or nonmonitored alarms. This option enables you to view
which objects are currently masked (as defined in the Master Mask
setting in the Alarm Severity window), making it easier to locate and
unmask them when an alarm occurs.
Select Alarms > Non Reported to display a list of all nonreported
alarms. This option enables you to view which objects have unreported
alarms (as defined in the Master Mask setting in the Alarm Severity
window), making it easier to locate them when an alarm occurs.
The maintenance options that can be viewed vary depending on the type of
object selected. Refer to the relevant sections of this section for a list of the
appropriate maintenance operations per object.
Performing/Releasing Loopbacks
Limitations
| For SNC/P trails, AU/TU loopbacks are performed on both trails (towards
two I/Os).
| AU loopback can be performed only if AU-to-AU XC is available (that is,
only if AU is not terminated).
| For contiguous concatenation streams, AU-4-Xc, loopback is performed on
the entire stream (and not on individual AUs).
| TU-12 loopbacks performed in the matrix card are associated with the AU-
3/AU-4/TU-3/TU-12 objects themselves (that is activation and release are
through these objects).
In the XDM-400/500/1000/2000, you can activate RS facility (far-end)
loopback for the following cards:
| XIO384
| SIO164
Limitations
| RS loopback cuts off DCC. Therefore, whenever DCC is active on this RS,
the EMS prevents DCC loopbacks. In such cases, a warning message
appears alerting that DCC is enabled for this RS and loopback is disabled.
| RS loopbacks with AIS are not supported.
| RS facility (far-end) loopbacks (on the client side) are supported in
TRP25_4 and TRP10_2B.
| STM-1/4 loopbacks are not supported.
| Contiguous to Virtual loopback is not supported.
To perform a loopback:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Select a card containing the required interface point, right-click and select
Open. The Card Internals View Zoom area opens, displaying the objects
of the selected card.
3. Select the required object, and on the menu bar, select Maintenance >
Loopback, and select either Near or Far.
4. On the submenu, select Activate. A confirmation message window opens.
5. Click Yes to confirm. The system notifies you that the action was
successfully completed. A icon appears on the NE in the EMS-XDM
main window, on the card slot in the Shelf View, and on the affected object
in the Card Internals View.
To release a loopback:
| Repeat Steps 1-3 in the previous procedure, and click Release.
Sending an AIS
EMS-XDM enables you to force an Alarm Indication Signal (AIS) downstream
or send an AIS upstream to an object for testing purposes. AIS actions are
traffic-affecting.
To send an AIS:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Double-click the card containing the required interface point to open its
Card Internals View.
3. Select the required object.
4. On the menu bar, select Maintenance > Force AIS > Force.
5. To cancel the AIS, repeat Steps 1-3, and on the menu bar, select
Maintenance > Force AIS > Automatic.
Sending an RDI
EMS-XDM enables you to force a Remote Defect Indication (RDI) to test
proper reception at the VC or multiplexer section (MS) level of the adjacent
node in a network.
To send an RDI:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Double-click the card containing the required interface point to display its
Card Internals View.
3. Select the required object.
4. On the menu bar, select Maintenance > Force RDI > Force.
5. To cancel the RDI, repeat Steps 1-3, and on the menu bar, select
Maintenance > Force RDI > Automatic.
Switching to Protection
If one of the objects in the Card Internals View is part of a cross connection
as shown in the following figure, an arrow indicates the active (working)
object.
Sending a BDI
EMS-XDM enables you to force a Backward Defect Indication (BDI) to send
an indication to the remote side whenever a defect is detected at the Snk
termination point on an optical channel generated by the termination source.
To send a BDI:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Double-click the card containing the required interface point to open its
Card Internals View.
3. Select the object and in the Zoom area, select the MS Src port.
4. On the menu bar, select Maintenance > Force BDI > Force.
5. To cancel the BDI, repeat Steps 1-3, and on the menu bar, select
Maintenance > Force BDI > Automatic.
Sending an REI
EMS-XDM enables you to force a Remote Error Indication (REI) to return the
number of BIP errors counted at the near-end to the remote side.
To send an REI:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Double-click the card containing the required interface point to open its
Card Internals View.
3. Select the required object.
4. On the menu bar, select Maintenance > Force REI > Force.
5. To cancel the REI, repeat Steps 1-3, and on the menu bar, select
Maintenance > Force REI > Automatic.
Sending an RAI
EMS-XDM enables you to force a Remote Alarm Indication (RAI) to signal an
alarm to the remote side when a defect is detected at the near-end object.
To send an RAI:
1. In the EMS-XDM main window, double-click an NE to open its Shelf
View.
2. Double-click the card containing the required interface point to open its
Card Internals View.
3. Select the required object in the Card Internals View.
4. On the menu bar, select Maintenance > Force RAI > Force.
5. To cancel the RAI, repeat Steps 1-3, and on the menu bar, select
Maintenance > Force RAI > Automatic.
Performing Maintenance on
Timing/TMU Objects
This section describes maintenance operations that can be performed on EMS-
XDM timing objects (TGs) and TMUs.
Operations include:
| Forcing the Timing Source
| Activating Timing Source Lockout
| Activating a Manual TMU Switch
| Activating a TMU Lockout
| Associating/Disassociating TMUs
On these shelves, left HLXC, HLXC384, HLXC768, and XIO cards have two
internal objects: TMU and TG.
Right HLXC, HLXC384, HLXC768, and XIO cards include only one object,
TMU.
On the XDM-100, XDM-200, and XDM-300 shelves, all maintenance
operations on timing objects are performed from the MXC-A unless otherwise
noted.
2. On the menu bar, select Maintenance > TG Force Switch > Activate, and
from the submenu, choose a timing source. (The submenu lists the available
timing sources selected in the NE priority table.) In the Timing
Configuration window, the TMU Info fields display the newly activated
timing source.
3. To release the force switch and return to automatic selection based on
priorities and quality, in the Card Internals View, on the menu bar, select
Maintenance > TG Force Switch > Release.
Associating/Disassociating TMUs
EMS-XDM enables you to associate or disassociate the TMUs for lockout.
To disassociate TMUs:
1. In the Shelf View, open the right HLXC, HLXC384, HLXC768, XIO, or
MXC card, and in the Card Internals View, click the TMU object.
2. On the menu bar, select Maintenance > TMU Lockout > Activate.
3. On the menu bar, select Configuration > Disassociate TMUs.
To associate TMUs:
1. Open the right HLXC, HLXC384, HLXC768, XIO, or MXC card, and
click TMU.
2. If the TMU is locked out, to release the lockout, on the menu bar select
Maintenance > TMU Lockout > Release.
3. On the menu bar, select Configuration > Associate TMUs.
Overview
This section describes some of the EMS-XDM features that are not accessed
from the main menu, but via the CDE panel and CDE main menu.
| Using the CDE Panel
| Using the CDE Main Menu
| Using the EMS-XDM Main Menu
| Implementing Daylight Saving Time Support
| Using an Uninterruptible Power Supply
You can toggle the view of the CDE panel to hide or display. By default, the
CDE panel is displayed.
| To hide the CDE, drag the EMS-XDM main window until the UNIX
desktop becomes visible, and then click the UNIX desktop.
| To display the CDE main window, click the UNIX desktop.
The icons that appear above the icons on the CDE panel indicate available
shortcut menus from which you can select menu options.
The following table describes the CDE icons and their associated functions.
Sets date.
Not in use.
Workspace selector.
Icon Function
Closes all open EMS applications such as EMS-XDM. If multiple
applications are currently running, a warning message prompts
confirming closure of these applications before exiting. If EMS-
XDM is running as a standalone application, it closes without a
warning prompt.
Click above this icon to select a system-defined printer as
default printer.
System-specific icon for selection of EMS-XDM functions,
including:
| NM Application: Brings EMS-XDM into view (if hidden).
| Set/Master/Monitor: Changes Master/Monitor
synchronization mechanism settings. Changes in these settings
are implemented in system only after EMS-XDM is restarted
or after a Change Mode operation.
| Set Route: Opens a UNIX window and activates Set Route
script for setting EMS-XDM IP routing data. Contact ECI
Telecom Network Solutions Division for further information
regarding this utility.
| Reset Printers: Stops and restarts printer daemon.
| Set Audio: Opens Audio Tool application used for recording
and playing *.AU format audio files. Can then use these files
as audible alarms.
Performs external storage device operations, including eject,
format, backup current config files, restore config files, store XC
ASCII file (DOS), store XC ASCII file (UNIX), and get XC ASCII
file.
Performance meter indicator shows live utilization of CPU and
hard disk.
Access online help topics.
2. In the Workspace area, select the workspace to which you want to assign
the window.
3. To assign the window to all workspaces, select the All Workspaces option.
4. Click OK to submit the changes.
Refreshing Windows
EMS-XDM enables you to refresh windows. If your current window becomes
corrupted for any reason, use either of the following options.
To refresh windows:
| On the CDE Main menu, select either:
Windows > Refresh Windows
OR
Windows > Restart Window Manager
You can now continue working with EMS-XDM.
Rearranging Windows
EMS-XDM enables you to rearrange the order in which you view windows.
To rearrange windows:
| Open the CDE Main menu, and select either:
Windows > Shuffle Up
OR
Windows > Shuffle Down
Start XDM EMS Starts EMS-XDM application and all its processes.
Stop XDM EMS Closes EMS-XDM application.
Start PM XDM Starts presentation module by opening EMS-XDM main
window.
Configure XDM Opens EMS-XDM Parameters window, where you can
EMS configure EMS-XDM start-up parameters.
2. Log in as root by typing su in the UNIX window, and run the SetTZ script.
The list of all time files appears, and you are prompted to type the name of
the file you want to use. This can be one of the files already present or the
one you created by using the zic command.
3. At the end of the SetTZ script, you are asked to reboot. To reboot, close the
UNIX window, exit EMS-XDM, log in as root, and reboot the station. The
time file of the station is now set to the one you selected. You may replace
or recompile it (using zic) at any time. There is no need to reboot the
station each time you change the file.
Overview
This section discusses how to upgrade XDM NE software.
Updating a Selected NE
EMS-XDM enables you to update the software for a specific NE.
Overview
This section discusses the EMS-XDM alarm export via FTP functionality,
which enables customer applications to receive XDM alarms via a connection
implemented using DCN (64 Kbps minimum).
Each alarm record consists of one line with the following attributes:
Time [1 space]dd/mm/yyyy hh:mm:ss
Severity [2 spaces][11 characters (left justified)]
Object [2 spaces][40 characters (left justified)]
Probable Cause [2 spaces][42 characters (left justified)]
where:
Usage Description Example
XXX Equipment or subequipment Type
YYY Slot number I1-I12, X1, X2
ZZ Object name VC-4, VC-12, TG, SPI, and so on
A Object number 1, 2, 3, 16, and so on
B Side E, W
Communication Specification
Information is transferred via an Ethernet communication channel, EMS-XDM
to the remote host (with appropriate receiving application).
A dedicated Ethernet port is required for this function. The Ethernet segment
used between the management station and the GNE should not be used for this
purpose.
FTP (file transfer) is used to transfer the information over standard TCP/IP.
The TCP/IP is relied upon for error correction and communication verification.
An FTP user without password must be defined in the remote host.
| X - Interval between two communication export actions: i.e., how often the
file via FTP should be transmitted (default = 2 minutes).
| IP - IP address of the remote host, with application for alarms import.
| Filename - Host file name.
The Export Current Alarms feature does not perform special congestion
handling, and all changes in Current Alarms status are reported as a single file
every N minutes.
Reported alarms are sorted as follows:
5. Unacknowledged vs. Acknowledged alarms
6. Alarm Severity
7. Alarm Type
Requirements
The following are requirements for exporting alarms via FTP:
| Dedicated Ethernet port in the management Sun station
| An FTP user without a password defined in the remote host
| Standard TCP/IP and FTP software included in the remote host
| Application to read and erase the file periodically to prevent full disk
conditions included in the remote side
| Understanding that feature might degrade system performance
Overview
This section explains how to use the SQL utility and presents the SQL tables
that can be used to access the EMS-XDM database.
Examples of SQL requests are installed on the EMS-XDM computer in the
directory /opt/XDM/sql.
2. The user name for activating the SQL application should be ems. Verify
the user by entering the id command at the UNIX prompt. For example:
25 ems(dallas) ~ > id
uid=103(ems) gid=100(tmn)
001 rsql:
6. After connecting to the database, use standard SQL syntax and/or Velocis
commands: (type ? at the rsql prompt for Help message) to retrieve the
necessary information.
7. SQL commands should end with the ; sign. They will not be executed until
the ; is entered, for instance:
002 rsql: select MainAddress from NetworkElement
+ 002 rsql:
+ 002 rsql: ;
MainAddress
192.9.80.9
003 rsql:
For example, to run the SQL utility with the SQL script file ttlsql and string
length of 600 characters, use the following command:
mySQL -w 600 ttlsql
The output files should be defined in the SQL script file ttlsql.
Identifiers
EMS-XDM SQL identifiers are used to name tables, columns, indexes, joins,
views, or stored procedures, as well as other items. An identifier is formed
using a combination of letters, digits, and the underscore character, always
beginning with a letter or underscore. It can be from 1 to 32 characters in
length. EMS-XDM SQL does not distinguish between upper and lower case
letters in an identifier. Thus, CUSTOMER, customer, and Customer all refer to
the same item.
Reserved Words
Reserved words are predefined identifiers that have special meaning in EMS-
XDM SQL. As with identifiers, SQL does not distinguish between upper and
lower case letters in reserved words. The following table lists the EMS-XDM
SQL reserved words. Some of the listed words are not described in this
document but have been retained for compatibility with other SQL systems.
Reserved words
Reserved words
abs convert first member real terminal
acos cos float min references text
activate cot floor minute repeat thousand
age count for mod repeatability through
aggregate create foreign mode replace thru
all curdate from month restrict tid
and currency function nosart revoke time
any current functions not right timeout
as curtime grant now rollback timestamp
asc database group null rowid title
ascending data having numeric rtrim to
ascii dayofmonth hour of run today
asin dayofweek if off scalar trans
atan dayofyear ifnull on schema transaction
atan2 db_addr in one second ucase
authorization deactivate index open select unicode
auto dec initialize opt_limit set unique
avg decimal insert opt_yield share unlock
begi default int option shared unsigned
between delete integer optional short update
binary desc into or sigh user
but descending is order sin user
by disable isolation output smallint values
byte display join owner some varbinary
c_data distinct key page sorted varbyte
calculate double last pagesize sqrt varchar
call drop lcase path statistics varying
Reserved words
cascade enable left pi stat view
ceiling end length precision stogroup wchart
char escape like primary struct wcharacter
character exclusive locate privileges substring week
check exec lock proc sum where
close execute log procedure sysdate wild
column exists long public table with
commands exp Itrim quarter tablespace work
commit file mark rand tan wvarchar
concat filter max read temporary year
Constants
An SQL constant is a number or string value used in a statement. The
following sections explain how to format the constants.
Numeric Constants
The numeric data types are smallint, integer, float, double, and decimal. Enter a
numeric constant as shown below.
[+|-]digits [digits]
For floating point constants (data type float), you can use an exponential format
as shown below:
[+|-]digits[.digits]E[+|-]ddd
String Constants
You can format and modify string constants.
date "YYYY-MM-DD
| @"[YY]YY-MM-DD
time_constant:
time "HH:MM[:SS[.ffff]]"
| @"HH:MM[:SS[.ffff]]"
timestamp_constant:
| @"YYYY-MM-DD[ HH:MM[:SS[/ffff]]]"
This format following the date, time, and timestamp keywords conforms to
the SQL2 standard.
In the format for date constants:
| YYYY is the year (you must specify all four digits).
| MM is the month number (1 to 12).
| DD is the day of the month (1-31).
| @ represents a nonstandard alternative.
The alternative format assumes the current century for a year consisting of only
two digits.
In the format for time constants:
| HH is hours (0-23).
| MM is minutes (0-59).
| SS is seconds.
| ffff is the fractional part of a second, with up to four decimal places of
accuracy.
If you specify more than four places, the value rounds to four places. Note
that the format for timestamp constants simply combines the formats for
date and time constants.
You can use three alternative date separator characters in declaring date, time,
and timestamp constants. In addition to the hyphen "-", SQL accepts slash "/"
and period ".".
The following are examples of the use of date, time, and timestamps constants:
insert into sales_order (ord_num, ord_date, amount)
System Constants
SQL defines three built-in literal constants, described in the following table.
The following examples illustrate the use of the literal system constants:
..a statement that could be executed from an extension module or
..stored procedure that is always executed when a connection is made.
insert into login_log(user_name, login_time)
values (user, now);
..check today's action items
select cust_id, note_text from action_items where
tickle_date = today;
Expressions
An SQL expression is anything that follows the keyword select or where in an
SQL statement. Regular expressions in the select statement are simply
expressions, unlike expressions in a where clause, which are relational and/or
conditional.
A relational expression compares other expressions that evaluate to TRUE or
FALSE. A conditional expression is a sequence of relational expressions
separated by the Boolean operators and and or. The conditional expression
also evaluates to TRUE or FALSE.
Arithmetic Expressions
In EMS-XDM SQL, arithmetic expressions specify arithmetic operations on
database values and constants. The operand of an expression can be a constant,
a column reference, a function, or an expression in parentheses. Use the syntax
below to form arithmetic expressions.
Arithmetic expressions
Syntax Expression
Arith_expr arith_operand[arith_operator arith_operand]…
arith_operand: constant | [table_name]column_name arith_function |
(arith_expr)
arith_operator: +|-|*|/
arith_function: {sum | avg | max | min} (arith_expr)
| count ({*|[table_name.]column_name})
| if (cond_expr, arith_expr)
| numeric_function | datetime_function |system_function
| user_defined_function
SQL uses the standard arithmetic operators shown in the following table. The
EMS-XDM SQL support module evaluates arithmetic expressions using the
precedence of the operators shown in the table.
The examples below illustrate the use of the SQL arithmetic operators in
arithmetic expressions.
sum(on_hand.quantity * cost)
String Expressions
An SQL string expression operates on string constants, columns of type
varchar, char, or wvarchar, and string functions. The only valid operator is the
caret (^), which concatenates the operand strings. Use the syntax below for
forming string expressions.
String expressions
Syntax Expression
string_expr
string_operand [^string_operand]
string_operand:
"string" | [table_name.]column_name
| if (cond_expr, string_expr, string_expr
| String_function
| user_defined_function
As for arithmetic expressions, you might need to qualify the column name with
a table or correlation by using the table name as a prefix (for example,
item.prod_id). If more than one column in the resultant table has the same
name, always qualify the column name with the table or correlation name.
Conditional Expressions
SQL conditional expressions are used in the where and having clauses of the
select statement and in the if conditional selection function. The rows reported
for a select statement are the rows that contain conditional expressions that
evaluate the TRUE. The block below shows the syntax to form conditional
expressions.
Conditional expressions
Syntax Expression
cond_expr
rel_expr[bool_oper rel_expr…
rel_expr:
expression [not] rel_oper
{expression | [any | some | all](subquery)
expression [any |some } | all] (subquery)}
| expression [not]between constant and constant
| expression [not] in {(constant [,constant]…) |(subquery)
| [table_name.]column_name is [not] null
| string_expr [not] like "string"
| not rel_expr
| (cond_expr)
| [not] exists subquery)
| [table_name.]column_name*= [table_name.]column_name
| [table_name.]column_name=*[table_name.]column_name
subquery:
select {* | expression} from {table_list | path_spec}
[where cond_expr}
rel_oper:
= | == (equal)
| < (less than)
| > (greater than)
| <= (less than or equal)
Syntax Expression
| >= (greater than or equal)
| < > |!= |/= (not equal)
bool_oper
& |&& | and (true if both operands are true)
| " |" ||" | or (true if one or both operands are true)
String Functions
EMS-XDM SQL supports several string functions, listed in the following table.
String functions
Function Description
ascii Retrieves numeric ASCII value
char Retrieves specified character
Concat Concatenates two strings
insert Inserts string
Function Description
lcase Converts string to lower case
left Retrieves leftmost characters from string
length Retrieves length of string
locate Finds one string located in another string
ltrim Removes all leading spaces from string
repeat Repeats string
replace Replaces one string with another
right Retrieves rightmost characters from string
rtrim Removes all trailing spaces from string
substring Retrieves substring
ucase Converts string to upper case
unicode Retrieves numeric Unicode value
Wchar Retrieves specific Unicode character
Numeric Functions
The following table lists the numeric functions callable from SQL.
Numeric functions
Function Description
abs Retrieves absolute value of arithmetic expression
acos Retrieves arccosine of arithmetic expression
asin Retrieves arcsine of arithmetic expression
atan Retrieves arctangent of arithmetic expression
atan2 Retrieves arctangent of x and y coordinates
ceiling Retrieves upper bound (ceiling) for arithmetic expression
cos Retrieves cosine of arithmetic expression
cot Retrieves cotangent of arithmetic expression
exp Retrieves value of exponential function using arithmetic
expression
floor Retrieves lower bound (floor) for arithmetic expression
log Retrieves natural logarithm of arithmetic expression
mod Performs modulo arithmetic operation
pi Retrieves value of pi
rand Retrieves random floating-point number
sign Retrieves sign of arithmetic expression
Function Description
sin Retrieves sine of arithmetic expression
sqrt Retrieves square root of arithmetic expression
To manipulate dates and times, the EMS-XDM SQL application can call the
scalar functions listed in the following table.
Date/time functions
Function Description
curdate Retrieves current date
curtime Retrieves current server time
dayofmonth Retrieves day of month
dayofweek Retrieves day of week
dayofyear Retrieves day of year
hour Retrieves hour
minute Retrieves minute
Month Retrieves month
now Retrieves current date and timestamp
quarter Retrieves calendar quarter
second Retrieves second
week Retrieves number of week in year
year Retrieves year
System Functions
The following table lists the system functions the EMS-XDM SQL application
can call to make general system adjustments and requests.
System functions
Function Description
c_data Extracts element of c_data column
convert Converts expression to data type or character string
database Retrieves name of database
ifnull Retrieves expression returned if another expression is null
Aggregate functions
Function Description
avg Computes average of results for all rows of aggregate
count Counts all rows of aggregate
max Computes maximum of results for all rows of aggregate
min Computes minimum of results for all rows of aggregate
Sum Computes sum of results for rows of aggregate
Subquery Mechanism
An SQL subquery allows restriction of where clause results based on the
evaluated result of nested select statement. You can specify subqueries
according to the syntax options shown below.
expr rel_oper (select expr from …)
or
or
or
A subquery of the first type can only return a single value. For example, the
following query retrieves all sales orders for which the total amount of the
order is greater than the average. Here, the subquery retrieves only the single
value.
Select * from sales_order
where amount> (select avg (amount) from sales_order;
A subquery of the second type can retrieve multiple rows. The subquery uses a
quantifier (any or all) to determine whether the relational operation applies to
all rows or to any (at least 1) row from the result set. For example, the query
shown below returns all sales order by salesperson, for orders larger than all
orders booked by salespersons managed by SSW.
select sale_name, ord_num, ord_date, amount
from salesperson, customer, sales_order
sales_order so
mgr_id = "SSW");
A subquery of the third type shown in the syntax block is simply a different
representation of the type 2 subquery. Therefore, "expr in (select…) is the same
as "expr<>all (select….)".
A subquery of the fourth type shown in the syntax block does not retrieve any
rows, it simply returns TRUE if the subquery finds at least one row, or FALSE
if no rows are found. For example, assuming the sale_id column in the
customer table is an undeclared foreign key to the salesperson table, the update
statement uses a subquery to ensure the referenced salesperson does exist.
update customer set sale_id = "CMB"
where cust_id = "SEA" and
exists (select * from salesperson where sale_id = "CMB");
Subqueries themselves can contain subqueries. SQL does not impose any
arbitrary limits on nesting levels.
Sometimes, a subquery needs to refer to a column from an outer query. Such a
column reference is called an "outer reference", and a subquery that contains it
is called a "correlated subquery". The following example shows orders by
salesperson that are larger than all orders booked by nonmanager salespersons.
select sale_name, mgr_id, ord_num, ord_date, amount
from salesperson sp1, customer c1, sales_order so1
where sp1.sale_id= c1.sale_id and c1.cust_id = so1.cust_id and
sp1.mgr_id is not null
amount > all
(select amount from salesperson sp2, customer c2,
sales_order so2
where sp1.mgr_id ! = sp2.mgr_id and
sp2.sale_id = c2.sale_id and c2.cust_id = SO2.cust_id);
The query example above requires the exclusion from the subquery of rows
from the inner query that have the same manager as those of the outer query.
To provide the exclusion, a correlation name (for example, sp1 and sp2) must
be supplied for each separate salesperson table reference to distinguish
between the inner and the outer salesperson tables.
NEs
Network elements
Field Value Comments
InstanceId word integer[2] Primary key
NetworkElementId word integer
SystemTitle char[32] Label on the icon is the first
eight characters
SystemLocation char[64] System location in NE attributes
Comment char[128] Comment field in NE attributes
NENetAddress char[20] IP address in dot notation
NetworkElementType word enum type See XDM Tables
AvailabilityStatus word enum type See XDM Tables
OperationalState word See XDM Tables
FaultStabilization Time word msec
FaultClearStabilizationTime word msec
HoldoffTimeDefault word msec
VendorName char[32] Backplane vendor
SerialNumberHigh word Backplane serial number
SerialNumberLow word
NE Groups
Element group
Field Value Comments
InstanceId word integer[2] Primary key
SystemTitle char[32] Label on icon is first eight characters
Timing Generator
Timing generator
Field Value Comments
The following attributes display timing attribute definitions for different kinds of
timing sources. To find the relevant set of attributes, do the following:
In the timing source type list, select the relevant timing source. The timing source
determines the index to be used for searching parameters in other attribute lists.
Use the index to select the relevant occurrences from other attribute lists.
To activate the timing source, select the active timing source value in the timing
source type list in the index
(InstanceId)
Connection Fabric
Connection fabric
Field Value Comments
InstanceId word integer[2] Primary key
References:
Foreign key (NeAppId) references NetworkElement(InstanceId)
XC Objects
XC object
Field Value Comments
CrossConnectionId word integer XC ID (not shown on the EMS
screens)
NMXCDataBuffer word integer[8] Specific information about XC
objects, Usage State, and Path
Protection
The first and second Path Protection list entries are enumerators (see XDM Tables).
XC objects (additional)
Field Value Comments
NameDepth11 word integer Contains the ID DN of an object
NamePath11 word integer[10] included in the XC's To list.
FromTPListDN2Depth FromTPListD
Foreign key (ConnectionFabricAppId) references
ConnectionFabric(InstanceId);
Foreign key (XCSetAppId) references
XCSet(InstanceId) of the second object included in the
XC's From list.N2Paths
References:
Foreign key (ConnectionFabricAppId) references ConnectionFabric(InstanceId);
foreign key (XCSetAppId) references XCSet(InstanceId)word integer
word integer[10]
XDM Tables
XDM tables include:
| NE Types
| Availability Status
| Operational State
| Matrix Configuration Codes
| Timing Source Quality
| Expected Equipment Types
| Wide Card Attribute
| Usage State
| Administrative State
| T4 Output
| Actual Equipment Types
| Timing Source
| XC Set Bitrate
| XC Set Order
| XC Set Protection Level
| Path Type Values
| Class Code Values
| Timing Source Priority Values
| Timing Source Status Values
| XDM Instanciation Equipment Table
NE Types
NE type NE type
enumerator
value
1 XDM-1000
2 XDM-500
3 XDM-S-1000
4 XDM-S-500
5 XDM-2000
6 XDM-S-2000
7 XDM-1000X2
8 XDM-500X4
9 XDM-S-1000X2
10 XDM-S-500X4
11 XDM-400
12 XDM-S-400
13 XDM-100
14 XDM-100U
15 XDM-200
16 XDM-50
17 XDM-100S
18 XDM-100SU
19 XDM-200S
20 XDM-40
NE type NE type
enumerator
value
21 XDM-S-40
Availability Status
Availability Availability status
status
enumerator
value
0 Unavailable
1 Available
Operational State
Operational Operational state
state
enumerator
value
0 Disabled
1 Enabled
1 PRC
2 SSUT
3 SSUL
4 SEC
5 DNU
Usage State
Usage state Usage state
enumerator
value
0 Idle
1 Active
2 Busy
Other Unknown
Administrative State
Administrative Administrative state
state
enumerator
value
0 Available
1 In Test
2 Failed
3 Power Off
4 Offline
5 Off Duty
6 Dependency
7 Degraded
T4 Output
<T4> output <T4> output
enumerator
value
0 OFF
1 2 Mbps-F
2 2 MHz
3 2 Mbps
Timing Source
Number Priority timing source
0 <T3>-1
1 <T3>-2
2 I/O Line-1
3 I/O Line-2
4 I/O Line-3
5 I/O Line-4
6 Internal
7 Holdover
8 Line
9 Other TG
XC Set Bitrate
XC set bitrate XC set bitrate
enumerator
value
0 2M
1 64K
2 34M
3 45M
4 VC-3
5 6M
6 DCC
7 DCC EXT
8 VC-4
9 2xVC-4
10 3xVC-4
11 4xVC-4
12 5xVC-4
13 6xVC-4
14 7xVC-4
15 16xVC-4
16 VC-3
17 OCH
18 NxVC-4
XC Set Order
XC set order XC set order
enumerator
value
0 LO
1 HO
2 SOH
3 OCH
304 OPTIC APPL
XDM-1000, XDM-S-1000
19 F2
20 F3
3 X1
16 X2
43 PW1
44 PW2
1 C1
2 C2
17 C3
129 COM
130 COM
131 X1
144 X2
Other instances Internal
XDM-500X4, XDM-S-500X4
4 IC2
5 IC3
6 IC4
7 IC5
8 IC1
9 IC6
21 MC2
27 MC3
29 MC1
31 MC4
18 F1
19 F2
20 F3
3 X1
16 X2
43 PW1
44 PW2
1 C1
2 C2
17 C3
XDM-1000, XDM-S-1000
129 COM
130 COM
131 X1
Other instances Internal
XDM-400, XDM-S-400
4 IS2
5 IS3
7 IS4
8 IS1
9 IS5
21 MC2
29 MC1
18 F1
3 X1
16 X2
43 PW1
44 PW2
1 C1
2 C2
17 C3
129 COM
130 COM
131 X1
Other instances Internal
XDM-100, XDM-100U, XDM-200
XDM-1000, XDM-S-1000
20 M2
147 M1-1
275 M1-2
403 M1-3
531 M1-4
659 M1-5
148 M2-1
276 M2-2
404 M2-3
532 M2-4
660 M2-5
131 A
144 B
387 A
Other instances Internal
Create View
SQL statement Description
Create View Create a view (DML statement).
Syntax create view view_name ["description"]
(view_column_list)]
as select_stmt [with check option]
view_column_list:
column_name[, column_name]…
Statement Elements View_name, specifies name of view to be created.
Description Optionally specifies view
description.
View_column_list Optionally specifies
columns to include in
view. If you do not
specify a list, view
columns are same as
columns specified in
select statement.
as select_stut Defines create view
statement to be based on a
select statement.
with check option Optionally specifies that
any insert or update
statements referencing
view must satisfy where
condition of defining
select statement.
The following example shows a view of the customer table showing salespersons
who only service customers on the west coast.
create view pacific as
select * from customer where state in ("CA", "OR", "WA")
with check option;
Open
SQL statement Description
Open Open database(s) (DML statement).
Syntax Open dbname [, dbname]…
[[as] {shared ?temporary ?exclusive [with
transaction off]]
Statement Elements Dbname Specifies name of database to
open.
as Optionally defines mode of
database as shared, temporary,
or exclusive.
shared Specifies that database is to be
opened in shared mode
(default). Shared mode allows
multiple users to access
database.
temporary Specifies that database is to be
opened as temporary database
that is initially empty. All data
subsequently inserted in
database is private, visible
only to one user connection.
Execution of close statement
for database discards data.
select
SQL statement Description
group by:
[group by col_ref[,col_ref]…[having
cond_expr]]
order by:
[order by col_ref [asc ?desc][,col_ref
[asc ?desc]]…
col_ref:
number ?[tabname.]colname
table_list:
tabname [correlation_name][,tabname
[correlation_name]]…
Example:
select company, ord__numm, ord_date, amount, tax,
amount+tax, total
from customer. sales_order
where customer.cast_id = sales_order.cust_id:
set currency
SQL statement Description
set currency Set currency constant format (DML statement).
Syntax set currency to "char"
2. "YYYY-MM-DD"
(system default, conforms to
SQL2/OODBC specification)
3. "DD-MM-YYYY"
set decimal
SQL statement Description
set decimal Set default decimal symbol (DML statement).
Syntax set decimal to "char".
Statement Elements to char Specifies new value for decimal symbol.
System default is a period (.).
Description This statement sets default decimal symbol to specified
character value. This symbol is used by convert.
Can assign specified decimal symbol for use until it is
changed using another set decimal statement, or until
disconnection from server. Only system administrator can
permanently configure decimal symbol by entering
"escSymb=char" (without quotation marks) in the [SQL]]
section of velocis.ini.
See Also convert.
Example
set decimal to ",";
set thousands to "."
select ord_date, convert (amount, char, 12, "#.##") amount
from sales_order;
set display
SQL statement Description
set display Set default character display format (DML statement).
Syntax set type display(width, "format")
type:
char ? wchar ? smallint ? integer ? real ? float
? decimal ?
date ? time ? timestamp
type
width
format Specifies the character display format.
type Specifies one of data types listed in syntax
box above.
width Specifies width of character display.
format Specifies the character display format.
Description This statement sets default character display format for
specified data type. This format applies to result sets
displayed after execution of a select statement. Can assign
specified format for use until it is changed by another set
display statement, or until disconnection from server. It
cannot be changed system-wide and permanently, but a
login procedure can be used to same effect.
set opt_limit
SQL statement Description
set opt_limit Set to improve threshold for SQL query optimizer (DML
statement).
Syntax set opt_limit to constant
to constant Defines a value to set for failure to improve
threshold. A value of 0 disables failure to
improve check so that SQL query optimizer
always runs to completion, checking all possible
access plans. System default is 0.
Description This statement sets failure-to-improve threshold of SQL query
optimizer to specified value for current session. Only an
administrator user can issue statement. System default can be
changed by entering "OPTLimit=constant" (without quotation
marks) in [SQL] section of velocis.ini.
Failure-to-improve threshold limit is included in SQL query
optimizer algorithm. It is based on number of access plan step
iterations. When algorithm fails to generate a better access plan
within specified number of iterations, optimizer stops and uses
best plan found up to that point. Number of iterations that
algorithm processes depends on number of tables being
accessed and number of usable access methods that can be
chosen.
Reducing this value results in faster optimization of complex
queries but at risk of generating a somewhat less than optimal
access plan. Increasing (or disabling) this value increases
likelihood of producing best access plan.
Time required to optimize a query grows exponentially with
number of tables specified in form clause of select statement.
Time is negligible for up to about eight to ten tables. For ten or
more tables, time required to optimize can become quite
noticeable.
See Also set opt_yield
set wild
SQL statement Description
set wild Set wildcard pattern matching character (DML statement).
Syntax set wild {all ? one} to "char"
Statement Elements all Specifies pattern matching for zero, one or
many characters.
one Specifies pattern matching for a single
character.
to char Specifies a new value of data type character.
This value defaults to "%" for an all clause. It
defaults to "_" for a one clause.
Description This statement changes wildcard pattern matching
character used in like clause, for example, in a select
statement. New wildcard pattern matching character is
valid only for application issuing set wild statement and
remains in effect until disconnection from server. To
permanently change system default wildcard pattern
matching character, a system administrator can enter
following in [SQL] section of velocis.ini.
Wildall=char and Wildone=char
See Also select, conditional expressions
Example:
set wild one to "?";
set wild all to "*";
| left
| length
| locate
| ltrim
| max
| min
| mod
| month
| now
| quarter
| rand
| repeat
| replace
| right
| rtrim
| s_dbaddr
| s_rowid
| second
| sign
| substring
| sum
| ucase
| user
| week
| year
abs
SQL function Description
abs Retrieve absolute value.
Syntax abs(arit_expr)
Parameters arit_expr Specifies arithmetic expression.
Description This scalar numeric function retrieves absolute value of
specified arithmetic expression.
ascii
SQL function Description
ascii Retrieve numeric ASCII value.
Syntax ascii(strexp)
Parameters strexp Specifies string expression.
Description This scalar string function retrieves ASCII numeric value of
initial character in specified expression (strexp).
avg
SQL function Description
avg Compute average of results for aggregate rows.
Syntax avg(arit_expr)
Parameters arit_expr Specifies arithmetic expression.
Description This aggregate (calculation) function computes average of
results of specified expression for all rows of aggregate.
c_data
SQL function Description
c_data Extract element of c_data column.
Syntax c_data(col[,dims] [,elt[,dims]]))
Parameters col Specifies c_data column from which to
extract data.
dims If col is array, or elt is array, dims
specifies element of array.
elt If col is structure, elt specifies structure
element to retrieve.
Description This system function extracts element of c_data column.
This function is SQL scalar function called from select
statement. SQL application can qualify name specified for
col parameter with table or correlation name (for example,
cd1.cd1_t03).
If c_data column being accessed is array, name specified by
col must include appropriate number of subscript, specified
in normal C-language notation. Subscript can be any
expression that retrieves smallint value (parameter marks are
allowed). If c_data column is structure, application must
specify value for elt parameter.
ceiling
SQL function Description
ceiling Find upper bound for expression.
Syntax ceiling(arit_expr)
Parameters arit_expr Specifies arithmetic expression.
Description This scalar numeric function retrieves upper bound (ceiling)
for specified arithmetic expression. Ceiling is smallest
integer greater than or equal to expression.
char
SQL function Description
char Retrieve specified character.
Syntax char(num)
Parameters num Specifies ASCII code value between 0
and 255.
Description This scalar string function retrieves character with ASCII
concat
SQL function Description
concat Concatenate two strings.
Syntax concat(strexp1, strexp2)
Parameters strexp1 Specifies string to which function
concatenates second string (strexp2).
strexp2 Specifies string to be concatenated.
Description This scalar string function concatenates one string (strexp2)
to another (strexp1). Operation is same as using ^ operator.
convert
SQL function Description
convert Convert expression.
Syntax convert(expr, type)
or
convert(expr, char, width, "fint")
Parameters expr Specifies expression to convert.
type Specifies data type. Possible types include:
| char
| wchar
| smallint
| integer
| real
| float
| decimal
| date
| time
| timestamp
char Specifies character string into which
function converts expression.
width Specifies width in bytes of character string
(char).
date_code:
m?mm?mmm?mon?mmmm?month?d?dd?ddd?dddd?day
time_code:
h[h][m[m][s[s][.f]f]...]]][a/p?am/pm?A/P?AM/PM]
where
<< Specifies optional justifier code indicating
left-justified text in specified display width.
Default for date/time values.
>> Specifies optional justifier code indicating
right justification. Default for numeric
values.
>< Specifies optional justifier code indicating
centered text.
' Specifies single quotation mark used before
and after optional text string (text).
spec.char Specifies special character (for example, "-"
or "/" or ".") that can optionally be used to
describe date or time value.
count
SQL function Description
count Count rows of aggregate.
Syntax count({* | column_name})
Parameters * Specifies all columns of result set.
column_name Specifies column name.
Description This aggregate (calculation) function counts all rows of
aggregate result set.
Example:
select company, count(ord_num) from customer, sales_order
where ccustomer.cust_id = sales_order.cust_idd group by 1
Bears Market 5
Trends,Inc.
Bengels Imports 5
Broncos Air 7
Express
Brown Kennels 7
Bucs Data 4
Services
Cardinals 5
Bookmakers
Charges Credit 3
Crop.
Chiefs 5
Management
Corporation
Cowboys Data 3
Services
Eagles 5
Electronics
Corp.
Falcons 3
Microsystems
Inc.
Forty-Niners 3
Venture Group
Giants Garments, 2
Inc.
Jets Overnight 4
Express
Lions Motor 5
Company
Packers Van 4
Lines
Patriots 6
Computer Corp.
Raiders 4
Development Co.
Rams Data 8
Processing, Inc.
Redskins Outdoor 4
Supply Co.
Saints Software 3
Support
Seahawks Data 6
Services
Steelers 2
National Bank
Vikings Athletic 6
Equipment
curdate
SQL function Description
curdate Retrieve current date.
curtime
SQL function Description
curtime Retrieve current time.
Syntax curtime ( )
Parameters None
Description This scalar date/time function retrieves current local (server)
time.
See Also curdate, now
database
SQL function Description
database Retrieve name of database.
Syntax database ( )
Parameters None
Description This system function retrieves string containing name(s) of
database(s) open for current session. If more than one
database is open, names are separated by commas with no
intervening spaces (for example, "sales,inventory,syscat").
dayofmonth
SQL function Description
dayofmonth Retrieve day of month.
Syntax dayofmonth(date_expr)
Parameters data_expr Specifies date expression.
Description This scalar date/time function retrieves day of month in
specified date expression as number between 1 and 31.
dayofweek
SQL function Description
dayofweek Retrieve day of week.
Syntax dayofweek(date_expr)
Parameters date_expr Specifies date expression.
Description This scalar date/time function retrieves day of week in
specified date expression as number between 1 and 7, where
1 is Sunday.
dayofyear
SQL function Description
dayofyear Retrieve day of year.
Syntax dayofyear(date_expr)
Parameters data_expr Specifies data expression.
Description This scalar date/time function retrieves day of year in
specified date expression as number between 1 and 366.
floor
SQL function Description
floor Find lower bound for arithmetic expression.
Syntax floor(arit_expr)
Parameters arit_expr Specifies arithmetic expression.
Description This scalar numeric function retrieves lower bound (floor)
for specified arithmetic expression. Floor is largest integer
less than or equal to expression.
hour
SQL function Description
hour Retrieve hour.
Syntax hour(time_expr)
Parameters time_expr Specifies expression representing either
time or timestamp value.
Description This scalar date/time function retrieves hour in specified
time expression as number between 0 and 23.
if
SQL function Description
if Implement conditional selection.
Syntax if(cond_expr, expression1, expression2)
Parameters cond_expr Specifies conditional expression.
expression1 Specifies value retrieved if conditional
expression evaluates to TRUE.
expression2 Specifies value retrieved if conditional
expression evaluates to FALSE.
Description This function evaluates an expression. Evaluation is based
on specified condition (cond_expr) for each row in result set
retrieved by select statement. If conditional expression
evaluates to TRUE, the if function evaluates and retrieves
value of first expression (expression1). If conditional
expression evaluates to FALSE, function evaluates and
returns value of second expression (expression2). Both
expressions must return values of identical data types.
Example:
select quantity, prod_id, prod_desc,
if (quantity>20, .8*price, if (quantity>5, 9*price,
price)) "PRICE"
from item, product where item.prod_id = product.prod_id;
update sales_order
set tax = if (state="WA", amount*0.o85, if(state="CO",
amount*0.062,0.0))
where state in ("CA", "WA");
select
sum (if(prodd_id=110320, quantity, o)) "386/20"
sum (if(prodd_id=110333, quantity, o)) "386/33
sum (if(prodd_id=110433, quantity, o)) "486/33"
sum (if(prodd_id=110450, quantity, o)) "486/50
ifnull
SQL function Description
ifnull Retrieve expression if another expression is null.
Syntax ifnull(expr1, expr2)
Parameters expr1 Specifies expression being evaluated.
expr2 Specifies alternative expression.
Description This system function retrieves specified expression (expr1)
if it is not null. If expr1 is null, ifnull function retrieves
second expression (expr2). Two expressions must be of
compatible data types.
insert
SQL function Description
insert Insert string.
Syntax insert(strexp1, num1,num2,strexp2)
Parameters strexp1 Specifies string in which to
insert another string.
num1 Specifies beginning position of
area for insertion. First position
is 1, not 0.
num2 Specifies characters to replace
in strexp1.
strexp2 Specifies string to replace for
characters indicated by num2.
Description This scalar string function retrieves string that results from
replacing characters (num2) in string (strexp1) beginning at
position num1 insert function replaces indicated characters with
specified string (strexp2). strexp1 and strexp2 parameters can be
either ASCII or Unicode strings. If one of them is Unicode, other
one is implicitly converted into Unicode before insertion and
function returns Unicode string.
Example: Function Result
insert("Wayne", 2,1, "Bill") "WBillyne"
insert(L"Wayne",1,4, "Bob") L"Bobe"
insert("Wayne",1,8,L"Bill") L"Bill"
lcase
SQL function Description
lcase Convert string to lower case.
Syntax lcase(strexp)
Parameters strexp Specifies string to convert.
Description This scalar string function converts specified string to lowercase.
Strexp parameter can be ASCII string or Unicode string. If strexp
is Unicode string, function returns a Unicode string.
left
SQL function Description
left Retrieve leftmost characters from string.
Syntax left(strexp, num)
Parameters strexp Specifies string.
num Specifies number of characters to retrieve.
Description This scalar string function retrieves specified number (num) of
characters from leftmost part of string indicated by strexp.
Strexp parameter can be ASCII string or Unicode string. If
strexp is Unicode string, function returns Unicode string.
length
SQL function Description
length Retrieve length of string.
Syntax length(strexp)
Parameters strexp Specifies string.
Description This scalar string function retrieves length in bytes of specified
string. Strexp parameter can be ASCII string or a Unicode
string. If strexp is Unicode string, function returns Unicode
string.
locate
SQL function Description
locate Find string.
Syntax length(strexp1, strexp2,num)
Parameters strexp1 Specifies string to locate.
strexp2 Specifies string in which other string is located.
ltrim
SQL function Description
ltrim Remove leading spaces from string.
Syntax ltrim(strexp)
Parameters strexp Specifies string.
Description This scalar string function removes all leading spaces from
specified string (strexp). Strexp parameter can be ASCII
string or Unicode string. If strexp is Unicode string, function
returns Unicode string.
max
SQL function Description
max Compute maximum of results for aggregate.
Syntax max(expression)
Parameters expression Specifies expression used in select
statement.
Description This aggregate (calculation) function computes maximum of
results of specified expression for all rows of aggregate
result set.
min
SQL function Description
min Compute minimum of results for aggregate.
Syntax min(expression)
Parameters expression Specifies expression used in select
statement.
Description This aggregate (calculation) function computes minimum of
results of specified expression for all rows of aggregate
result set.
mod
SQL function Description
mod Perform modulo arithmetic operation.
Syntax mod(arith_expr1,arit_expr2)
Parameters arith_expr1 Specifies expression being divided.
arit_expr2 Specifies expression used as divisor.
Description This scalar numeric function performs modulo arithmetic
operation of form arith_expr1 modulo arit_expr2. Function
retrieves remainder resulting from dividing arith_expr1 by
arit_expr2.
month
SQL function Description
month Retrieve month.
Syntax month(date_expr)
Parameters date_expr Specifies date expression.
Description This scalar date/time function retrieves number of month in
specified date expression as number between 1 and 12.
now
SQL function Description
now Retrieve current timestamp.
Syntax now ( )
Parameters None
Description This scalar date/time function retrieves timestamp value for
current date and time.
See Also curdate, curtime
quarter
SQL function Description
quarter Retrieve quarter.
Syntax quarter(date_expr)
Parameters date_expr Specifies date expression.
Description This scalar date/time function retrieves number of quarter in
specified date expression as number between 1 and 4.
rand
SQL function Description
rand Retrieve random floating-point number.
Syntax rand(num)
Parameters num Specifies date expression.
Description This scalar numeric function retrieves random floating-point
number (between 0.0 and 1.0) using specified integer as
seed. If num is 0, rand function retrieves next random
floating-point number for current seed.
repeat
SQL function Description
repeat Repeat string.
Syntax repeat(strexp, num)
Parameters strexp Specifies string expression to repeat.
num Specifies number of repetitions for
string.
Description This scalar string function concatenates specified expression
to itself (num-1) times.
replace
SQL function Description
replace Replace string.
Syntax replace(strexp1,strexp2,strexp3)
Parameters strexp1 Specifies string in which to make
replacement.
strexp2 Specifies string to replace.
strexp3 Specifies replacement string.
Description This scalar string function replaces all occurrences of
strexp2 in strexp1 with strexp3. If function does not find any
occurrences of strexp2, it retrieves strexp1. Both strexp1 and
strexp2 can be ASCII or Unicode strings. If one is Unicode,
other is implicitly converted into Unicode before
replacement and function returns Unicode string.
right
SQL function Description
right Retrieve rightmost characters from string.
Syntax right(strexp,num)
Parameters strexp Specifies string.
num Specifies number of characters to
retrieve.
Description This scalar string function retrieves specified number (num)
of characters from rightmost part of string indicated by
strexp. Strexp parameter can be ASCII string or Unicode
string. If strexp is Unicode string, function returns Unicode
string.
rtrim
SQL function Description
rtrim Remove trailing spaces from string.
Syntax rtrim(strexp)
Parameters strexp Specifies string.
Description Scalar string function removes all trailing spaces from
specified string (strexp). Strexp parameter can be ASCII
string or Unicode string. If strexp is Unicode string, function
returns Unicode string.
s_dbaddr
SQL function Description
s_dbaddr Retrieve current database address.
Syntax s_dbaddr('tablename')
Parameters tablename Specifies table in which to find
database address.
Description This system function retrieves current database address for
specified table. Tablename parameter specified here must
also be specified in form clause of select statement in
which this function is used.
Example:
select s_dbaddr ('syscolumn'), col_addr, name from
syscolumn;
s_rowid
SQL function Description
s_rowid Retrieve current rowid.
Syntax s_rowid('tablename')
Parameters tablename Specifies table for which to find
rowid.
Description This system function retrieves current rowid for specified
table. Tablename parameter specified here must also be
specified in form clause of select statement in which this
function is used.
Example:
select s_rowid(wsyscolumns'), col_addr,, name from
syscolumn;
second
SQL function Description
second Retrieve second.
Syntax second(time_expr)
Parameters time_expr Specifies expression that is either time
or timestamp value.
Description This scalar date/time function returns second in specified
time expression as number between 0 and 59.
sign
SQL function Description
sign Retrieve sign of arithmetic expression.
Syntax sign(arith_expr)
Parameters arith_expr Specifies arithmetic expression.
Description This scalar numeric function retrieves -1 if arith_expr is less
than 0, 0 if arith_expr equals 0, and 1 if arith_expr is greater
than 0.
substring
SQL function Description
substring Retrieve substring.
Syntax substring(strexp,num1,num2)
Parameters strexp Specifies string expression from which
to retrieve substring.
num1 Specifies character position at which
retrieval begins. Position of first
character is 1, not 0.
num2 Specifies length in bytes of substring to
retrieve.
Description This scalar string function retrieves substring of length num2
that begins at character position num1 of specified
expression. Strexp parameter can be ASCII string or
Unicode string. If strexp is Unicode string, function returns
Unicode string.
sum
SQL function Description
sum Compute sum of results for aggregate rows.
Syntax sum(arith_expr)
Parameters arith_expr Specifies an arithmetic expression.
Description This aggregate (calculation) function computes sum of
results of specified expression for each row of aggregate
results set formed by select statement.
ucase
SQL function Description
ucase Convert string to upper case.
Syntax ucase(strexp)
Parameters strexp Specifies string to convert.
Description This scalar string function converts specified string to
uppercase. Strexp parameter can be ASCII string or Unicode
string. If strexp is Unicode string, function returns Unicode
string.
user
SQL function Description
user Retrieve user name.
Syntax user( )
Parameters None
Description This system function retrieves database user name as string.
week
SQL function Description
week Retrieve week.
Syntax week(date_expr)
Parameters date_expr Specifies date expression.
Description This scalar date/time function retrieves number of week of
year in specified date expression as number between 1 and
53.
year
SQL function Description
year Retrieve year.
Syntax year(date_expr)
Parameters date_expr Specifies date expression.
Description This scalar date/time function retrieves number of year in
specified date expression. Earliest year for SQL date is 1
A.D.
Overview
This section describes the EMS-XDM menu commands, their respective
functions, and relevant window in which they appear:
| Main window menus are listed with a checkmark ( ) in the M column.
| Shelf View menus are listed with a checkmark ( ) in the S column.
| Card Internals View menus are listed with a checkmark ( ) in the C
column.
For convenience, the following sections are divided per menu, listing related
menu options in alphabetical order.
| File Menu
| Alarm Menu
| Performance Menu
| Configuration Menu
| Connections Menu
| Maintenance Menu
| Security Menu
| System Menu
| Exit Menu
| Help Menu
File Menu
Menu command Function M S C
Close Closes current window
Close All NE Closes all windows related to selected NE
Related Windows
Close All Closes all open windows
Windows
Info Displays Info window for this and any related
objects
Info This Object Displays Info window for selected object
Only
MSP Info Displays MSP Info window
MS-SPRing Info Displays MS-SPRing Info window
NE Info Displays NE Info window
Open Opens selected object
Open Parent Opens parent window of selected object
Window
Panel Layout Displays physical panel of selected card
Alarm Menu
Menu command Function M S C
Alarm Log Shows Alarm Log containing all system alarms
since last deletion
Alarm Severity Defines severity level of each alarm for selected
object
Audio Alarm Turns the Audio Alarm on and off
Audio Alarm Determines who can turn Audio Alarm on and
Deactivation off
Current Alarms Displays current alarms for selected object
Equipment and Displays current equipment and TTP alarms
TTP Alarms
Export Alarm Copies log files from EMS-XDM to another
Log medium
External Alarm Enables defining external input and output
alarms
On Top Window Toggles to show or hide Alarm Log Status Bar
Reminder Turns Audio Alarm for unacknowledged alarms
on and off
Severity for Sets level for activating alarm severity buzzer to
Buzzer Critical, Major, Minor, or Warning
XC Alarm Displays alarms for XC objects only
Severity
Performance Menu
Menu command Function M S C
Collect Manually collects PM data
Equipment PM
Current Displays current PM data
History Displays historical PM data
Optical Displays PM information for optical objects
Parameters
PM Logs Displays PM log files
PM Propagate Init Propagates 15-minute or daily PM counters
Counters
PM Setup Enables configuration of PM parameters
Reset Counters Resets 15-minute or daily PM counters
Thresholds Enables configuration of PM thresholds
Configuration Menu
Menu command Function M S C
Connections Menu
Menu command Function M S C
Create Flow Creates new Ethernet Layer 2
Available for EIS cards only
Create Policer Creates new policer that monitors traffic on
Ethernet flows
Available for EIS cards only
Create/Edit XC Set Enables XC sets to be created or edited
Flow List Displays list of configured Ethernet flows
Available for EIS cards only
Flow Per Object Displays list of Ethernet flows related to
selected object
Available for EIS cards only
Policer List Displays list of configured policers
Available for EIS cards only
Policer Per Object Displays list of policers related to selected
object
Available for EIS cards only
XC Set List Displays list of configured XC sets updated in
real time
XC Set Per Object Displays list of XC sets related to selected
object
XCs per NE Generates list from database of configured XC
sets per NE
Maintenance Menu
Menu command Function M S C
Equipment Toggles between activating and releasing this
Protection Force type of protection lockout
Switch
Equipment Toggles between activating and releasing this
Protection Lockout type of protection lockout
Equipment Toggles between activating and releasing this
Protection Manual type of protection lockout
Switch
Force AIS Determines whether AIS is forced or sent
automatically in cases of AIS situation only
Force STS-AIS Determines whether STS-AIS is forced or sent
automatically in cases of STS-AIS situation
only
Force BDI Determines whether BDI is forced or sent
automatically in cases of BDI situation only
Available for TRP25_4 and combiner cards
only
Force RAI Determines whether RAI is forced or sent
automatically in cases of RAI situation only
Force REI Determines whether REI is forced or sent
automatically in cases of REI situation only
Force RDI Determines whether RDI is forced or sent
automatically in cases of RDI situation only
Force Switch Enables activating or releasing a forced switch
Inhibit Control Inhibits ASON Control Plane.
Plane
Lockout Enables activating or releasing a Main or
Protection lockout
Loopback Enables activating or releasing facility (far-
end) and terminal (near-end) loopbacks
Maintenance Info Displays maintenance operations per specific
NE
Manual Switch Enables activating or releasing a manual
switch
MSP Enables configuring MSP protection
MS-SPRing Enables configuring MS-SPRing protection
Reset Equipment Enables performing cold or warm card reset
xMCP Synchronize Synchronizes xMCP/MXC cards
Security Menu
Menu command Function M S C
Capabilities Shows group capabilities
Groups Adds/deletes/edits groups (see Managing User
Group Access)
Lock EMS-XDM Locks EMS-XDM until user logs in
Multi-Configurator Assigns configuration rights to user group
Password Changes user password
Release LCT-XDM Terminates an LCT-XDM session that ended
abnormally
Security Token Enables you to acquire or release security
token, or view status of token
Users Adds/deletes/edits users
Users List Shows list of other users currently working on
EMS-XDM system
System Menu
Menu command Function M S C
Action History Lists activity log in EMS-XDM station
Background Starts or stops background upload process
Upload
Bulletin Board Posts notices to system Bulletin Board
Change Mode The Master/Monitor mode feature is no longer
supported
Configuration File Saves current configuration to a file
EMS Preference Enables configuration of EMS-XDM startup
options
Icons Setup Adds/removes icons from toolbar set
Import Flows Imports flows from an external file
Import MPLS XC Imports MPLS XCs from an external file
Import Policer Imports policers from an external file
Import Policer Imports policer profiles from an external file
Profile
Import XC Imports XCs from an external file
Inventory Displays an Inventory window with
Window information regarding selected NE(s)
Login History Lists login and logout activity in EMS-XDM
station
Exit Menu
Menu command Function M S C
Exit EMS-XDM Shuts down EMS-XDM
Help Menu
Menu command Function M S C
About EMS- Displays EMS-XDM version number and
XDM configuration information